• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5049

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Risk Management Framework: A Lab-Based Approach to Securing Information Systems James Broad 9781597499958 0
Risk Management Framework: A Lab-Based Approach to Securing Information Systems

ISBN: 9781597499958 / Angielski / Miękka / 2013 / 316 str.

ISBN: 9781597499958/Angielski/Miękka/2013/316 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Broad

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly...

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation....

cena: 232,95

 Computer Incident Response and Forensics Team Management Leighton Johnson 9781597499965 0
Computer Incident Response and Forensics Team Management

ISBN: 9781597499965 / Angielski / Miękka / 2013 / 334 str.

ISBN: 9781597499965/Angielski/Miękka/2013/334 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Leighton Johnson
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including...

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response...
cena: 218,09

 Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure Knapp, Eric D. 9781597499989 0
Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure

ISBN: 9781597499989 / Angielski / Miękka / 2013 / 202 str.

ISBN: 9781597499989/Angielski/Miękka/2013/202 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Eric Knapp

Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented.

This insight provides a detailed architecture of...

Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and...

cena: 218,09

 Robust Control System Networks: How to Achieve Reliable Control After Stuxnet  Langner 9781606503003 Momentum Press
Robust Control System Networks: How to Achieve Reliable Control After Stuxnet

ISBN: 9781606503003 / Angielski / Twarda / 2011 / 222 str.

ISBN: 9781606503003/Angielski/Twarda/2011/222 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Langner
From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes a new, radical approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves to be "robust." Other security experts advocate risk management, implementing more firewalls and carefully managing passwords and access. Not so this book: those measures, while necessary, can still be circumvented. Instead, this book shows in clear, concise detail how a system that has been set up with an eye toward...
From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes...
cena: 386,69

 Nagios Core Administrators Cookbook Tom Ryder 9781849515566 0
Nagios Core Administrators Cookbook

ISBN: 9781849515566 / Angielski / Miękka / 2012 / 366 str.

ISBN: 9781849515566/Angielski/Miękka/2012/366 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tom Ryder
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major functions on a regular basis. "Nagios Core Administrators Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administrators Guide introduces the reader to methods of extending Nagios Core into a network monitoring solution. The book begins by covering the basic structure of hosts, services, and contacts...
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major funct...
cena: 238,62

 Metasploit Penetration Testing Cookbook Abhinav Singh 9781849517423 0
Metasploit Penetration Testing Cookbook

ISBN: 9781849517423 / Angielski / Miękka / 2012 / 268 str.

ISBN: 9781849517423/Angielski/Miękka/2012/268 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Abhinav Singh
What you will learn from this book Set up a complete penetration testing environment using metasploit and virtual machines Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc. Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes Avail of exclusive coverage of antivirus bypassing techniques using metasploit Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc. Build and...
What you will learn from this book Set up a complete penetration testing environment using metasploit and virtual machines Learn to penetration-test p...
cena: 238,62

 Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Lee Allen 9781849517744 0
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide

ISBN: 9781849517744 / Angielski / Miękka / 2012 / 414 str.

ISBN: 9781849517744/Angielski/Miękka/2012/414 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lee Allen
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration...
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and ...
cena: 286,36

 Net Neutrality: Towards a Co-Regulatory Solution Marsden, Christopher T. 9781849660068 0
Net Neutrality: Towards a Co-Regulatory Solution

ISBN: 9781849660068 / Angielski / Twarda / 2010 / 208 str.

ISBN: 9781849660068/Angielski/Twarda/2010/208 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Christopher T Marsden

Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user's ISP (or another ISP) blocks that access in part or whole. The suggestion has been that the problem can be resolved by either introducing greater competition, or closely policing conditions for vertically integrated service, such as VOIP. However, that is not the whole story, and ISPs, as a whole, have incentives to discriminate between content for matters such as network management of spam, to secure...

Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discr...

cena: 594,91

 Enterprise Security: A Data-Centric Approach to Securing the Enterprise Aaron Woody 9781849685962 0
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

ISBN: 9781849685962 / Angielski / Miękka / 2013 / 324 str.

ISBN: 9781849685962/Angielski/Miękka/2013/324 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Aaron Woody
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must...
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It ...
cena: 212,59

 Introduction to Modern Information Retrieval G G Chowdhury 9781856046947 0
Introduction to Modern Information Retrieval

ISBN: 9781856046947 / Angielski / Miękka / 2010 / 528 str.

ISBN: 9781856046947/Angielski/Miękka/2010/528 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
G G Chowdhury
This textbook, for students of library and information studies undertaking courses in information retrieval, information organization, information use and knowledge-based systems, explains the theory, techniques and tools of traditional approaches to the organization and processing of information.
This textbook, for students of library and information studies undertaking courses in information retrieval, information organization, information use...
cena: 347,04

 Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide Chappell, Laura 9781893939943 0
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide

ISBN: 9781893939943 / Angielski / Miękka / 2012 / 986 str.

ISBN: 9781893939943/Angielski/Miękka/2012/986 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Laura Chappell
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark. Learn to customize Wireshark for faster and more accurate analysis of your network traffic. Build graphs to identify and expose issues such as packet loss, receiver congestion, slow server response, network queuing...
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
cena: 548,46

 Essential Information Security Van Haren Publishing 9789087537364 Van Haren Publishing
Essential Information Security

ISBN: 9789087537364 / Angielski / Miękka / 2013 / 1 str.

ISBN: 9789087537364/Angielski/Miękka/2013/1 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Van Haren Publishing
This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private data private, making sure only the people who are authorized have access to the data, making sure your data is always there, always the way you left it, keeping your secrets secret, making sure you trust your sources, and comply with government and industry regulations and standards. It is about managing your risks and keeping the business going when it all goes south. Every new security practitioner should start with this book, which covers the...
This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private da...
cena: 304,58

 Big Data Management, Technologies, and Applications Valerie Ed. Hu 9781466646995 Information Science Reference
Big Data Management, Technologies, and Applications

ISBN: 9781466646995 / Angielski / Twarda / 2013 / 342 str.

ISBN: 9781466646995/Angielski/Twarda/2013/342 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Valerie Ed. Hu
Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternative management and processing methods have to be created to handle this complex and unstructured data size. Big Data Management, Technologies, and Applications discusses the exponential growth of information size and the innovative methods for data capture, storage, sharing, and analysis for big data. With its prevalence, this collection of articles on big data methodologies and technologies are beneficial for IT workers, researchers, students,...
Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternat...
cena: 901,79

 Profiling Cop-Killers Ann R. Bumbak 9781482211412 CRC Press
Profiling Cop-Killers

ISBN: 9781482211412 / Angielski / Miękka / 2014 / 278 str.

ISBN: 9781482211412/Angielski/Miękka/2014/278 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ann R. Bumbak

Drawing heavily on original research designed to train police officers to survive deadly encounters, Profiling Cop-Killers examines the sociological history, psychology, and motives of 50 murderers of police officers in 2011. The book identifies the commonalities and differences between groups of offenders by age, examining the previously hidden connections between an offender s lethal choices, criminal history, drug and alcohol usage, and interpersonal relationships.

Using Erikson s theory of life span development, the author applies the test of the struggle for...

Drawing heavily on original research designed to train police officers to survive deadly encounters, Profiling Cop-Killers examines the soci...

cena: 143,72

 Practical Paranoia: OS X Security Essentials for Home and Business: The easy step-by-step guide to hardening your OS X security Mintz, Marc L. 9781490458380 Createspace
Practical Paranoia: OS X Security Essentials for Home and Business: The easy step-by-step guide to hardening your OS X security

ISBN: 9781490458380 / Angielski / Miękka / 2013 / 538 str.

ISBN: 9781490458380/Angielski/Miękka/2013/538 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Marc L. Mintz

The best-selling, easiest, step-by-step, comprehensive guide to securing your home or business OS X computers. Completely revised and updated for OS X 10.10, Yosemite. Covers all versions of OS X 10.7-10.10

Official workbook for the Practical Paranoia: Security Essentials Workshop. Designed for both workshop use and self-study. The entire workshop is contained within the book. Includes all instructor presentations, hands-on assignments, links to all software, and security checklist.

You don't need to be paranoid to know they are out there to get your computer, data, and identity....

The best-selling, easiest, step-by-step, comprehensive guide to securing your home or business OS X computers. Completely revised and updated for O...

cena: 203,21

 Google Search Secrets Michael P. Sauers Christa Burns 9781555709235 American Library Association
Google Search Secrets

ISBN: 9781555709235 / Angielski / Miękka / 2013 / 224 str.

ISBN: 9781555709235/Angielski/Miękka/2013/224 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Michael P. Sauers; Christa Burns
Google can be an incredibly powerful tool for research, but the top-of-the-page results are seldom the most beneficial to library users and students, and many of the search engine's most useful features are hidden behind its famously simple interface. Burns and Sauers reveal the secrets of effective Google searches in this invaluable resource showing how to get the most out of the service, with
  • An overview of all the tool's search services, including Image, Maps, News, Blogs, Discussions, Scholar, Patents, and Books
  • Ready-to-use instructions on how to go beyond the simple...
Google can be an incredibly powerful tool for research, but the top-of-the-page results are seldom the most beneficial to library users and students, ...
cena: 218,14

 Mobile Security: How to Secure, Privatize and Recover Your Devices Speed, Timothy 9781849693608 Packt Publishing
Mobile Security: How to Secure, Privatize and Recover Your Devices

ISBN: 9781849693608 / Angielski / Miękka / 2013 / 242 str.

ISBN: 9781849693608/Angielski/Miękka/2013/242 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Timothy Speed; Darla Nykamp; Joseph Anderson
The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don t manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security...
The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your p...
cena: 212,59

 The Internet Police: How Crime Went Online--And the Cops Followed Anderson, Nate 9780393349450 WW Norton & Co
The Internet Police: How Crime Went Online--And the Cops Followed

ISBN: 9780393349450 / Angielski / Miękka / 2014 / 320 str.

ISBN: 9780393349450/Angielski/Miękka/2014/320 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Nate Anderson
With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road.

Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too.

In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find...

With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road....
cena: 67,79

 Cybercrime and Cyberwarfare Bernik, Igor 9781848216716 John Wiley & Sons
Cybercrime and Cyberwarfare

ISBN: 9781848216716 / Angielski / Twarda / 2014 / 176 str.

ISBN: 9781848216716/Angielski/Twarda/2014/176 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Igor Bernik
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.
The first chapter focuses on the understanding of cybercrime, i.e. the...
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fund...
cena: 725,11

 Cuckoo Malware Analysis Digit Oktavianto Iqbal Muhardianto 9781782169239 Packt Publishing
Cuckoo Malware Analysis

ISBN: 9781782169239 / Angielski / Miękka / 2013 / 142 str.

ISBN: 9781782169239/Angielski/Miękka/2013/142 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Digit Oktavianto; Iqbal Muhardianto
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
cena: 182,22

Podprzednia  34  35  36  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia