
ilość książek w kategorii: 5049
![]() |
Foundations of Cryptography: Volume 2, Basic Applications
ISBN: 9780521119917 / Angielski / Miękka / 2009 / 452 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the...
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of ...
|
cena:
350,41 |
![]() |
Geometric Spanner Networks
ISBN: 9780521815130 / Angielski / Twarda / 2007 / 516 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network Problem to showcase a number of useful algorithmic techniques, data structure strategies, and geometric analysis techniques with many applications, practical and theoretical. The authors present rigorous descriptions of the main algorithms and their analyses for different variations of the Geometric Spanner Network Problem. Though the basic ideas behind most of these algorithms are intuitive, very few are easy to describe and analyze. For most...
Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network...
|
cena:
663,83 |
![]() |
Data Management for Multimedia Retrieval
ISBN: 9780521887397 / Angielski / Twarda / 2010 / 500 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Multimedia data require specialized management techniques because the representations of color, time, semantic concepts, and other underlying information can be drastically different from one another. The user s subjective judgment can also have significant impact on what data or features are relevant in a given context. These factors affect both the performance of the retrieval algorithms and their effectiveness. This textbook on multimedia data management techniques offers a unified perspective on retrieval efficiency and effectiveness. It provides a comprehensive treatment, from basic to...
Multimedia data require specialized management techniques because the representations of color, time, semantic concepts, and other underlying informat...
|
cena:
288,10 |
![]() |
Practical Unix and Internet Security
ISBN: 9780596003234 / Angielski / Miękka / 2003 / 988 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular... When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host s... |
cena:
212,91 |
![]() |
Essential PHP Security
ISBN: 9780596006563 / Angielski / Miękka / 2005 / 109 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks. Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of... Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web developm... |
cena:
116,05 |
![]() |
Mapping Hacks: Tips & Tools for Electronic Cartography
ISBN: 9780596007034 / Angielski / Miękka / 2005 / 525 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now?Well, they shouldn't. The reality is that map creation, or "cartography," has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the... Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountai... |
cena:
116,05 |
![]() |
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 9780596008277 / Angielski / Miękka / 2005 / 740 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable... Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts h... |
cena:
208,69 |
![]() |
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
ISBN: 9780596802769 / Angielski / Miękka / 2009 / 338 str. Termin realizacji zamówienia: ok. 30 dni roboczych. You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is?... |
cena:
146,07 |
![]() |
This Machine Kills Secrets : How WikiLeakers, Hacktivists, and Cypherpunks Are Freeing the World's Information
ISBN: 9780753540510 / Angielski / Miękka / 2012 / 384 str. Termin realizacji zamówienia: ok. 30 dni roboczych. From Australia to Iceland - organisations like Wikileaks, Openleaks, and Anonymous are just some of the more familiar groups that are enabling whistleblowers and transforming the next generation's notion of what activism can be. The revolution won't be televised. It'll be online.
From Australia to Iceland - organisations like Wikileaks, Openleaks, and Anonymous are just some of the more familiar groups that are enabling whistle...
|
cena:
83,44 |
![]() |
Computer Security and Penetration Testing
ISBN: 9780840020932 / Angielski / Miękka / 2013 / 512 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new...
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience level...
|
cena:
441,86 |
![]() |
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned
ISBN: 9781107096424 / Angielski / Twarda / 2011 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Game theory provides a mathematical approach to maximizing limited security resources. This book distills the forefront of this research to provide a study of long-term deployed applications of game theory for key security organizations such as the Los Angeles International Airport police and US Federal Air Marshals Service.
Game theory provides a mathematical approach to maximizing limited security resources. This book distills the forefront of this research to provide a ...
|
cena:
396,12 |
![]() |
Security Patterns in Practice: Designing Secure Architectures Using Software Patterns
ISBN: 9781119998945 / Angielski / Twarda / 2013 / 582 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Learn to combine security theory and code to produce secure systems
Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML.
Learn to combine security theory and code to produce secure systems
Security is clearly a crucial issue to consider during the design and im... |
cena:
240,05 |
![]() |
Cyber Fraud: Tactics, Techniques and Procedures
ISBN: 9781420091274 / Angielski / Twarda / 2009 / 520 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Within the past four years, cyber crime has evolved from a minor nuisance to a major concern involving well-organised actors and highly sophisticated organisations. This volume explores the state of threats present in the cyber fraud underground.
Within the past four years, cyber crime has evolved from a minor nuisance to a major concern involving well-organised actors and highly sophisticated ...
|
cena:
694,06 |
![]() |
The Lure : The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals
ISBN: 9781435457126 / Angielski / Miękka / 2011 / 448 str. Termin realizacji zamówienia: ok. 30 dni roboczych. A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers and academics who wish to learn how to protect systems from abuse, and who wish to respond to network incidents.
A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that c...
|
cena:
172,16 |
![]() |
The 7 Qualities of Highly Secure Software
ISBN: 9781439814468 / Angielski / Twarda / 2012 / 160 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book:
The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software.... |
cena:
327,15 |
![]() |
Information Security Risk Analysis
ISBN: 9781439839560 / Angielski / Twarda / 2010 / 456 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization. Providing access to more than 350 pages of helpful ancillary materials, this volume:
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environ... |
cena:
669,27 |
![]() |
Communication System Security
ISBN: 9781439840368 / Angielski / Twarda / 2012 / 750 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. ...Helping current and future system designers take a more productive approach in the field, Communication System Security shows how ... |
cena:
991,52 |
![]() |
Securing Cloud and Mobility: A Practitioner's Guide
ISBN: 9781439850558 / Angielski / Twarda / 2013 / 228 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive coverage that includes network, server, and endpoint security, it provides a strategic view of the security implications of virtualization and cloud computing. The book begins by deconstructing the terminology of cloud computing. It explains how to...Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securi... |
cena:
381,69 |
![]() |
Computer Security Literacy: Staying Safe in a Digital World
ISBN: 9781439856185 / Angielski / Miękka / 2012 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis. Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the... Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or... |
cena:
272,62 |
![]() |
Introduction to Computer and Network Security: Navigating Shades of Gray
ISBN: 9781439860717 / Angielski / Twarda / 2013 Termin realizacji zamówienia: ok. 16-18 dni roboczych. Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system... Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interact... |
cena:
456,05 |