• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5049

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Foundations of Cryptography: Volume 2, Basic Applications Oded Goldreich 9780521119917 0
Foundations of Cryptography: Volume 2, Basic Applications

ISBN: 9780521119917 / Angielski / Miękka / 2009 / 452 str.

ISBN: 9780521119917/Angielski/Miękka/2009/452 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Oded Goldreich
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the...
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of ...
cena: 350,41

 Geometric Spanner Networks Giri Narasimhan 9780521815130 0
Geometric Spanner Networks

ISBN: 9780521815130 / Angielski / Twarda / 2007 / 516 str.

ISBN: 9780521815130/Angielski/Twarda/2007/516 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Giri Narasimhan
Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network Problem to showcase a number of useful algorithmic techniques, data structure strategies, and geometric analysis techniques with many applications, practical and theoretical. The authors present rigorous descriptions of the main algorithms and their analyses for different variations of the Geometric Spanner Network Problem. Though the basic ideas behind most of these algorithms are intuitive, very few are easy to describe and analyze. For most...
Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network...
cena: 663,83

 Data Management for Multimedia Retrieval K Selcuk Candan 9780521887397 0
Data Management for Multimedia Retrieval

ISBN: 9780521887397 / Angielski / Twarda / 2010 / 500 str.

ISBN: 9780521887397/Angielski/Twarda/2010/500 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
K Selcuk Candan
Multimedia data require specialized management techniques because the representations of color, time, semantic concepts, and other underlying information can be drastically different from one another. The user s subjective judgment can also have significant impact on what data or features are relevant in a given context. These factors affect both the performance of the retrieval algorithms and their effectiveness. This textbook on multimedia data management techniques offers a unified perspective on retrieval efficiency and effectiveness. It provides a comprehensive treatment, from basic to...
Multimedia data require specialized management techniques because the representations of color, time, semantic concepts, and other underlying informat...
cena: 288,10

 Practical Unix and Internet Security Garfinkel, Simson 9780596003234 0
Practical Unix and Internet Security

ISBN: 9780596003234 / Angielski / Miękka / 2003 / 988 str.

ISBN: 9780596003234/Angielski/Miękka/2003/988 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Simson Garfinkel

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular...

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host s...

cena: 212,91

 Essential PHP Security Chris Shiflett 9780596006563 0
Essential PHP Security

ISBN: 9780596006563 / Angielski / Miękka / 2005 / 109 str.

ISBN: 9780596006563/Angielski/Miękka/2005/109 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Chris Shiflett

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.

Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of...

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web developm...

cena: 116,05

 Mapping Hacks: Tips & Tools for Electronic Cartography Erle, Schuyler 9780596007034 0
Mapping Hacks: Tips & Tools for Electronic Cartography

ISBN: 9780596007034 / Angielski / Miękka / 2005 / 525 str.

ISBN: 9780596007034/Angielski/Miękka/2005/525 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Schuyler Erle

Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now?Well, they shouldn't. The reality is that map creation, or "cartography," has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the...

Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountai...

cena: 116,05

 Security and Usability: Designing Secure Systems That People Can Use Cranor, Lorrie Faith 9780596008277 0
Security and Usability: Designing Secure Systems That People Can Use

ISBN: 9780596008277 / Angielski / Miękka / 2005 / 740 str.

ISBN: 9780596008277/Angielski/Miękka/2005/740 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Simson Garfinkel

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable...

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts h...

cena: 208,69

 Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance Mather, Tim 9780596802769 0
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance

ISBN: 9780596802769 / Angielski / Miękka / 2009 / 338 str.

ISBN: 9780596802769/Angielski/Miękka/2009/338 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Tim Mather

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.

Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security...

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is?...

cena: 146,07

 This Machine Kills Secrets : How WikiLeakers, Hacktivists, and Cypherpunks Are Freeing the World's Information Andy Greenberg 9780753540510 0
This Machine Kills Secrets : How WikiLeakers, Hacktivists, and Cypherpunks Are Freeing the World's Information

ISBN: 9780753540510 / Angielski / Miękka / 2012 / 384 str.

ISBN: 9780753540510/Angielski/Miękka/2012/384 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Andy Greenberg
From Australia to Iceland - organisations like Wikileaks, Openleaks, and Anonymous are just some of the more familiar groups that are enabling whistleblowers and transforming the next generation's notion of what activism can be. The revolution won't be televised. It'll be online.
From Australia to Iceland - organisations like Wikileaks, Openleaks, and Anonymous are just some of the more familiar groups that are enabling whistle...
cena: 83,44

 Computer Security and Penetration Testing PhD, CISSP, CISA, Mary (Capella University) Brown 9780840020932 Cengage Learning, Inc
Computer Security and Penetration Testing

ISBN: 9780840020932 / Angielski / Miękka / 2013 / 512 str.

ISBN: 9780840020932/Angielski/Miękka/2013/512 str.

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Mary (Capella University) Brown CISA CISSP PhD
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new...
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience level...
cena: 441,86

 Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned Tambe, Milind 9781107096424 0
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned

ISBN: 9781107096424 / Angielski / Twarda / 2011 / 336 str.

ISBN: 9781107096424/Angielski/Twarda/2011/336 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Milind Tambe
Game theory provides a mathematical approach to maximizing limited security resources. This book distills the forefront of this research to provide a study of long-term deployed applications of game theory for key security organizations such as the Los Angeles International Airport police and US Federal Air Marshals Service.
Game theory provides a mathematical approach to maximizing limited security resources. This book distills the forefront of this research to provide a ...
cena: 396,12

 Security Patterns in Practice: Designing Secure Architectures Using Software Patterns Eduardo (Florida Atlantic University, USA) Fernandez-Buglioni 9781119998945 John Wiley & Sons Inc
Security Patterns in Practice: Designing Secure Architectures Using Software Patterns

ISBN: 9781119998945 / Angielski / Twarda / 2013 / 582 str.

ISBN: 9781119998945/Angielski/Twarda/2013/582 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
USA) Fernandez-Buglion Eduardo (Florida Atlantic University
Learn to combine security theory and code to produce secure systems

Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML.

    ...
Learn to combine security theory and code to produce secure systems

Security is clearly a crucial issue to consider during the design and im...

cena: 240,05

 Cyber Fraud: Tactics, Techniques and Procedures Howard, Rick 9781420091274 0
Cyber Fraud: Tactics, Techniques and Procedures

ISBN: 9781420091274 / Angielski / Twarda / 2009 / 520 str.

ISBN: 9781420091274/Angielski/Twarda/2009/520 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rick Howard
Within the past four years, cyber crime has evolved from a minor nuisance to a major concern involving well-organised actors and highly sophisticated organisations. This volume explores the state of threats present in the cyber fraud underground.
Within the past four years, cyber crime has evolved from a minor nuisance to a major concern involving well-organised actors and highly sophisticated ...
cena: 694,06

 The Lure : The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals Stephen Schroeder 9781435457126 0
The Lure : The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals

ISBN: 9781435457126 / Angielski / Miękka / 2011 / 448 str.

ISBN: 9781435457126/Angielski/Miękka/2011/448 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Stephen Schroeder
A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers and academics who wish to learn how to protect systems from abuse, and who wish to respond to network incidents.
A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that c...
cena: 172,16

 The 7 Qualities of Highly Secure Software Mano Paul 9781439814468 0
The 7 Qualities of Highly Secure Software

ISBN: 9781439814468 / Angielski / Twarda / 2012 / 160 str.

ISBN: 9781439814468/Angielski/Twarda/2012/160 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mano Paul

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software.

Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book:

  • Explains...

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software....

cena: 327,15

 Information Security Risk Analysis Thomas R Peltier 9781439839560 0
Information Security Risk Analysis

ISBN: 9781439839560 / Angielski / Twarda / 2010 / 456 str.

ISBN: 9781439839560/Angielski/Twarda/2010/456 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Thomas R Peltier

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization.

Providing access to more than 350 pages of helpful ancillary materials, this volume:

  • Presents and...

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environ...

cena: 669,27

 Communication System Security Lidong Chen 9781439840368 0
Communication System Security

ISBN: 9781439840368 / Angielski / Twarda / 2012 / 750 str.

ISBN: 9781439840368/Angielski/Twarda/2012/750 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lidong Chen

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.

Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms.

...

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how ...

cena: 991,52

 Securing Cloud and Mobility: A Practitioner's Guide Lim, Ian 9781439850558 0
Securing Cloud and Mobility: A Practitioner's Guide

ISBN: 9781439850558 / Angielski / Twarda / 2013 / 228 str.

ISBN: 9781439850558/Angielski/Twarda/2013/228 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ian Lim

Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive coverage that includes network, server, and endpoint security, it provides a strategic view of the security implications of virtualization and cloud computing.

The book begins by deconstructing the terminology of cloud computing. It explains how to...

Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securi...

cena: 381,69

 Computer Security Literacy: Staying Safe in a Digital World Jacobson, Douglas 9781439856185 0
Computer Security Literacy: Staying Safe in a Digital World

ISBN: 9781439856185 / Angielski / Miękka / 2012 / 368 str.

ISBN: 9781439856185/Angielski/Miękka/2012/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Douglas Jacobson

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis.

Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the...

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or...

cena: 272,62

 Introduction to Computer and Network Security: Navigating Shades of Gray Brooks, Richard R. 9781439860717 0
Introduction to Computer and Network Security: Navigating Shades of Gray

ISBN: 9781439860717 / Angielski / Twarda / 2013

ISBN: 9781439860717/Angielski/Twarda/2013

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Richard R. Brooks

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues

Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system...

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues

Taking an interact...

cena: 456,05

Podprzednia  31  32  33  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia