• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5049

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Database and Expert Systems Applications  9783031398209 Springer Nature Switzerland
Database and Expert Systems Applications

ISBN: 9783031398209 / Angielski / Miękka / 2023

ISBN: 9783031398209/Angielski/Miękka/2023

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
The two-volume set, LNCS 14146 and 14147 constitutes the thoroughly refereed proceedings of the 34th International Conference on Database and Expert Systems Applications, DEXA 2023, held in Penang, Malaysia, in August 2023.

The 49 full papers presented together with 35 short papers  were carefully reviewed and selected from a total of 155 submissions. The papers are organized in topical sections as follows:

Part I: Data modeling; database design; query optimization; knowledge representation; 

Part II: Rule-based systems; natural language processing; deep...

The two-volume set, LNCS 14146 and 14147 constitutes the thoroughly refereed proceedings of the 34th International Conference on Database and Expert S...
cena: 528,21

 Cyber Crime & Warfare: All That Matters Peter Warren 9781444189988 0
Cyber Crime & Warfare: All That Matters

ISBN: 9781444189988 / Angielski / Miękka / 2013 / 224 str.

ISBN: 9781444189988/Angielski/Miękka/2013/224 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Peter Warren
In Cyber Crime: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage and cyber warfare now pose a major threat to society. After analysing the origins of computer crime among early hackers the authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect at a time when the modern world - including all the communication services and utilities we have come to take for granted - has become utterly dependent on computers...
In Cyber Crime: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular th...
cena: 67,79

 Windows 8 Hacks: Tips & Tools for Unlocking the Power of Tablets and Desktops Gralla, Preston 9781449325756 0
Windows 8 Hacks: Tips & Tools for Unlocking the Power of Tablets and Desktops

ISBN: 9781449325756 / Angielski / Miękka / 2013 / 424 str.

ISBN: 9781449325756/Angielski/Miękka/2013/424 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Preston Gralla

Windows 8 is quite different than previous Microsoft operating systems, but it s still eminently hackable. With this book, you ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that s just the beginning. You ll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you ll also discover why it works.

  • Add folders and other objects to the Start...

Windows 8 is quite different than previous Microsoft operating systems, but it s still eminently hackable. With this book, you ll learn how to make...

cena: 116,19

 Hackers & Painters Paul Graham 9781449389550 O'Reilly Media
Hackers & Painters

ISBN: 9781449389550 / Angielski / Miękka / 2010 / 272 str.

ISBN: 9781449389550/Angielski/Miękka/2010/272 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Paul Graham

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham

We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?

Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by...

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the conseq...

cena: 96,82

 Secure Software Design  Richardson 9781449626327 0
Secure Software Design

ISBN: 9781449626327 / Angielski / Miękka / 2012 / 412 str.

ISBN: 9781449626327/Angielski/Miękka/2012/412 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Richardson
With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state and many have predicted that it will remain so for the foreseeable future. This book seeks to change that opinion by presenting a practical guide to proactive software security. Secure Software Design is written for the student, the developer, and management to bring a new way of thinking to secure software design. The focus of this book is on analyzing risks, understanding likely points of attack, and pre-deciding how your software will deal...
With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state an...
cena: 773,38

 The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System Blunden, Bill 9781449626365 0
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System

ISBN: 9781449626365 / Angielski / Miękka / 2012 / 784 str.

ISBN: 9781449626365/Angielski/Miękka/2012/784 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Blunden
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The...
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It ...
cena: 520,55

 Cyber-Physical Systems: Integrated Computing and Engineering Design Hu, Fei 9781466577008 0
Cyber-Physical Systems: Integrated Computing and Engineering Design

ISBN: 9781466577008 / Angielski / Twarda / 2013 / 398 str.

ISBN: 9781466577008/Angielski/Twarda/2013/398 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fei Hu

Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physical objects, it is believed CPSs will transform how we interact with the physical world, just like the Internet transformed how we interact with one another. A CPS could be a system at multiple scales, from large smart bridges with fluctuation detection and responding functions, to autonomous cars and tiny implanted medical devices.

Cyber-Physical Systems: Integrated Computing and Engineering Design
supplies comprehensive...

Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physica...

cena: 718,85

 Designing Storage for Exchange 2007 SP1 Pierre Bijaoui (Solution Architect, HP Services, France), Juergen Hasslauer (Solution Architect, HP Consulting and Integ 9781555583088 Elsevier Science & Technology
Designing Storage for Exchange 2007 SP1

ISBN: 9781555583088 / Angielski / Miękka / 2008 / 560 str.

ISBN: 9781555583088/Angielski/Miękka/2008/560 str.

Termin realizacji zamówienia: ok. 10-14 dni roboczych.
France) HP Services Pierre Bijaoui (Solution Architect; HP Consulting and Int Juergen Hasslauer (Solution Architect
Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange Server from a 32-bit application to the 64-bit world reduced the I/O footprint on the storage subsystem. This allows users to consider shared storage deployments or go the opposite way and focus on direct attached storage. Supporting large mailboxes is now possible, but how do you back up and recover the increased amount of data? Exchange Server 2007 Continuous...
Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environm...
cena: 86,71

 Network and Application Security: Fundamentals and Practices Ganguly, Debashis 9781578087556 0
Network and Application Security: Fundamentals and Practices

ISBN: 9781578087556 / Angielski / Miękka / 2011 / 160 str.

ISBN: 9781578087556/Angielski/Miękka/2011/160 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Debashis Ganguly

To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks.

Ganguly Debashis speaks...

To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners a...

cena: 470,93

 Sex and the Internet: A Guide Book for Clinicians Cooper, Al 9781583913550 0
Sex and the Internet: A Guide Book for Clinicians

ISBN: 9781583913550 / Angielski / Miękka / 2002 / 304 str.

ISBN: 9781583913550/Angielski/Miękka/2002/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Al Cooper
First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.
First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.
cena: 257,74

 Introduction to Network Security Douglas Jacobson 9781584885436 0
Introduction to Network Security

ISBN: 9781584885436 / Angielski / Twarda / 2008 / 500 str.

ISBN: 9781584885436/Angielski/Twarda/2008/500 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Douglas Jacobson

Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.

The book begins with a brief discussion of network architectures and the functions of layers in a...

Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the recei...

cena: 520,55

 The Practice of Network Security Monitoring Richard Bejtlich 9781593275099 No Starch Press,US
The Practice of Network Security Monitoring

ISBN: 9781593275099 / Angielski / Miękka / 2013 / 341 str.

ISBN: 9781593275099/Angielski/Miękka/2013/341 str.

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Richard Bejtlich
Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy,...

Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most ...
cena: 274,25

 Stealing the Network: How to Own a Shadow Johnny Long (Security Researcher), Timothy Mullen, Ryan Russell (Ryan Russell (aka Blue Boar) has worked in the IT field 9781597490818 Syngress Media,U.S.
Stealing the Network: How to Own a Shadow

ISBN: 9781597490818 / Angielski / Miękka / 2007 / 448 str.

ISBN: 9781597490818/Angielski/Miękka/2007/448 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Johnny Long (Security Researcher);Timothy Mullen;Ryan Russell (Ryan Russell (aka Blue Boar) has worked in the
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In...

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an...
cena: 304,36

 How to Cheat at Securing Linux James Stanger (Member of CompTIA’s Linux+ Advisory Committee, Chair of Linux Professional Institute Advisory Council, Ph 9781597492072 Syngress Media,U.S.
How to Cheat at Securing Linux

ISBN: 9781597492072 / Angielski / Miękka / 2007 / 432 str.

ISBN: 9781597492072/Angielski/Miękka/2007/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Stanger (Member of CompTIA’s Linux+ Advisory Committee
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system.

This book teaches Linux system administrators how to protect their servers from malicious threats.

As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux....

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space ...
cena: 288,09

 Seven Deadliest Social Network Attacks Carl Timm (CCIE, PMP; Regional Director of Security, Savvis, Inc.), Richard Perez 9781597495455 Syngress Media,U.S.
Seven Deadliest Social Network Attacks

ISBN: 9781597495455 / Angielski / Miękka / 2010 / 192 str.

ISBN: 9781597495455/Angielski/Miękka/2010/192 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Savvis PMP; Regional Director of Security Carl Timm (CCIE;Richard Perez

Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make...

Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pin...

cena: 152,48

 thor's microsoft security bible: a collection of practical security techniques  Timothy Mullen 9781597495721 0
thor's microsoft security bible: a collection of practical security techniques

ISBN: 9781597495721 / Angielski / Twarda / 2011 / 315 str.

ISBN: 9781597495721/Angielski/Twarda/2011/315 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Timothy Mullen

Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples.

This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational...

Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical ...

cena: 205,74

 Android Forensics: Investigation, Analysis and Mobile Security for Google Android Hoog, Andrew 9781597496513 0
Android Forensics: Investigation, Analysis and Mobile Security for Google Android

ISBN: 9781597496513 / Angielski / Miękka / 2011 / 432 str.

ISBN: 9781597496513/Angielski/Miękka/2011/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to...

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools yo...

cena: 252,79

 Hacking Web Apps: Detecting and Preventing Web Application Security Problems Shema, Mike 9781597499514 0
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

ISBN: 9781597499514 / Angielski / Miękka / 2012 / 273 str.

ISBN: 9781597499514/Angielski/Miękka/2012/273 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mike Shema

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this...

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web App...

cena: 198,25

 Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Shavers, Brett 9781597499859 0
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

ISBN: 9781597499859 / Angielski / Miękka / 2013 / 320 str.

ISBN: 9781597499859/Angielski/Miękka/2013/320 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Brett Shavers

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in...

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensic...

cena: 218,09

 Unified Communications Forensics: Anatomy of Common Uc Attacks Grant, Nicholas MR 9781597499927 0
Unified Communications Forensics: Anatomy of Common Uc Attacks

ISBN: 9781597499927 / Angielski / Miękka / 2013 / 156 str.

ISBN: 9781597499927/Angielski/Miękka/2013/156 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nicholas Grant

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

- analysis of forensic artifacts in common UC attacks

- an in-depth look at established UC technologies and attack exploits

- hands-on understanding of UC attack vectors...

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate t...

cena: 173,47

Podprzednia  31  32  33  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia