• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5048

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Hyperlink Analysis of Political Blogs Communication Patterns Kostas Zafiropoulos, Vasiliki Vrana 9781617289224 Nova Science Publishers Inc
Hyperlink Analysis of Political Blogs Communication Patterns

ISBN: 9781617289224 / Angielski / Miękka / 2011 / 71 str.

ISBN: 9781617289224/Angielski/Miękka/2011/71 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Kostas Zafiropoulos;Vasiliki Vrana
Provides an introduction to WEB2.0 application, blogging and political blogging. This book presents several methodologies for studying blogs communication patterns through the study of blogs links. It also presents and explains how a hyperlink analysis of blogs can be made.
Provides an introduction to WEB2.0 application, blogging and political blogging. This book presents several methodologies for studying blogs communica...
cena: 277,64

 Healthy Passwords: Learn to make strong passwords you can remember Klein, Ken S. 9780615456850 Sustainable Alternatives, LLC
Healthy Passwords: Learn to make strong passwords you can remember

ISBN: 9780615456850 / Angielski / Miękka / 2011 / 152 str.

ISBN: 9780615456850/Angielski/Miękka/2011/152 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ken S. Klein
Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingredient list then use it to assemble different passwords for different sites. - Learn a way to have unique passwords that regularly change for all your sites. It doesn't matter if you have a dozen or a hundred site passwords to remember. - Learn how to secure the devices you use. You will learn how to use your computers / devices in ways that make it difficult for others to capture your passwords. Learn how to harden your home network to keep...
Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingr...
cena: 36,97

 Privacy and Big Data: The Players, Regulators, and Stakeholders Craig, Terence 9781449305000 O'Reilly Media
Privacy and Big Data: The Players, Regulators, and Stakeholders

ISBN: 9781449305000 / Angielski / Miękka / 2011 / 108 str.

ISBN: 9781449305000/Angielski/Miękka/2011/108 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Terence Craig; Mary E. Ludloff

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.

Personal data is the hottest commodity on the market today--truly more valuable than gold. We are the asset that every company, industry, non-profit, and government...

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints th...

cena: 83,78

 Disaster Recovery & Continuity of Business: A Project Management Guide and Workbook for Network Computing Environments John L. Cimasi 9781453609354 Createspace
Disaster Recovery & Continuity of Business: A Project Management Guide and Workbook for Network Computing Environments

ISBN: 9781453609354 / Angielski / Miękka / 2010 / 160 str.

ISBN: 9781453609354/Angielski/Miękka/2010/160 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John L. Cimasi
"The book offers a comprehensive guide for businesses on how to develop and implement effective disaster recovery and continuity of business plans that will make it possible for the company to keep working in the face of an event that cripples its information systems. Useful charts and helpful bulleted lists are offered for planning teams to customize for their company's needs. It's hard to think of any aspect of continuity planning that is not addressed by the book. Professional, thorough, detail-oriented and knowledgeable, the book is well organized and logically structured. It's clear to...
"The book offers a comprehensive guide for businesses on how to develop and implement effective disaster recovery and continuity of business plans tha...
cena: 41,13

 The Psychology of Cyber Crime: Concepts and Principles Kirwan, Gráinne 9781613503508 Information Science Reference
The Psychology of Cyber Crime: Concepts and Principles

ISBN: 9781613503508 / Angielski / Twarda / 2011 / 304 str.

ISBN: 9781613503508/Angielski/Twarda/2011/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Grinne Kirwan; Andrew Power
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures.
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers ...
cena: 1015,75

 FIPS 140 Demystified: An Introductory Guide for Vendors Potter, Ray 9781460990391 Createspace
FIPS 140 Demystified: An Introductory Guide for Vendors

ISBN: 9781460990391 / Angielski / Miękka / 2011 / 226 str.

ISBN: 9781460990391/Angielski/Miękka/2011/226 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Wesley Hisao Higaki; Ray Potter; Yukie Higaki
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Internet to make online purchases. Corporations store financial and medical information. This data must be protected and encryption (or cryptographic technologies) is the last line of defense against unauthorized access to this precious information. The Federal Information Processing Standard 140 (FIPS 140) is an internationally-recognized standard for assessing and validating that the cryptographic technologies used in our computer systems and...
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Intern...
cena: 82,20

 Wordpress 3 Ultimate Security Connelly, Olly 9781849512107 Packt Publishing
Wordpress 3 Ultimate Security

ISBN: 9781849512107 / Angielski / Miękka / 2011 / 408 str.

ISBN: 9781849512107/Angielski/Miękka/2011/408 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Olly Connelly
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection...
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hun...
cena: 241,22

 Mobile Middleware Content & Service Delivery Platforms Assessment Antonio Ghezzi 9781617287619 Nova Science Publishers Inc
Mobile Middleware Content & Service Delivery Platforms Assessment

ISBN: 9781617287619 / Angielski / Miękka / 2011 / 50 str.

ISBN: 9781617287619/Angielski/Miękka/2011/50 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Antonio Ghezzi
The growing complexity of mobile 'rich media' digital content and services requires the integration of next generation middleware platform. This book presents findings which show that platforms possess major strengths, while some drawbacks are still limiting the solutions effectiveness.
The growing complexity of mobile 'rich media' digital content and services requires the integration of next generation middleware platform. This book ...
cena: 263,76

 Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models Rehman, Rafeeq U. 9781492160366 Createspace
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models

ISBN: 9781492160366 / Angielski / Miękka / 2013 / 152 str.

ISBN: 9781492160366/Angielski/Miękka/2013/152 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rafeeq U. Rehman
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their...
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism a...
cena: 69,70

 Introduction to Computer Forensics: With 33 Real Life Cases MR Gordon E. Pelton 9781460970850 Createspace
Introduction to Computer Forensics: With 33 Real Life Cases

ISBN: 9781460970850 / Angielski / Miękka / 2011 / 180 str.

ISBN: 9781460970850/Angielski/Miękka/2011/180 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Gordon E. Pelton
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensics but who desires to learn about it. The book is a quick read but covers the basics of computer forensics in a thorough and easily understood manner., The book does not disappoint the reader. It is punctuated throughout with fascinating real life anecdotes from real life court cases in which computer forensics proved instrumental in resolving a crime or an alleged civil wrongdoing. Beyond the basics, the book goes on to describe how computer...
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensic...
cena: 82,04

 Cyber Law MR Anupa P. Kumar 9781449977863 Createspace
Cyber Law

ISBN: 9781449977863 / Angielski / Miękka / 2009 / 118 str.

ISBN: 9781449977863/Angielski/Miękka/2009/118 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Anupa P. Kumar
cena: 44,82

 Cooperative Networking  9780470749159
Cooperative Networking

ISBN: 9780470749159 / Angielski / Twarda / 2011 / 352 str.

ISBN: 9780470749159/Angielski/Twarda/2011/352 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
This book focuses on the latest trends and research results in Cooperative Networking

This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource utilization, servers and content, security, and so on. In addition, the authors address instances of cooperation in nature which actively encourage the development of cooperation in telecommunication networks. Following an introduction to the fundamentals and issues surrounding cooperative networking, the book addresses models of cooperation, inspirations of successful cooperation...

This book focuses on the latest trends and research results in Cooperative Networking

This book discusses the issues involved in cooperative...

cena: 513,21

 Mathematical and Algorithmic Foundations of the Internet Luccio, Fabrizio|||Pagli, Linda|||Steel, Graham 9781439831380 Chapman & Hall/CRC Applied Algorithms and Dat
Mathematical and Algorithmic Foundations of the Internet

ISBN: 9781439831380 / Angielski / Miękka / 2011 / 221 str.

ISBN: 9781439831380/Angielski/Miękka/2011/221 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fabrizio Luccio; Linda Pagli; Graham Steel

To truly understand how the Internet and Web are organized and function requires knowledge of mathematics and computation theory. Mathematical and Algorithmic Foundations of the Internet introduces the concepts and methods upon which computer networks rely and explores their applications to the Internet and Web. The book offers a unique approach to mathematical and algorithmic concepts, demonstrating their universality by presenting ideas and examples from various fields, including literature, history, and art.

Progressing from fundamental concepts to more...

To truly understand how the Internet and Web are organized and function requires knowledge of mathematics and computation theory. Mathemati...

cena: 328,47

 Microsoft Windows Intune 2.0: QuickStart Administration Overton, David 9781849682961 COMPUTER BOOKSHOPS
Microsoft Windows Intune 2.0: QuickStart Administration

ISBN: 9781849682961 / Angielski / Miękka / 2012 / 312 str.

ISBN: 9781849682961/Angielski/Miękka/2012/312 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
D Overton
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7 so your computers and users can operate at peak performance all the time. This step-by-step guide will show you how to plan, set up and maintain Windows Intune, showing you how to manage a group of PCs (either 1 business or several if a partner) from the base operating system, through to the patches, anti-malware solution and deployed software and policies from a central console, using the Windows Intune service. This book...
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud se...
cena: 241,22

 Web Data Management Serge Abiteboul 9781107012431 CAMBRIDGE UNIVERSITY PRESS
Web Data Management

ISBN: 9781107012431 / Angielski / Twarda / 2011 / 435 str.

ISBN: 9781107012431/Angielski/Twarda/2011/435 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Serge Abiteboul
This book explains the foundations of XML, the Web standard for data management, with a focus on data distribution.
This book explains the foundations of XML, the Web standard for data management, with a focus on data distribution.
cena: 256,22

 Digital Identity and Access Management: Technologies and Frameworks Sharman, Raj 9781613504987 Business Science Reference
Digital Identity and Access Management: Technologies and Frameworks

ISBN: 9781613504987 / Angielski / Twarda / 2011 / 428 str.

ISBN: 9781613504987/Angielski/Twarda/2011/428 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Raj Sharman;Sanjukta Das Smith;Manish Gupta
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of...
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm ident...
cena: 1015,75

 Wireless Communications Circuits and Systems Yichuang Sun   9780852964439 Institution of Engineering and Technology
Wireless Communications Circuits and Systems

ISBN: 9780852964439 / Angielski / Twarda / 2003 / 304 str.

ISBN: 9780852964439/Angielski/Twarda/2003/304 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Yichuang Sun
This new book examines integrated circuits, systems and transceivers for wireless and mobile communications. It covers the most recent developments in key RF, IF, analogue, mixed-signal components and single-chip transceivers in CMOS technology.
This new book examines integrated circuits, systems and transceivers for wireless and mobile communications. It covers the most recent developments in...
cena: 545,97

 Situational Awareness in Computer Network Defense: Principles, Methods and Applications Onwubiko, Cyril 9781466601048 Idea Group,U.S.
Situational Awareness in Computer Network Defense: Principles, Methods and Applications

ISBN: 9781466601048 / Angielski / Twarda / 2012 / 416 str.

ISBN: 9781466601048/Angielski/Twarda/2012/416 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Cyril Onwubiko;Thomas John Owens
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and...
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous...
cena: 1015,75

 Optimizing Information Security and Advancing Privacy Assurance: New Technologies Nemati, Hamid 9781466600263 Idea Group,U.S.
Optimizing Information Security and Advancing Privacy Assurance: New Technologies

ISBN: 9781466600263 / Angielski / Twarda / 2012 / 340 str.

ISBN: 9781466600263/Angielski/Twarda/2012/340 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Hamid Nemati
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary...
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amoun...
cena: 1015,75

 Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances Chou, Te-Shun 9781613505076 Business Science Reference
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

ISBN: 9781613505076 / Angielski / Twarda / 2011 / 372 str.

ISBN: 9781613505076/Angielski/Twarda/2011/372 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Te-Shun Chou
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information...
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this incre...
cena: 1015,75

Podprzednia  22  23  24  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia