• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5048

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments Ionita, Anca Daniela 9781466624887 Information Science Reference
Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments

ISBN: 9781466624887 / Angielski / Twarda / 2012 / 420 str.

ISBN: 9781466624887/Angielski/Twarda/2012/420 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Anca Daniela Ionita; Marin Litoiu; Grace Lewis
As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud computing, many legacy applications will need to migrate these environments to take advantage of the benefits offered by the service environment. Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments presents a closer look at the partnership between service oriented architecture and cloud computing environments while analyzing potential solutions to challenges related to the migration of...
As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud...
cena: 1015,75

 Cyber Crime, Security and Digital Intelligence Johnson, Mark 9781409454496
Cyber Crime, Security and Digital Intelligence

ISBN: 9781409454496 / Angielski / Twarda / 2013 / 304 str.

ISBN: 9781409454496/Angielski/Twarda/2013/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far...
Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myri...
cena: 846,18

 Wireshark Certified Network Analyst Exam Prep Guide (Second Edition) Laura Chappell 9781893939905 Laura Chappell University
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)

ISBN: 9781893939905 / Angielski / Miękka / 2012 / 186 str.

ISBN: 9781893939905/Angielski/Miękka/2012/186 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Laura Chappell
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst Exam. This Official Exam Prep Guide offers a companion to Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (Second Edition)."
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst ...
cena: 225,35

 Quantum Cryptography and Secret-Key Distillation Gilles Va 9781107410633 Cambridge University Press
Quantum Cryptography and Secret-Key Distillation

ISBN: 9781107410633 / Angielski / Miękka / 2012 / 276 str.

ISBN: 9781107410633/Angielski/Miękka/2012/276 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gilles Van Assche
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy...
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secu...
cena: 386,83

 Optical Code Division Multiple Access: A Practical Perspective Kitayama, Ken-Ichi 9781107026162 CAMBRIDGE UNIVERSITY PRESS
Optical Code Division Multiple Access: A Practical Perspective

ISBN: 9781107026162 / Angielski / Twarda / 2014 / 357 str.

ISBN: 9781107026162/Angielski/Twarda/2014/357 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ken ichi Kitayama
A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-Home (FTTH) systems. Part I starts off with the fundamentals of light propagation in optical fibers, including multiple access protocols, and their enabling techniques. Part II is dedicated to the practical perspectives of Next-Generation Fiber-to-the-Home (FTTH) technology. It covers the key building blocks of OCDMA, devices such as optical encoders and decoders, signal impairments due to noise, and data confidentiality, a unique property of...
A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-...
cena: 642,90

 Mechanisms and Games for Dynamic Spectrum Allocation Tansu Alpcan 9781107034129 CAMBRIDGE UNIVERSITY PRESS
Mechanisms and Games for Dynamic Spectrum Allocation

ISBN: 9781107034129 / Angielski / Twarda / 2013 / 601 str.

ISBN: 9781107034129/Angielski/Twarda/2013/601 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tansu Alpcan
Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and comprehensive book provides a strong foundation for the design of future wireless mechanisms and spectrum markets. Prominent researchers showcase a diverse range of novel insights and approaches to the increasing demand for limited spectrum resources, with a consistent emphasis on theoretical methods, analytical results and practical examples. Covering fundamental underlying principles, licensed spectrum sharing, opportunistic spectrum sharing, and...
Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and compr...
cena: 562,74

 Federal Information Security: Select Protection & Control Efforts David G Miller, Ivan I Wilson 9781619427716 Nova Science Publishers Inc
Federal Information Security: Select Protection & Control Efforts

ISBN: 9781619427716 / Angielski / Twarda / 2012 / 145 str.

ISBN: 9781619427716/Angielski/Twarda/2012/145 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
David G Miller;Ivan I Wilson
cena: 706,76

 Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection Laing, Christopher 9781466626591 Information Science Reference
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

ISBN: 9781466626591 / Angielski / Twarda / 2012 / 452 str.

ISBN: 9781466626591/Angielski/Twarda/2012/452 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Christopher Laing; Atta Badii; Paul Vickers
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these...
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environme...
cena: 1015,75

 Security in Cyberspace: Select Assessments & Policy Considerations Martin E Owens, Deborah R Simpson 9781622573493 Nova Science Publishers Inc
Security in Cyberspace: Select Assessments & Policy Considerations

ISBN: 9781622573493 / Angielski / Twarda / 2013 / 190 str.

ISBN: 9781622573493/Angielski/Twarda/2013/190 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Martin E Owens;Deborah R Simpson
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially. In the first quarter of this year, security experts were seeing almost 67,000 new malware threats on the Internet every day. This means more than 45 new viruses, worms, spy-ware and other threats were being created every minute. As these threats grow, security policy, technology and procedures need to evolve even faster to stay ahead of the...
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cy...
cena: 796,35

 Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática Castro Reynoso, Sergio 9781479122998 Createspace Independent Publishing Platform
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática

ISBN: 9781479122998 / Hiszpański / Miękka / 2012 / 116 str.

ISBN: 9781479122998/Hiszpański/Miękka/2012/116 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sergio Castro Reynoso
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas rapido posible los datos de su empresa u organizacion, utilizando 27 controles criticos. Es una metodologia 100% practica y enfocada a obtener resultados inmediatos."
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas ra...
cena: 53,26

 Guide to Network Defense and Countermeasures Dean (Heald College, San Francisco) Farwood 9781133727941 Cengage Learning, Inc
Guide to Network Defense and Countermeasures

ISBN: 9781133727941 / Angielski / Miękka / 2013 / 576 str.

ISBN: 9781133727941/Angielski/Miękka/2013/576 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
San Francisco) Farwood Dean (Heald College
cena: 298,60

 Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM Carol J. Buck 9781455722884 W.B. Saunders Company
Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM

ISBN: 9781455722884 / Angielski / Miękka / 2012 / 640 str.

ISBN: 9781455722884/Angielski/Miękka/2012/640 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Carol J. Buck

With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass the AHIMA CCS certification exam and take your coding career to the next step. CCS Coding Exam Review 2013: The Certification Step with ICD-9-CM features an easy-to-follow outline format that guides you through the anatomy, terminology, and pathophysiology for each organ system; reimbursement concepts; an overview of CPT, ICD-9-CM, and HCPCS coding; and more. Two full practice exams and a final exam modeled on the actual CCS exam simulate...

With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass th...

cena: 282,88

 Effective Monitoring and Alerting: For Web Operations Ligus, Slawek 9781449333522 O'Reilly Media
Effective Monitoring and Alerting: For Web Operations

ISBN: 9781449333522 / Angielski / Miękka / 2013 / 140 str.

ISBN: 9781449333522/Angielski/Miękka/2013/140 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.

With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability and deliver a high quality of service.

Learn methods for measuring state changes and data flow in your system, and set up alerts to help you recover quickly from problems when they do arise. If you're a system operator waging the...

With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on ...

cena: 91,70

 Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission Julie C Hartell 9781626183902 Nova Science Publishers Inc
Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission

ISBN: 9781626183902 / Angielski / Miękka / 2013 / 81 str.

ISBN: 9781626183902/Angielski/Miękka/2013/81 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Julie C Hartell
cena: 423,05

 Steganography & Watermarking Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang 9781626183131 Nova Science Publishers Inc
Steganography & Watermarking

ISBN: 9781626183131 / Angielski / Twarda / 2013 / 363 str.

ISBN: 9781626183131/Angielski/Twarda/2013/363 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Ching-Nung Yang;Chia-Chen Lin;Chin-Chen Chang
cena: 1259,27

 Cyberspace and Security: A Fundamentally New Approach Victor Sheymov 9780985893002 Cyber Books Publishing
Cyberspace and Security: A Fundamentally New Approach

ISBN: 9780985893002 / Angielski / Miękka / 2012 / 212 str.

ISBN: 9780985893002/Angielski/Miękka/2012/212 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Victor Sheymov
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes us to catastrophic failure. This book clarifies shows how the security methods we have designed for the physical world are futile in cyberspace. If we want effective cybersecurity we need to understand the real and different nature of cyberspace, and the decision makers and security professionals have to understand the laws and rules of cyberspace and why and how they work in cybersecurity. Victor Sheymov's comprehensive multi-disciplinary...
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes...
cena: 115,14

 Nmap 6: Network Exploration and Security Auditing Cookbook Paulino Calderon Pale 9781849517485 Packt
Nmap 6: Network Exploration and Security Auditing Cookbook

ISBN: 9781849517485 / Angielski / Miękka / 2012 / 318 str.

ISBN: 9781849517485/Angielski/Miękka/2012/318 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Paulino Calderon Pale
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the...
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to...
cena: 214,89

 Knowledge Discovery in Multiple Databases Shichao Zhang Chengqi Zhang Xindong Wu 9781447110507 Springer
Knowledge Discovery in Multiple Databases

ISBN: 9781447110507 / Angielski / Miękka / 2012 / 233 str.

ISBN: 9781447110507/Angielski/Miękka/2012/233 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Shichao Zhang; Chengqi Zhang; Xindong Wu
Many organizations have an urgent need of mining their multiple databases inherently distributed in branches (distributed data). In particular, as the Web is rapidly becoming an information flood, individuals and organizations can take into account low-cost information and knowledge on the Internet when making decisions. How to efficiently identify quality knowledge from different data sources has become a significant challenge. This challenge has attracted a great many researchers including the au- thors who have developed a local pattern analysis, a new strategy for dis- covering some kinds...
Many organizations have an urgent need of mining their multiple databases inherently distributed in branches (distributed data). In particular, as the...
cena: 408,20

 Kish Cypher, The: The Story of Kljn for Unconditional Security Kish, Laszlo B. 9789814449458 World Scientific Publishing Company
Kish Cypher, The: The Story of Kljn for Unconditional Security

ISBN: 9789814449458 / Angielski / Twarda / 2017 / 464 str.

ISBN: 9789814449458/Angielski/Twarda/2017/464 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Laszlo B. Kish
Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.This book clarifies the misinformation behind heated debates on the 'Kish Cypher' (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut...
Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its uncondit...
cena: 721,74

 Security, Design, and Architecture for Broadband and Wireless Network Technologies Naveen Chilamkurti 9781466639027 Information Science Reference
Security, Design, and Architecture for Broadband and Wireless Network Technologies

ISBN: 9781466639027 / Angielski / Twarda / 2013 / 386 str.

ISBN: 9781466639027/Angielski/Twarda/2013/386 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Naveen Chilamkurti
While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there still remains to be a comprehensive understanding of its various dimensions and environments. Security, Design, and Architecture for Broadband and Wireless Network Technologies provides a discussion on the latest research achievements in wireless networks and broadband technology. Highlighting new trends, applications, developments, and standards, this book is essential for next generation researchers and practitioners in the ICT field.
While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there s...
cena: 989,70

Podprzednia  25  26  27  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia