
ilość książek w kategorii: 5048
![]() |
The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies De
ISBN: 9781468063875 / Angielski / Miękka / 2012 / 512 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Holistic Operational Readiness Security Evaluation - HORSE Project Series Volume 1 is the professional companion book to the popular global resource, the HORSE Project Wiki, that provides a comprehensive examination of corporate information technology and security governance documents ranging from a corporate charter, policies and standards. This book provides a holistically approachable road map to design, ratification, implementation and maintenance of corporate security program policies. The guidance contained within has been the bedrock for corporate governance within some of the biggest...
Holistic Operational Readiness Security Evaluation - HORSE Project Series Volume 1 is the professional companion book to the popular global resource, ...
|
cena:
188,96 |
![]() |
Downloading Democracy
ISBN: 9781572730496 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
114,43 |
![]() |
User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks
ISBN: 9781443847964 / Angielski / Twarda / 2013 / 185 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) due to a dramatic increase in identity theft. The problem is even greater in service-oriented...
The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-h...
|
cena:
209,53 |
![]() |
Knowledge Discovery in Databases
ISBN: 9780262660709 / Angielski / Miękka / 1991 / 540 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Knowledge Discovery in Databases brings together current research on the exciting problem of discovering useful and interesting knowledge in databases. It spans many different approaches to discovery, including inductive learning, bayesian statistics, semantic query optimization, knowledge acquisition for expert systems, information theory, and fuzzy 1 sets.The rapid growth in the number and size of databases creates a need for tools and techniques for intelligent data understanding. Relationships and patterns in data may enable a manufacturer to discover the cause of a persistent disk... Knowledge Discovery in Databases brings together current research on the exciting problem of discovering useful and interesting knowledge in databa... |
cena:
368,18 |
![]() |
Downloading Democracy-Government Information In An Electronic Age
ISBN: 9781572730489 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
288,70 |
![]() |
Intrusion Detection in Wireless Ad-Hoc Networks
ISBN: 9781466515659 / Angielski / Twarda / 2014 / 258 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems,...Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of w... |
cena:
522,64 |
![]() |
Design, Performance, and Analysis of Innovative Information Retrieval
ISBN: 9781466619753 / Angielski / Twarda / 2012 / 510 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even second, and this may lead to a major problem for the future of efficient data search and retrieval as well as secure data storage for the world's scientists, engineers, doctors, librarians, and business managers.Design, Performance, and Analysis of Innovative Information Retrieval examines a number of emerging technologies that significantly contribute to modern Information Retrieval (IR), as well as fundamental IR theories and concepts that have...
Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even sec...
|
cena:
1015,75 |
![]() |
Shields Up: Complete Guide to Windows Security and Mac Privacy
ISBN: 9781470120917 / Angielski / Miękka / 2012 / 160 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is your computer really safe? Are you sure your privacy is protected online? "Shields Up Complete Guide to Windows Security and Mac Privacy" will arm you with fundamental knowledge to stay safe both online and offline. With "Shields Up " you will:
Is your computer really safe? Are you sure your privacy is protected online? "Shields Up Complete Guide to Windows Security and Mac Privacy" will... |
cena:
123,17 |
![]() |
Semantic Web Technologies and Social Searching for Librarians
ISBN: 9781555707804 / Angielski / Miękka / 2012 / 128 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. No.20 in The Tech Set. The book offers a introduction to the tools available and how to use them effectively.
No.20 in The Tech Set. The book offers a introduction to the tools available and how to use them effectively.
|
cena:
335,01 |
![]() |
Going Beyond Google Again: Strategies for Using and Teaching the Invisible Web
ISBN: 9781555708986 / Angielski / Miękka / 2013 / 180 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book builds upon the authors' previous well-respected book, Going Beyond Google, which placed teaching the Invisible Web into information literacy programs. Going Beyond Google Again expands on the teaching foundation laid in the first book and continues to document the Invisible Web's existence and evolution, and suggests ways of teaching students to use it. The new book focuses on events and materials from the 4 years.
This book builds upon the authors' previous well-respected book, Going Beyond Google, which placed teaching the Invisible Web into information literac...
|
cena:
390,12 |
![]() |
CommVault Concepts & Design Strategies
ISBN: 9781467953702 / Angielski / Miękka / 2012 / 588 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. CommVault Concepts & Design Strategies (originally CommVault Storage Policies) is an in-depth guide to understanding how the Simpana(r) product suite works. It provides detailed explanations on designing and configuring storage policies, deduplication, protecting virtual infrastructures and using snapshot technologies within a CommCell(r) environment. It also provides a complete design methodology for planning and designing CommCell environments from technical and business aspects. This book provides guidance on optimally configuring a CommCell environment through tips and best practices to...
CommVault Concepts & Design Strategies (originally CommVault Storage Policies) is an in-depth guide to understanding how the Simpana(r) product suite ...
|
cena:
205,41 |
![]() |
Genetic Algorithms, Fuzzy Systems & Website Classification
ISBN: 9781613240007 / Angielski / Twarda / 2012 / 226 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
617,16 |
![]() |
Privacy Solutions and Security Frameworks in Information Protection
ISBN: 9781466620506 / Angielski / Twarda / 2012 / 308 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional...
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of t...
|
cena:
1015,75 |
![]() |
IT Security Governance Innovations: Theory and Research
ISBN: 9781466620834 / Angielski / Twarda / 2012 / 372 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best...
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a techni...
|
cena:
1015,75 |
![]() |
Security Engineering for Cloud Computing: Approaches and Tools
ISBN: 9781466621251 / Angielski / Twarda / 2012 / 258 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tool...
|
cena:
1015,75 |
![]() |
The Little Black Book of Computer Security, Second Edition
ISBN: 9781475286243 / Angielski / Miękka / 2012 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains checklists covering all aspects of computer security from network security, to writing security policies, and application security. It also covers the soft skills of security, such as social engineering and best practices for hiring employees and working with auditors.
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains ...
|
cena:
61,48 |
![]() |
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
ISBN: 9781597499620 / Angielski / Miękka / 2014 / 252 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full... Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have ... |
cena:
174,16 |
![]() |
How to Spot Scams Online: First Edition
ISBN: 9781466330580 / Angielski / Miękka / 2011 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Scams are growing more and more each prevalent day. This book will help you fight scams. Instead of becoming a victim of it, This book will inform you on where to report a scam if you come across one. It will also teach you the five major scams that are going on in today's world as we speak. This book is a life saver.
If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Sca...
|
cena:
90,43 |
![]() |
Penetration Testing: Protecting Networks and Systems
ISBN: 9781849283717 / Angielski / Miękka / 2012 / 211 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
|
cena:
164,45 |
![]() |
Developing and Evaluating Security-Aware Software Systems
ISBN: 9781466624825 / Angielski / Twarda / 2012 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineer...
|
cena:
1015,75 |