• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5048

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies De Peters, Michael D. 9781468063875 Createspace
The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies De

ISBN: 9781468063875 / Angielski / Miękka / 2012 / 512 str.

ISBN: 9781468063875/Angielski/Miękka/2012/512 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Michael D. Peters
Holistic Operational Readiness Security Evaluation - HORSE Project Series Volume 1 is the professional companion book to the popular global resource, the HORSE Project Wiki, that provides a comprehensive examination of corporate information technology and security governance documents ranging from a corporate charter, policies and standards. This book provides a holistically approachable road map to design, ratification, implementation and maintenance of corporate security program policies. The guidance contained within has been the bedrock for corporate governance within some of the biggest...
Holistic Operational Readiness Security Evaluation - HORSE Project Series Volume 1 is the professional companion book to the popular global resource, ...
cena: 188,96

 
Downloading Democracy

ISBN: 9781572730496 / Angielski

ISBN: 9781572730496/Angielski

Termin realizacji zamówienia: ok. 30 dni roboczych.
Susan M Ryan
cena: 114,43

 User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks Abdullahi Arabo 9781443847964 Cambridge Scholars Publishing
User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks

ISBN: 9781443847964 / Angielski / Twarda / 2013 / 185 str.

ISBN: 9781443847964/Angielski/Twarda/2013/185 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Abdullahi Arabo
The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) due to a dramatic increase in identity theft. The problem is even greater in service-oriented...
The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-h...
cena: 209,53

 Knowledge Discovery in Databases Gregory Piatetsky-Shapiro, William Frawley 9780262660709 MIT Press Ltd
Knowledge Discovery in Databases

ISBN: 9780262660709 / Angielski / Miękka / 1991 / 540 str.

ISBN: 9780262660709/Angielski/Miękka/1991/540 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gregory Piatetsky-Shapiro;William Frawley

Knowledge Discovery in Databases brings together current research on the exciting problem of discovering useful and interesting knowledge in databases. It spans many different approaches to discovery, including inductive learning, bayesian statistics, semantic query optimization, knowledge acquisition for expert systems, information theory, and fuzzy 1 sets.The rapid growth in the number and size of databases creates a need for tools and techniques for intelligent data understanding. Relationships and patterns in data may enable a manufacturer to discover the cause of a persistent disk...

Knowledge Discovery in Databases brings together current research on the exciting problem of discovering useful and interesting knowledge in databa...

cena: 368,18

 
Downloading Democracy-Government Information In An Electronic Age

ISBN: 9781572730489 / Angielski

ISBN: 9781572730489/Angielski

Termin realizacji zamówienia: ok. 30 dni roboczych.
Susan M Ryan
cena: 288,70

 Intrusion Detection in Wireless Ad-Hoc Networks Nabendu Chaki Rituparna Chaki 9781466515659 CRC Press
Intrusion Detection in Wireless Ad-Hoc Networks

ISBN: 9781466515659 / Angielski / Twarda / 2014 / 258 str.

ISBN: 9781466515659/Angielski/Twarda/2014/258 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nabendu Chaki; Rituparna Chaki

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.

This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems,...

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of w...

cena: 522,64

 Design, Performance, and Analysis of Innovative Information Retrieval Joan Lu 9781466619753 Information Science Reference
Design, Performance, and Analysis of Innovative Information Retrieval

ISBN: 9781466619753 / Angielski / Twarda / 2012 / 510 str.

ISBN: 9781466619753/Angielski/Twarda/2012/510 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joan Lu
Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even second, and this may lead to a major problem for the future of efficient data search and retrieval as well as secure data storage for the world's scientists, engineers, doctors, librarians, and business managers.Design, Performance, and Analysis of Innovative Information Retrieval examines a number of emerging technologies that significantly contribute to modern Information Retrieval (IR), as well as fundamental IR theories and concepts that have...
Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even sec...
cena: 1015,75

 Shields Up: Complete Guide to Windows Security and Mac Privacy Liz Cornwell 9781470120917 Createspace
Shields Up: Complete Guide to Windows Security and Mac Privacy

ISBN: 9781470120917 / Angielski / Miękka / 2012 / 160 str.

ISBN: 9781470120917/Angielski/Miękka/2012/160 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Liz Cornwell

Is your computer really safe? Are you sure your privacy is protected online? "Shields Up Complete Guide to Windows Security and Mac Privacy" will arm you with fundamental knowledge to stay safe both online and offline.

With "Shields Up " you will:

  • Learn about different types of malware and how to protect yourself from all sorts of infections
  • Find out how to configure Windows and Mac settings to boost system security
  • Learn how to protect yourself from online scams, fraud, and identity theft
  • Get step-by-step instructions how to secure...

Is your computer really safe? Are you sure your privacy is protected online? "Shields Up Complete Guide to Windows Security and Mac Privacy" will...
cena: 123,17

 Semantic Web Technologies and Social Searching for Librarians Robin M Fay, Michael Sauers 9781555707804 Neal-Schuman Publishers Inc
Semantic Web Technologies and Social Searching for Librarians

ISBN: 9781555707804 / Angielski / Miękka / 2012 / 128 str.

ISBN: 9781555707804/Angielski/Miękka/2012/128 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Robin M Fay;Michael Sauers
No.20 in The Tech Set. The book offers a introduction to the tools available and how to use them effectively.
No.20 in The Tech Set. The book offers a introduction to the tools available and how to use them effectively.
cena: 335,01

 Going Beyond Google Again: Strategies for Using and Teaching the Invisible Web Jane Devine 9781555708986 Neal-Schuman Publishers
Going Beyond Google Again: Strategies for Using and Teaching the Invisible Web

ISBN: 9781555708986 / Angielski / Miękka / 2013 / 180 str.

ISBN: 9781555708986/Angielski/Miękka/2013/180 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jane Devine
This book builds upon the authors' previous well-respected book, Going Beyond Google, which placed teaching the Invisible Web into information literacy programs. Going Beyond Google Again expands on the teaching foundation laid in the first book and continues to document the Invisible Web's existence and evolution, and suggests ways of teaching students to use it. The new book focuses on events and materials from the 4 years.
This book builds upon the authors' previous well-respected book, Going Beyond Google, which placed teaching the Invisible Web into information literac...
cena: 390,12

 CommVault Concepts & Design Strategies Moalam, Madelyn 9781467953702 Createspace
CommVault Concepts & Design Strategies

ISBN: 9781467953702 / Angielski / Miękka / 2012 / 588 str.

ISBN: 9781467953702/Angielski/Miękka/2012/588 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Frank H. Celauro; Madelyn Moalam
CommVault Concepts & Design Strategies (originally CommVault Storage Policies) is an in-depth guide to understanding how the Simpana(r) product suite works. It provides detailed explanations on designing and configuring storage policies, deduplication, protecting virtual infrastructures and using snapshot technologies within a CommCell(r) environment. It also provides a complete design methodology for planning and designing CommCell environments from technical and business aspects. This book provides guidance on optimally configuring a CommCell environment through tips and best practices to...
CommVault Concepts & Design Strategies (originally CommVault Storage Policies) is an in-depth guide to understanding how the Simpana(r) product suite ...
cena: 205,41

 Genetic Algorithms, Fuzzy Systems & Website Classification Rafiq Islam 9781613240007 Nova Science Publishers Inc
Genetic Algorithms, Fuzzy Systems & Website Classification

ISBN: 9781613240007 / Angielski / Twarda / 2012 / 226 str.

ISBN: 9781613240007/Angielski/Twarda/2012/226 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Rafiq Islam
cena: 617,16

 Privacy Solutions and Security Frameworks in Information Protection Hamid Nemati 9781466620506 Information Science Reference
Privacy Solutions and Security Frameworks in Information Protection

ISBN: 9781466620506 / Angielski / Twarda / 2012 / 308 str.

ISBN: 9781466620506/Angielski/Twarda/2012/308 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Hamid Nemati
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional...
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of t...
cena: 1015,75

 IT Security Governance Innovations: Theory and Research Mellado, Daniel 9781466620834 Information Science Reference
IT Security Governance Innovations: Theory and Research

ISBN: 9781466620834 / Angielski / Twarda / 2012 / 372 str.

ISBN: 9781466620834/Angielski/Twarda/2012/372 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
E. Fernandez-Medina; D. Mellado; M. Piattini
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best...
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a techni...
cena: 1015,75

 Security Engineering for Cloud Computing: Approaches and Tools Rosado, David G. 9781466621251 Information Science Reference
Security Engineering for Cloud Computing: Approaches and Tools

ISBN: 9781466621251 / Angielski / Twarda / 2012 / 258 str.

ISBN: 9781466621251/Angielski/Twarda/2012/258 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David G. Rosado; Mario Piattini; D. Mellado
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tool...
cena: 1015,75

 The Little Black Book of Computer Security, Second Edition MR Joel Dubin 9781475286243 Createspace
The Little Black Book of Computer Security, Second Edition

ISBN: 9781475286243 / Angielski / Miękka / 2012 / 212 str.

ISBN: 9781475286243/Angielski/Miękka/2012/212 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Joel Dubin
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains checklists covering all aspects of computer security from network security, to writing security policies, and application security. It also covers the soft skills of security, such as social engineering and best practices for hiring employees and working with auditors.
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains ...
cena: 61,48

 Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response Joe Fichera (Joe Fichera is a Certified Computer Examiner (CCE) and member of the ISFCE. He also holds EnCE, ACE, CTT+,  9781597499620 Syngress Media,U.S.
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

ISBN: 9781597499620 / Angielski / Miękka / 2014 / 252 str.

ISBN: 9781597499620/Angielski/Miękka/2014/252 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joe Fichera (Joe Fichera is a Certified Computer Examiner (C; and Instructor Steven Bolt (is a Computer Forensics Leader

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full...

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have ...

cena: 174,16

 How to Spot Scams Online: First Edition John Gowe 9781466330580 Createspace
How to Spot Scams Online: First Edition

ISBN: 9781466330580 / Angielski / Miękka / 2011 / 50 str.

ISBN: 9781466330580/Angielski/Miękka/2011/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
III John Gower
If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Scams are growing more and more each prevalent day. This book will help you fight scams. Instead of becoming a victim of it, This book will inform you on where to report a scam if you come across one. It will also teach you the five major scams that are going on in today's world as we speak. This book is a life saver.
If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Sca...
cena: 90,43

 Penetration Testing: Protecting Networks and Systems Henry, Kevin M. 9781849283717 Itgp
Penetration Testing: Protecting Networks and Systems

ISBN: 9781849283717 / Angielski / Miękka / 2012 / 211 str.

ISBN: 9781849283717/Angielski/Miękka/2012/211 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kevin M. Henry
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
cena: 164,45

 Developing and Evaluating Security-Aware Software Systems Khaled M. Khan 9781466624825 Information Science Reference
Developing and Evaluating Security-Aware Software Systems

ISBN: 9781466624825 / Angielski / Twarda / 2012 / 368 str.

ISBN: 9781466624825/Angielski/Twarda/2012/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Khaled M. Khan
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineer...
cena: 1015,75

Podprzednia  25  26  27  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia