• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5048

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Mobile Device Security: Threats & Controls Willliam R O'Connor 9781624172540 Nova Science Publishers Inc
Mobile Device Security: Threats & Controls

ISBN: 9781624172540 / Angielski / Miękka / 2013 / 107 str.

ISBN: 9781624172540/Angielski/Miękka/2013/107 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Willliam R O'Connor
cena: 423,05

 WordPress Security: Protection from Hackers Klein, Lambert 9781482537062 Createspace
WordPress Security: Protection from Hackers

ISBN: 9781482537062 / Angielski / Miękka / 2013 / 70 str.

ISBN: 9781482537062/Angielski/Miękka/2013/70 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lambert Klein
IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Steps You Can Take To Secure Your Website And Keep It Virtually Hack-Proof If you're like most people these days, you always go the extra step to keep yourself, your loved ones, and your possessions safe. You probably lock your doors at night... maybe you even have a home security system. You might have a car alarm installed as well. If I looked at your computer, I'd probably find an antivirus and a running firewall. That covers everything, right?...
IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Ste...
cena: 40,92

 Introduction to Information Security Shimeall, Timothy 9781597499699 Elsevier Science
Introduction to Information Security

ISBN: 9781597499699 / Angielski / Miękka / 2013 / 360 str.

ISBN: 9781597499699/Angielski/Miękka/2013/360 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.

Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in...

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the int...

cena: 273,71

 Economic Development, Crime, and Policing: Global Perspectives Garth De Dilip K. Das 9781482204568 CRC Press
Economic Development, Crime, and Policing: Global Perspectives

ISBN: 9781482204568 / Angielski / Twarda / 2014 / 364 str.

ISBN: 9781482204568/Angielski/Twarda/2014/364 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Garth Den Heyer; Dilip K. Das

The 22nd Annual Meeting of the International Police Executive Symposium was held in August 2012 at the United Nations Plaza in New York. Chaired by Dr. Garth den Heyer, the symposium focused on the links between economic development, armed violence, and public safety. Drawn from these proceedings, Economic Development, Crime, and Policing: Global Perspectives presents the insight of police leaders and researchers from a number of countries. They provide worldwide perspectives and case studies about the complex interrelations and influence of these issues on police...

The 22nd Annual Meeting of the International Police Executive Symposium was held in August 2012 at the United Nations Plaza in New York....

cena: 846,18

 E-Book Platforms for Libraries American Library Association 9780838958889 American Library Association
E-Book Platforms for Libraries

ISBN: 9780838958889 / Angielski / Miękka / 2013 / 46 str.

ISBN: 9780838958889/Angielski/Miękka/2013/46 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mirela Roncevic
Library Technology Reports (vol. 49, no. 3) "E-book Platforms for Libraries" provides an overview of the various types of e-book platforms available to academic, research, public, and K-12 librarise in the United States (an beyond). The focus is on the products that house electronic versions of books also available in print. A directory lists platforms and identifies the type of platform, e-books, subject areas, and library market; main subject areas; and business models. Four summary tables help readers compare options.
Library Technology Reports (vol. 49, no. 3) "E-book Platforms for Libraries" provides an overview of the various types of e-book platforms available t...
cena: 242,08

 Untangling the Web: The Nsa's Guide to Gathering Information on Google Nsa 9780984284498 Mastery Files
Untangling the Web: The Nsa's Guide to Gathering Information on Google

ISBN: 9780984284498 / Angielski / Miękka / 2013 / 652 str.

ISBN: 9780984284498/Angielski/Miękka/2013/652 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nsa
Use the internet like a real spy.

Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet. From the basic to the advanced, this 650-page book offers a fascinating look at tricks the "real spies" use to uncover hidden (and not-so-hidden) information online.

Chapters include:

Google hacks
Metasearch sites
Custom search engines
Maps & mapping
Uncovering the invisible internet
Beyond search engines: Specialized research tools
Email lookups
Finding people
Researching companies
A plain english...

Use the internet like a real spy.

Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet...

cena: 175,41

 Unmasking the Social Engineer: The Human Element of Security Christopher Hadnagy 9781118608579 John Wiley & Sons Inc
Unmasking the Social Engineer: The Human Element of Security

ISBN: 9781118608579 / Angielski / Miękka / 2014 / 256 str.

ISBN: 9781118608579/Angielski/Miękka/2014/256 str.

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Christopher Hadnagy

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and...

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focu...

cena: 142,88

 Principles of Wireless Access Pahlavan, Kaveh 9780470697085 John Wiley & Sons
Principles of Wireless Access

ISBN: 9780470697085 / Angielski / Twarda / 2013 / 728 str.

ISBN: 9780470697085/Angielski/Twarda/2013/728 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Kaveh Pahlavan; Prashant Krishnamurthy
Updated to reflect developments in wireless wide, local, and personal area networks, the second edition of Principles of Wireless Networks: A Unified Approach is a comprehensive introductory text that takes a holistic approach to the convergence of wireless and fixed Internet technologies.
Updated to reflect developments in wireless wide, local, and personal area networks, the second edition of Principles of Wireless Networks: A Unified ...
cena: 507,97

 Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation Elias Bachaalany 9781118787311 John Wiley & Sons Inc
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation

ISBN: 9781118787311 / Angielski / Miękka / 2014 / 384 str.

ISBN: 9781118787311/Angielski/Miękka/2014/384 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Elias Bachaalany

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop...

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software a...

cena: 220,06

 Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War Lowe, David 9781466588202 CRC Press
Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War

ISBN: 9781466588202 / Angielski / Twarda / 2013 / 408 str.

ISBN: 9781466588202/Angielski/Twarda/2013/408 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David Lowe; Austin T. Turk; Dilip K. Das

Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offenders. This political violence and terrorism plagues all continents and does not originate solely from jihadist groups. With a view towards developing more effective measures of prevention and resolution, Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War examines political violence in various national and international settings. A collection of works, some previously published as articles in the journal...

Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offen...

cena: 597,30

 A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 Jason Healey Karl Grindal 9780989327404 Cyber Conflict Studies Association
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

ISBN: 9780989327404 / Angielski / Miękka / 2013 / 356 str.

ISBN: 9780989327404/Angielski/Miękka/2013/356 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jason Healey; Karl Grindal
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
cena: 105,27

 A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 Jason Healey Karl Grindal 9780989327411 Cyber Conflict Studies Association
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

ISBN: 9780989327411 / Angielski / Twarda / 2013 / 354 str.

ISBN: 9780989327411/Angielski/Twarda/2013/354 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jason Healey; Karl Grindal
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
cena: 153,53

 System Forensics, Investigation, and Response Chuck Easttom 9781284031058 Jones & Bartlett Publishers
System Forensics, Investigation, and Response

ISBN: 9781284031058 / Angielski / Miękka / 2013 / 315 str.

ISBN: 9781284031058/Angielski/Miękka/2013/315 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Chuck Easttom
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Completely Revised And Rewritten To Keep Pace With The Fast-Paced Field Of Computer Forensics Computer Crimes Call For Forensics Specialists, People Who Know How To Find And Follow The Evidence. System Forensics, Investigation, And Response, Second Edition Begins By Examining The Fundamentals Of System Forensics, Such As What Forensics Is, The Role Of Computer Forensics Specialists, Computer Forensic Evidence, And Application Of Forensic Analysis Skills. It Also Gives An Overview Of Computer Crimes,...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Completely Revised And Rewritten To Keep Pace With The Fast-...
cena: 378,29

 Access Control, Authentication, and Public Key Infrastructure: Print Bundle Chapple, Mike 9781284031591 Jones & Bartlett Publishers
Access Control, Authentication, and Public Key Infrastructure: Print Bundle

ISBN: 9781284031591 / Angielski / Miękka / 2013 / 400 str.

ISBN: 9781284031591/Angielski/Miękka/2013/400 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Bill Ballad
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Access Control Protects Resources Against Unauthorized Viewing, Tampering, Or Destruction. They Serve As A Primary Means Of Ensuring Privacy, Confidentiality, And Prevention Of Unauthorized Disclosure. Revised And Updated With The Latest Data From This Fast Paced Field, Access Control, Authentication, And Public Key Infrastructure Defines The Components Of Access Control, Provides A Business Framework For Implementation, And Discusses Legal...
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Acces...
cena: 378,29

 How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone Cambridge, Rodney D. 9781475097009 Createspace
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone

ISBN: 9781475097009 / Angielski / Miękka / 2012 / 90 str.

ISBN: 9781475097009/Angielski/Miękka/2012/90 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rodney D. Cambridge
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hackers and bad guys are everywhere. They're after your data so they can steal from you and make you a victim of ID theft, credit card fraud, utilities fraud, or worse. But not only can they do this through your PC or laptop, now they can do it all through your iPhone, Android, or Blackberry. Don't let them Many ID theft attempts occur when you're away from home and in unfamiliar surroundings. So when you're visiting that coffee shop with friends,...
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hacker...
cena: 32,85

 The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend Dan Griffin 9781475232707 Createspace
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend

ISBN: 9781475232707 / Angielski / Miękka / 2013 / 126 str.

ISBN: 9781475232707/Angielski/Miękka/2013/126 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dan Griffin
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
cena: 82,20

 Darknet Ecosystems: Surfacing Underground Economies Michael J. Pritchard 9781484077016 Createspace
Darknet Ecosystems: Surfacing Underground Economies

ISBN: 9781484077016 / Angielski / Miękka / 2013 / 184 str.

ISBN: 9781484077016/Angielski/Miękka/2013/184 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael J. Pritchard
The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. The ability to monitor, track and secure information may be organically increased through the perception that group members are getting something "free" out of the exchange of information. This may likely suggest that underground economies could be influenced, when the concept of "free" lowers the perceived market value of "anonymity." This in turn has the effect of surfacing underground economic activity. Evidence may likely suggest that an...
The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. Th...
cena: 151,95

 Cloud Security and Control Dan Griffin 9781469992549 Createspace
Cloud Security and Control

ISBN: 9781469992549 / Angielski / Miękka / 2012 / 82 str.

ISBN: 9781469992549/Angielski/Miękka/2012/82 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dan Griffin
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
cena: 82,20

 Privacy: Select Issues & Laws for the 21st Century Doris B Delrio 9781626184299 Nova Science Publishers Inc
Privacy: Select Issues & Laws for the 21st Century

ISBN: 9781626184299 / Angielski / Twarda / 2013 / 207 str.

ISBN: 9781626184299/Angielski/Twarda/2013/207 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Doris B Delrio
cena: 1368,77

 Threat Modeling: Designing for Security Adam Shostack 9781118809990 John Wiley & Sons Inc
Threat Modeling: Designing for Security

ISBN: 9781118809990 / Angielski / Miękka / 2014 / 624 str.

ISBN: 9781118809990/Angielski/Miękka/2014/624 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Adam Shostack

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches,...

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptograph...

cena: 267,21

Podprzednia  28  29  30  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia