• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5049

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition Collier, Mark 9780071798761 0
Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition

ISBN: 9780071798761 / Angielski / Miękka / 2013 / 560 str.

ISBN: 9780071798761/Angielski/Miękka/2013/560 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Collier
The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up...

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th...

cena: 236,34

 Oracle Database 12c Install, Configure & Maintain Like a Professional Ian Abramson 9780071799331 0
Oracle Database 12c Install, Configure & Maintain Like a Professional

ISBN: 9780071799331 / Angielski / Miękka / 2013 / 472 str.

ISBN: 9780071799331/Angielski/Miękka/2013/472 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ian Abramson
Master the Fundamentals of Oracle Database 12c

Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core database concepts, the role of the administrator, and enterprise database capabilities. Oracle Database 12c: Install, Configure & Maintain Like a Professional walks you through database configuration, administration, programming, backup and recovery, and high availability. You'll get in-depth introductions to SQL and PL/SQL as well as important information on managing large databases and using Oracle's engineered systems. This essential...

Master the Fundamentals of Oracle Database 12c

Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core dat...

cena: 135,61

 Anti-Hacker Tool Kit, Fourth Edition Mike Shema 9780071800143 0
Anti-Hacker Tool Kit, Fourth Edition

ISBN: 9780071800143 / Angielski / Miękka / 2014 / 624 str.

ISBN: 9780071800143/Angielski/Miękka/2014/624 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mike Shema
Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,...

cena: 213,10

 Hacking Exposed Mobile: Security Secrets & Solutions Bergman, Neil 9780071817011 0
Hacking Exposed Mobile: Security Secrets & Solutions

ISBN: 9780071817011 / Angielski / Miękka / 2013 / 320 str.

ISBN: 9780071817011/Angielski/Miękka/2013/320 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joel Scambray
Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior...

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The autho...

cena: 236,34

 Computer Security: 20 Things Every Employee Should Know Ben Rothke 9780072262827 0
Computer Security: 20 Things Every Employee Should Know

ISBN: 9780072262827 / Angielski / Miękka / 2005 / 64 str.

ISBN: 9780072262827/Angielski/Miękka/2005/64 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ben Rothke
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to keep corporate data and systems secure. This guide includes Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; and E-mail.
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to ke...
cena: 93,09

 The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Winterfeld, Steve 9780124047372 0
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

ISBN: 9780124047372 / Angielski / Miękka / 2012 / 150 str.

ISBN: 9780124047372/Angielski/Miękka/2012/150 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Steve Winterfeld

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks...

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book ex...

cena: 118,93

 Fisma Compliance Handbook: Second Edition Laura Taylor 9780124058712 0
Fisma Compliance Handbook: Second Edition

ISBN: 9780124058712 / Angielski / Miękka / 2013 / 350 str.

ISBN: 9780124058712/Angielski/Miękka/2013/350 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Laura Taylor

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a...

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition ...

cena: 272,62

 Introduction to Cyber-Warfare: A Multidisciplinary Approach Shakarian, Paulo 9780124078147 0
Introduction to Cyber-Warfare: A Multidisciplinary Approach

ISBN: 9780124078147 / Angielski / Miękka / 2013 / 318 str.

ISBN: 9780124078147/Angielski/Miękka/2013/318 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Paulo Shakarian
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.

  • Provides a multi-disciplinary approach to...
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world ...
cena: 183,38

 Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095045 Syngress Media,U.S.
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

ISBN: 9780124095045 / Angielski / Miękka / 2012 / 32 str.

ISBN: 9780124095045/Angielski/Miękka/2012/32 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they...

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.

cena: 114,51

 Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095052 Syngress Media,U.S.
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

ISBN: 9780124095052 / Angielski / Miękka / 2012 / 48 str.

ISBN: 9780124095052/Angielski/Miękka/2012/48 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find...

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Key...

cena: 114,51

 Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095069 Syngress Media,U.S.
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

ISBN: 9780124095069 / Angielski / Miękka / 2012 / 28 str.

ISBN: 9780124095069/Angielski/Miękka/2012/28 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate...

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard....

cena: 114,51

 Crisis Management at the Speed of the Internet: Trend Report Bob Hayes (Managing Director, Security Executive Council; former CSO, Georgia-Pacific), Kathleen Kotwica (Executive vice 9780124115873 Elsevier Science Publishing Co Inc
Crisis Management at the Speed of the Internet: Trend Report

ISBN: 9780124115873 / Angielski / Miękka / 2013 / 36 str.

ISBN: 9780124115873/Angielski/Miękka/2013/36 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Security Executive Council; fo Bob Hayes (Managing Director;Kathleen Kotwica (Executive vice president and chief knowled

Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster--even if the viral information isn't factual. It is critical that an organization respond quickly and decisively to crises in online media.

The report explores examples of companies that have experienced this kind of impact, and describes practical,...

Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful im...

cena: 79,28

 Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Andress, Jason 9780124166721 0
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

ISBN: 9780124166721 / Angielski / Miękka / 2013 / 306 str.

ISBN: 9780124166721/Angielski/Miękka/2013/306 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jason Andress

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to...

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, batt...

cena: 148,68

 Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy Philip Alexander 9780313360077 0
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy

ISBN: 9780313360077 / Angielski / Twarda / 2009 / 160 str.

ISBN: 9780313360077/Angielski/Twarda/2009/160 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Philip Alexander

In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and...

In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and networ...

cena: 313,11

 The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) Cappelli, Dawn 9780321812575 0
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

ISBN: 9780321812575 / Angielski / Twarda / 2012 / 389 str.

ISBN: 9780321812575/Angielski/Twarda/2012/389 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dawn Cappelli
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT(R) Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization.

The...
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed informat...
cena: 295,04

 Managing Information System Security G Dhillon 9780333692608 0
Managing Information System Security

ISBN: 9780333692608 / Angielski / Miękka / 1997 / 224 str.

ISBN: 9780333692608/Angielski/Miękka/1997/224 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
G Dhillon
The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors.
The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mec...
cena: 371,77

 The Internet Police : How Crime Went Online, and the Cops Followed Nate Anderson 9780393062984 0
The Internet Police : How Crime Went Online, and the Cops Followed

ISBN: 9780393062984 / Angielski / Twarda / 2013 / 320 str.

ISBN: 9780393062984/Angielski/Twarda/2013/320 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Nate Anderson
Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too.

In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed.

From the Cleveland man whose "natural male enhancement" pill inadvertently protected...

Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just compu...
cena: 109,54

 Knitting the Semantic Web Jane Greenberg 9780415541565 0
Knitting the Semantic Web

ISBN: 9780415541565 / Angielski / Miękka / 2012 / 274 str.

ISBN: 9780415541565/Angielski/Miękka/2012/274 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jane Greenberg
The Semantic Web, extends the popular, day-to-day Web, enabling computers and people to effectively work together by giving information well-defined meaning. Knitting the Semantic Web explains the interdisciplinary efforts underway to build a more library-like Web through "semantic knitting." The book examines foundation activities and initiatives leading to standardized semantic metadata. These efforts lead to the Semantic Web-a network able to support computational activities and provide people with services efficiently. Leaders in library and information science, computer science,...
The Semantic Web, extends the popular, day-to-day Web, enabling computers and people to effectively work together by giving information well-defined m...
cena: 252,79

 Information Management: An Informing Approach Wijnhoven, Fons 9780415552158 0
Information Management: An Informing Approach

ISBN: 9780415552158 / Angielski / Miękka / 2009 / 174 str.

ISBN: 9780415552158/Angielski/Miękka/2009/174 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fons Wijnhoven

Information and its management is central to modern society. Organizations - private and public, national and international - have recognized that information is a key resource and that its management is critical for success.

Existing books on information management focus on the abilities of computers to process data, the development of information systems, and the management of IT resources. They often start with the computer as a key issue. Although Information Management acknowledges the importance of computers and data communication, it starts from a deeper...

Information and its management is central to modern society. Organizations - private and public, national and international - have recognized that ...

cena: 203,21

 Flexible Pattern Matching in Strings: Practical On-Line Search Algorithms for Texts and Biological Sequences Navarro, Gonzalo 9780521039932 0
Flexible Pattern Matching in Strings: Practical On-Line Search Algorithms for Texts and Biological Sequences

ISBN: 9780521039932 / Angielski / Miękka / 2007 / 232 str.

ISBN: 9780521039932/Angielski/Miękka/2007/232 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Presents recently developed algorithms for searching for simple, multiple and extended strings, regular expressions, exact and approximate matches.
Presents recently developed algorithms for searching for simple, multiple and extended strings, regular expressions, exact and approximate matches.
cena: 341,19

Podprzednia  31  32  33  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia