• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5048

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Gomzin, Slava 9781118810118 John Wiley & Sons Inc
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

ISBN: 9781118810118 / Angielski / Miękka / 2014 / 312 str.

ISBN: 9781118810118/Angielski/Miękka/2014/312 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with...

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neim...

cena: 248,88

 Network Security, Firewalls and VPNs Stewart, J. Michael 9781284031676 Jones & Bartlett Publishers
Network Security, Firewalls and VPNs

ISBN: 9781284031676 / Angielski / Miękka / 2013 / 490 str.

ISBN: 9781284031676/Angielski/Miękka/2013/490 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
J. Michael Stewart
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Field, Network Security, Firewalls, And Vpns, Second Edition Provides A Unique, In-Depth Look At The Major Business Challenges And Threats That Are Introduced When An Organization'S Network Is Connected To The Public Internet. Written By An Industry Expert, This Book Provides A Comprehensive Explanation Of Network Security Basics, Including How Hackers Access Online Networks And The Use Of Firewalls And Vpns To Provide Security Countermeasures....
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Fiel...
cena: 398,20

 Hacker Techniques, Tools, and Incident Handling Sean-Philip Oriyano 9781284031713 Jones & Bartlett Publishers
Hacker Techniques, Tools, and Incident Handling

ISBN: 9781284031713 / Angielski / Miękka / 2013 / 500 str.

ISBN: 9781284031713/Angielski/Miękka/2013/500 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Sean-Philip Oriyano
Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Needs To Know About Hackers And Computer Criminals Who Break Into Networks, Steal Information, And Corrupt Data. It Goes On To Review The Technical Overview Of Hacking: How Attacks Target Networks And The Methodology They Follow. The Final Section Studies Those Methods That Are Most Effective When Dealing With Hacking Attacks, Especially In An Age Of Increased Reliance On The Web. Written By A Subject Matter Expert With Numerous Real-World Examples,...
Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Need...
cena: 378,29

 Android Application Security Essentials Pragati Rai 9781849515603 COMPUTER BOOKSHOPS
Android Application Security Essentials

ISBN: 9781849515603 / Angielski / Miękka / 2013 / 218 str.

ISBN: 9781849515603/Angielski/Miękka/2013/218 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Pragati Rai
cena: 214,89

 Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition Joel Scambray 9780071494267 0
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

ISBN: 9780071494267 / Angielski / Miękka / 2007 / 451 str.

ISBN: 9780071494267/Angielski/Miękka/2007/451 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joel Scambray

The latest Windows security attack and defense strategies

"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and...

The latest Windows security attack and defense strategies

"Securing Windows begins with reading this book." --James Costello...

cena: 266,32

 Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line Velte, Toby 9780071599238 0
Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line

ISBN: 9780071599238 / Angielski / Miękka / 2008 / 308 str.

ISBN: 9780071599238/Angielski/Miękka/2008/308 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Toby Velte

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a detailed implementation plan. You will find strategies for reducing power needs, procuring energy from alternative sources, utilizing virtualization technologies, and managing sustainable development. Case studies highlighting successful green IT...

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap f...

cena: 156,66

 Mobile Application Security Himanshu Dwivedi 9780071633567 0
Mobile Application Security

ISBN: 9780071633567 / Angielski / Miękka / 2010 / 432 str.

ISBN: 9780071633567/Angielski/Miękka/2010/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Himanshu Dwivedi
Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this...

Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from th...

cena: 238,91

 Security Information and Event Management (SIEM) Implementation David Miller 9780071701099 0
Security Information and Event Management (SIEM) Implementation

ISBN: 9780071701099 / Angielski / Miękka / 2010 / 464 str.

ISBN: 9780071701099/Angielski/Miękka/2010/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David Miller

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM...

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this author...

cena: 328,99

 Hacking Exposed Web Applications, Third Edition Joel Scrambay 9780071740647 McGraw-Hill Osborne
Hacking Exposed Web Applications, Third Edition

ISBN: 9780071740647 / Angielski / Miękka / 2010 / 482 str.

ISBN: 9780071740647/Angielski/Miękka/2010/482 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joel Scrambay
The latest Web app attacks and countermeasures from world-renowned practitioners

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development...

The latest Web app attacks and countermeasures from world-renowned practitioners

Protect your Web applications from malicious attacks by mastering ...

cena: 254,57

 Designing an IAM Framework with Oracle Identity and Access Management Suite Jeff Scheidel 9780071741378 0
Designing an IAM Framework with Oracle Identity and Access Management Suite

ISBN: 9780071741378 / Angielski / Miękka / 2010 / 368 str.

ISBN: 9780071741378/Angielski/Miękka/2010/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jeff Scheidel
Develop and Implement an End-to-End IAM Solution

Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business...

Develop and Implement an End-to-End IAM Solution

Maintain a high-performance, fully integrated security foundation across your enterprise using the...

cena: 215,41

 Computer Forensics InfoSec Pro Guide David Cowen 9780071742450 0
Computer Forensics InfoSec Pro Guide

ISBN: 9780071742450 / Angielski / Miękka / 2013 / 344 str.

ISBN: 9780071742450/Angielski/Miękka/2013/344 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David Cowen
Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.

You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from...

Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to...

cena: 172,33

 Wireless Network Security a Beginner's Guide Wrightson, Tyler 9780071760942 0
Wireless Network Security a Beginner's Guide

ISBN: 9780071760942 / Angielski / Miękka / 2012 / 368 str.

ISBN: 9780071760942/Angielski/Miękka/2012/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tyler Wrightson
Security Smarts for the Self-Guided IT Professional

Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.

This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks,...

Security Smarts for the Self-Guided IT Professional

Protect wireless networks against all real-world hacks by learning how hackers operate. Wire...

cena: 164,49

 Reverse Deception: Organized Cyber Threat Counter-Exploitation Sean Bodmer 9780071772495 0
Reverse Deception: Organized Cyber Threat Counter-Exploitation

ISBN: 9780071772495 / Angielski / Miękka / 2012 / 464 str.

ISBN: 9780071772495/Angielski/Miękka/2012/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sean Bodmer

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and...

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in t...

cena: 203,66

 Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap Witte, Greg 9780071772518 0
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap

ISBN: 9780071772518 / Angielski / Miękka / 2012 / 288 str.

ISBN: 9780071772518/Angielski/Miękka/2012/288 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Greg Witte

Master the latest digital security automation technologies

Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify vulnerabilities, write customized auditing content, and evaluate compliance across...

Master the latest digital security automation technologies

Achieve a unified view of security across your IT infrastructure using the cut...

cena: 285,90

 Web Application Security Sullivan, Bryan 9780071776165 0
Web Application Security

ISBN: 9780071776165 / Angielski / Miękka / 2011 / 352 str.

ISBN: 9780071776165/Angielski/Miękka/2011/352 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Bryan Sullivan
Security Smarts for the Self-Guided IT Professional

"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc.

Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious...

Security Smarts for the Self-Guided IT Professional

"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess...

cena: 203,66

 Hacking Exposed 7 George Kurtz 9780071780285 McGraw-Hill Education - Europe
Hacking Exposed 7

ISBN: 9780071780285 / Angielski / Miękka / 2012 / 768 str.

ISBN: 9780071780285/Angielski/Miękka/2012/768 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
George Kurtz

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment

"Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the...

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s...

cena: 238,91

 The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk McCarthy, N. K. 9780071790390 0
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

ISBN: 9780071790390 / Angielski / Miękka / 2012 / 240 str.

ISBN: 9780071790390/Angielski/Miękka/2012/240 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
N K McCarthy

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis....

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in ...

cena: 285,90

 Malware, Rootkits & Botnets Elisan, Christopher 9780071792066 0
Malware, Rootkits & Botnets

ISBN: 9780071792066 / Angielski / Miękka / 2012 / 432 str.

ISBN: 9780071792066/Angielski/Miękka/2012/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Christopher Elisan
Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for...

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the m...

cena: 203,66

 Cryptography: Infosec Pro Guide Oriyano, Sean-Philip 9780071794251 0
Cryptography: Infosec Pro Guide

ISBN: 9780071794251 / Angielski / Miękka / 2013 / 320 str.

ISBN: 9780071794251/Angielski/Miękka/2013/320 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sean Philip Oriyano
Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers...

Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings ...

cena: 156,66

 Network Security a Beginner's Guide, Third Edition Maiwald, Eric 9780071795708 0
Network Security a Beginner's Guide, Third Edition

ISBN: 9780071795708 / Angielski / Miękka / 2012 / 336 str.

ISBN: 9780071795708/Angielski/Miękka/2012/336 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Eric Maiwald
Security Smarts for the Self-Guided IT Professional

Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies.

You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption...

Security Smarts for the Self-Guided IT Professional

Defend your network against a wide range of existing and emerging threats. Written by a Certifi...

cena: 191,91

Podprzednia  28  29  30  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia