
ilość książek w kategorii: 5049
![]() |
Database and Expert Systems Applications
ISBN: 9783031398209 / Angielski / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. The two-volume set, LNCS 14146 and 14147 constitutes the thoroughly refereed proceedings of the 34th International Conference on Database and Expert Systems Applications, DEXA 2023, held in Penang, Malaysia, in August 2023. The 49 full papers presented together with 35 short papers were carefully reviewed and selected from a total of 155 submissions. The papers are organized in topical sections as follows: Part I: Data modeling; database design; query optimization; knowledge representation; Part II: Rule-based systems; natural language processing; deep... The two-volume set, LNCS 14146 and 14147 constitutes the thoroughly refereed proceedings of the 34th International Conference on Database and Expert S...
|
cena:
528,21 |
![]() |
Cyber Crime & Warfare: All That Matters
ISBN: 9781444189988 / Angielski / Miękka / 2013 / 224 str. Termin realizacji zamówienia: ok. 30 dni roboczych. In Cyber Crime: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage and cyber warfare now pose a major threat to society. After analysing the origins of computer crime among early hackers the authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect at a time when the modern world - including all the communication services and utilities we have come to take for granted - has become utterly dependent on computers...
In Cyber Crime: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular th...
|
cena:
67,79 |
![]() |
Windows 8 Hacks: Tips & Tools for Unlocking the Power of Tablets and Desktops
ISBN: 9781449325756 / Angielski / Miękka / 2013 / 424 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Windows 8 is quite different than previous Microsoft operating systems, but it s still eminently hackable. With this book, you ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that s just the beginning. You ll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you ll also discover why it works.
Windows 8 is quite different than previous Microsoft operating systems, but it s still eminently hackable. With this book, you ll learn how to make... |
cena:
116,19 |
![]() |
Hackers & Painters
ISBN: 9781449389550 / Angielski / Miękka / 2010 / 272 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by... "The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the conseq... |
cena:
96,82 |
![]() |
Secure Software Design
ISBN: 9781449626327 / Angielski / Miękka / 2012 / 412 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state and many have predicted that it will remain so for the foreseeable future. This book seeks to change that opinion by presenting a practical guide to proactive software security. Secure Software Design is written for the student, the developer, and management to bring a new way of thinking to secure software design. The focus of this book is on analyzing risks, understanding likely points of attack, and pre-deciding how your software will deal...
With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state an...
|
cena:
773,38 |
![]() |
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System
ISBN: 9781449626365 / Angielski / Miękka / 2012 / 784 str. Termin realizacji zamówienia: ok. 30 dni roboczych. While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The...
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It ...
|
cena:
520,55 |
![]() |
Cyber-Physical Systems: Integrated Computing and Engineering Design
ISBN: 9781466577008 / Angielski / Twarda / 2013 / 398 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physical objects, it is believed CPSs will transform how we interact with the physical world, just like the Internet transformed how we interact with one another. A CPS could be a system at multiple scales, from large smart bridges with fluctuation detection and responding functions, to autonomous cars and tiny implanted medical devices. Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physica... |
cena:
718,85 |
![]() |
Designing Storage for Exchange 2007 SP1
ISBN: 9781555583088 / Angielski / Miękka / 2008 / 560 str. Termin realizacji zamówienia: ok. 10-14 dni roboczych. Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange Server from a 32-bit application to the 64-bit world reduced the I/O footprint on the storage subsystem. This allows users to consider shared storage deployments or go the opposite way and focus on direct attached storage. Supporting large mailboxes is now possible, but how do you back up and recover the increased amount of data? Exchange Server 2007 Continuous...
Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environm...
|
cena:
86,71 |
![]() |
Network and Application Security: Fundamentals and Practices
ISBN: 9781578087556 / Angielski / Miękka / 2011 / 160 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks. Ganguly Debashis speaks...To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners a... |
cena:
470,93 |
![]() |
Sex and the Internet: A Guide Book for Clinicians
ISBN: 9781583913550 / Angielski / Miękka / 2002 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.
First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.
|
cena:
257,74 |
![]() |
Introduction to Network Security
ISBN: 9781584885436 / Angielski / Twarda / 2008 / 500 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack. The book begins with a brief discussion of network architectures and the functions of layers in a... Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the recei... |
cena:
520,55 |
![]() |
The Practice of Network Security Monitoring
ISBN: 9781593275099 / Angielski / Miękka / 2013 / 341 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy,...
Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most ...
|
cena:
274,25 |
![]() |
Stealing the Network: How to Own a Shadow
ISBN: 9781597490818 / Angielski / Miękka / 2007 / 448 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In...
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an...
|
cena:
304,36 |
![]() |
How to Cheat at Securing Linux
ISBN: 9781597492072 / Angielski / Miękka / 2007 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats. As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux....
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space ...
|
cena:
288,09 |
![]() |
Seven Deadliest Social Network Attacks
ISBN: 9781597495455 / Angielski / Miękka / 2010 / 192 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make... Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pin... |
cena:
152,48 |
![]() |
thor's microsoft security bible: a collection of practical security techniques
ISBN: 9781597495721 / Angielski / Twarda / 2011 / 315 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples. This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational... Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical ... |
cena:
205,74 |
![]() |
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
ISBN: 9781597496513 / Angielski / Miękka / 2011 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to... Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools yo... |
cena:
252,79 |
![]() |
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
ISBN: 9781597499514 / Angielski / Miękka / 2012 / 273 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this... How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web App... |
cena:
198,25 |
![]() |
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
ISBN: 9781597499859 / Angielski / Miękka / 2013 / 320 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in... Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensic... |
cena:
218,09 |
![]() |
Unified Communications Forensics: Anatomy of Common Uc Attacks
ISBN: 9781597499927 / Angielski / Miękka / 2013 / 156 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: - analysis of forensic artifacts in common UC attacks - an in-depth look at established UC technologies and attack exploits - hands-on understanding of UC attack vectors... Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate t... |
cena:
173,47 |