
ilość książek w kategorii: 5048
![]() |
Mobile Device Security: Threats & Controls
ISBN: 9781624172540 / Angielski / Miękka / 2013 / 107 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
423,05 |
![]() |
WordPress Security: Protection from Hackers
ISBN: 9781482537062 / Angielski / Miękka / 2013 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Steps You Can Take To Secure Your Website And Keep It Virtually Hack-Proof If you're like most people these days, you always go the extra step to keep yourself, your loved ones, and your possessions safe. You probably lock your doors at night... maybe you even have a home security system. You might have a car alarm installed as well. If I looked at your computer, I'd probably find an antivirus and a running firewall. That covers everything, right?...
IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Ste...
|
cena:
40,92 |
![]() |
Introduction to Information Security
ISBN: 9781597499699 / Angielski / Miękka / 2013 / 360 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in... Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the int... |
cena:
273,71 |
![]() |
Economic Development, Crime, and Policing: Global Perspectives
ISBN: 9781482204568 / Angielski / Twarda / 2014 / 364 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The 22nd Annual Meeting of the International Police Executive Symposium was held in August 2012 at the United Nations Plaza in New York. Chaired by Dr. Garth den Heyer, the symposium focused on the links between economic development, armed violence, and public safety. Drawn from these proceedings, Economic Development, Crime, and Policing: Global Perspectives presents the insight of police leaders and researchers from a number of countries. They provide worldwide perspectives and case studies about the complex interrelations and influence of these issues on police... The 22nd Annual Meeting of the International Police Executive Symposium was held in August 2012 at the United Nations Plaza in New York.... |
cena:
846,18 |
![]() |
E-Book Platforms for Libraries
ISBN: 9780838958889 / Angielski / Miękka / 2013 / 46 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Library Technology Reports (vol. 49, no. 3) "E-book Platforms for Libraries" provides an overview of the various types of e-book platforms available to academic, research, public, and K-12 librarise in the United States (an beyond). The focus is on the products that house electronic versions of books also available in print. A directory lists platforms and identifies the type of platform, e-books, subject areas, and library market; main subject areas; and business models. Four summary tables help readers compare options.
Library Technology Reports (vol. 49, no. 3) "E-book Platforms for Libraries" provides an overview of the various types of e-book platforms available t...
|
cena:
242,08 |
![]() |
Untangling the Web: The Nsa's Guide to Gathering Information on Google
ISBN: 9780984284498 / Angielski / Miękka / 2013 / 652 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet. From the basic to the advanced, this 650-page book offers a fascinating look at tricks the "real spies" use to uncover hidden (and not-so-hidden) information online. Chapters include: Google hacks Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet... |
cena:
175,41 |
![]() |
Unmasking the Social Engineer: The Human Element of Security
ISBN: 9781118608579 / Angielski / Miękka / 2014 / 256 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and... Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focu... |
cena:
142,88 |
![]() |
Principles of Wireless Access
ISBN: 9780470697085 / Angielski / Twarda / 2013 / 728 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Updated to reflect developments in wireless wide, local, and personal area networks, the second edition of Principles of Wireless Networks: A Unified Approach is a comprehensive introductory text that takes a holistic approach to the convergence of wireless and fixed Internet technologies.
Updated to reflect developments in wireless wide, local, and personal area networks, the second edition of Principles of Wireless Networks: A Unified ...
|
cena:
507,97 |
![]() |
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
ISBN: 9781118787311 / Angielski / Miękka / 2014 / 384 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop... Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software a... |
cena:
220,06 |
![]() |
Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War
ISBN: 9781466588202 / Angielski / Twarda / 2013 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offenders. This political violence and terrorism plagues all continents and does not originate solely from jihadist groups. With a view towards developing more effective measures of prevention and resolution, Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War examines political violence in various national and international settings. A collection of works, some previously published as articles in the journal... Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offen... |
cena:
597,30 |
![]() |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327404 / Angielski / Miękka / 2013 / 356 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
cena:
105,27 |
![]() |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327411 / Angielski / Twarda / 2013 / 354 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
cena:
153,53 |
![]() |
System Forensics, Investigation, and Response
ISBN: 9781284031058 / Angielski / Miękka / 2013 / 315 str. Termin realizacji zamówienia: ok. 30 dni roboczych. PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Completely Revised And Rewritten To Keep Pace With The Fast-Paced Field Of Computer Forensics Computer Crimes Call For Forensics Specialists, People Who Know How To Find And Follow The Evidence. System Forensics, Investigation, And Response, Second Edition Begins By Examining The Fundamentals Of System Forensics, Such As What Forensics Is, The Role Of Computer Forensics Specialists, Computer Forensic Evidence, And Application Of Forensic Analysis Skills. It Also Gives An Overview Of Computer Crimes,...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Completely Revised And Rewritten To Keep Pace With The Fast-...
|
cena:
378,29 |
![]() |
Access Control, Authentication, and Public Key Infrastructure: Print Bundle
ISBN: 9781284031591 / Angielski / Miękka / 2013 / 400 str. Termin realizacji zamówienia: ok. 30 dni roboczych. PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Access Control Protects Resources Against Unauthorized Viewing, Tampering, Or Destruction. They Serve As A Primary Means Of Ensuring Privacy, Confidentiality, And Prevention Of Unauthorized Disclosure. Revised And Updated With The Latest Data From This Fast Paced Field, Access Control, Authentication, And Public Key Infrastructure Defines The Components Of Access Control, Provides A Business Framework For Implementation, And Discusses Legal...
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Acces...
|
cena:
378,29 |
![]() |
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone
ISBN: 9781475097009 / Angielski / Miękka / 2012 / 90 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hackers and bad guys are everywhere. They're after your data so they can steal from you and make you a victim of ID theft, credit card fraud, utilities fraud, or worse. But not only can they do this through your PC or laptop, now they can do it all through your iPhone, Android, or Blackberry. Don't let them Many ID theft attempts occur when you're away from home and in unfamiliar surroundings. So when you're visiting that coffee shop with friends,...
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hacker...
|
cena:
32,85 |
![]() |
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
ISBN: 9781475232707 / Angielski / Miękka / 2013 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
|
cena:
82,20 |
![]() |
Darknet Ecosystems: Surfacing Underground Economies
ISBN: 9781484077016 / Angielski / Miękka / 2013 / 184 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. The ability to monitor, track and secure information may be organically increased through the perception that group members are getting something "free" out of the exchange of information. This may likely suggest that underground economies could be influenced, when the concept of "free" lowers the perceived market value of "anonymity." This in turn has the effect of surfacing underground economic activity. Evidence may likely suggest that an...
The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. Th...
|
cena:
151,95 |
![]() |
Cloud Security and Control
ISBN: 9781469992549 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
|
cena:
82,20 |
![]() |
Privacy: Select Issues & Laws for the 21st Century
ISBN: 9781626184299 / Angielski / Twarda / 2013 / 207 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
1368,77 |
![]() |
Threat Modeling: Designing for Security
ISBN: 9781118809990 / Angielski / Miękka / 2014 / 624 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptograph... |
cena:
267,21 |