
ilość książek w kategorii: 5048
![]() |
Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments
ISBN: 9781466624887 / Angielski / Twarda / 2012 / 420 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud computing, many legacy applications will need to migrate these environments to take advantage of the benefits offered by the service environment. Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments presents a closer look at the partnership between service oriented architecture and cloud computing environments while analyzing potential solutions to challenges related to the migration of...
As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud...
|
cena:
1015,75 |
![]() |
Cyber Crime, Security and Digital Intelligence
ISBN: 9781409454496 / Angielski / Twarda / 2013 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far...
Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myri...
|
cena:
846,18 |
![]() |
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
ISBN: 9781893939905 / Angielski / Miękka / 2012 / 186 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst Exam. This Official Exam Prep Guide offers a companion to Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (Second Edition)."
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst ...
|
cena:
225,35 |
![]() |
Quantum Cryptography and Secret-Key Distillation
ISBN: 9781107410633 / Angielski / Miękka / 2012 / 276 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy...
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secu...
|
cena:
386,83 |
![]() |
Optical Code Division Multiple Access: A Practical Perspective
ISBN: 9781107026162 / Angielski / Twarda / 2014 / 357 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-Home (FTTH) systems. Part I starts off with the fundamentals of light propagation in optical fibers, including multiple access protocols, and their enabling techniques. Part II is dedicated to the practical perspectives of Next-Generation Fiber-to-the-Home (FTTH) technology. It covers the key building blocks of OCDMA, devices such as optical encoders and decoders, signal impairments due to noise, and data confidentiality, a unique property of...
A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-...
|
cena:
642,90 |
![]() |
Mechanisms and Games for Dynamic Spectrum Allocation
ISBN: 9781107034129 / Angielski / Twarda / 2013 / 601 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and comprehensive book provides a strong foundation for the design of future wireless mechanisms and spectrum markets. Prominent researchers showcase a diverse range of novel insights and approaches to the increasing demand for limited spectrum resources, with a consistent emphasis on theoretical methods, analytical results and practical examples. Covering fundamental underlying principles, licensed spectrum sharing, opportunistic spectrum sharing, and...
Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and compr...
|
cena:
562,74 |
![]() |
Federal Information Security: Select Protection & Control Efforts
ISBN: 9781619427716 / Angielski / Twarda / 2012 / 145 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
706,76 |
![]() |
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
ISBN: 9781466626591 / Angielski / Twarda / 2012 / 452 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these...
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environme...
|
cena:
1015,75 |
![]() |
Security in Cyberspace: Select Assessments & Policy Considerations
ISBN: 9781622573493 / Angielski / Twarda / 2013 / 190 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially. In the first quarter of this year, security experts were seeing almost 67,000 new malware threats on the Internet every day. This means more than 45 new viruses, worms, spy-ware and other threats were being created every minute. As these threats grow, security policy, technology and procedures need to evolve even faster to stay ahead of the...
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cy...
|
cena:
796,35 |
![]() |
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática
ISBN: 9781479122998 / Hiszpański / Miękka / 2012 / 116 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas rapido posible los datos de su empresa u organizacion, utilizando 27 controles criticos. Es una metodologia 100% practica y enfocada a obtener resultados inmediatos."
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas ra...
|
cena:
53,26 |
![]() |
Guide to Network Defense and Countermeasures
ISBN: 9781133727941 / Angielski / Miękka / 2013 / 576 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
298,60 |
![]() |
Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM
ISBN: 9781455722884 / Angielski / Miękka / 2012 / 640 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass the AHIMA CCS certification exam and take your coding career to the next step. CCS Coding Exam Review 2013: The Certification Step with ICD-9-CM features an easy-to-follow outline format that guides you through the anatomy, terminology, and pathophysiology for each organ system; reimbursement concepts; an overview of CPT, ICD-9-CM, and HCPCS coding; and more. Two full practice exams and a final exam modeled on the actual CCS exam simulate... With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass th... |
cena:
282,88 |
![]() |
Effective Monitoring and Alerting: For Web Operations
ISBN: 9781449333522 / Angielski / Miękka / 2013 / 140 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability and deliver a high quality of service. Learn methods for measuring state changes and data flow in your system, and set up alerts to help you recover quickly from problems when they do arise. If you're a system operator waging the... With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on ... |
cena:
91,70 |
![]() |
Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission
ISBN: 9781626183902 / Angielski / Miękka / 2013 / 81 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
423,05 |
![]() |
Steganography & Watermarking
ISBN: 9781626183131 / Angielski / Twarda / 2013 / 363 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
1259,27 |
![]() |
Cyberspace and Security: A Fundamentally New Approach
ISBN: 9780985893002 / Angielski / Miękka / 2012 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes us to catastrophic failure. This book clarifies shows how the security methods we have designed for the physical world are futile in cyberspace. If we want effective cybersecurity we need to understand the real and different nature of cyberspace, and the decision makers and security professionals have to understand the laws and rules of cyberspace and why and how they work in cybersecurity. Victor Sheymov's comprehensive multi-disciplinary...
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes...
|
cena:
115,14 |
![]() |
Nmap 6: Network Exploration and Security Auditing Cookbook
ISBN: 9781849517485 / Angielski / Miękka / 2012 / 318 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the...
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to...
|
cena:
214,89 |
![]() |
Knowledge Discovery in Multiple Databases
ISBN: 9781447110507 / Angielski / Miękka / 2012 / 233 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Many organizations have an urgent need of mining their multiple databases inherently distributed in branches (distributed data). In particular, as the Web is rapidly becoming an information flood, individuals and organizations can take into account low-cost information and knowledge on the Internet when making decisions. How to efficiently identify quality knowledge from different data sources has become a significant challenge. This challenge has attracted a great many researchers including the au- thors who have developed a local pattern analysis, a new strategy for dis- covering some kinds...
Many organizations have an urgent need of mining their multiple databases inherently distributed in branches (distributed data). In particular, as the...
|
cena:
408,20 |
![]() |
Kish Cypher, The: The Story of Kljn for Unconditional Security
ISBN: 9789814449458 / Angielski / Twarda / 2017 / 464 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.This book clarifies the misinformation behind heated debates on the 'Kish Cypher' (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut...
Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its uncondit...
|
cena:
721,74 |
![]() |
Security, Design, and Architecture for Broadband and Wireless Network Technologies
ISBN: 9781466639027 / Angielski / Twarda / 2013 / 386 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there still remains to be a comprehensive understanding of its various dimensions and environments. Security, Design, and Architecture for Broadband and Wireless Network Technologies provides a discussion on the latest research achievements in wireless networks and broadband technology. Highlighting new trends, applications, developments, and standards, this book is essential for next generation researchers and practitioners in the ICT field.
While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there s...
|
cena:
989,70 |