
ilość książek w kategorii: 5049
![]() |
Vmware Vcloud Security
ISBN: 9781782170969 / Angielski / Miękka / 2013 / 114 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own hardware and software. The alternative is to deploy the services you need on a public cloud infrastructure provided by an external supplier such as Amazon Web Services, Rackspace Cloud, or HP Public Cloud. While a public cloud can afford greater flexibility, a private cloud gives you the advantage of greater control over the entire stack. "VMware vCloud Security" focuses on some critical security risks, such as the application level firewall...
Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own...
|
cena:
226,68 |
![]() |
Kali Linux Cookbook
ISBN: 9781783289592 / Angielski / Miękka / 2013 / 260 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. This book outlines a variety of popular tools of penetration testing, and thus serves as a source of information for the security professional and novice alike.
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular ...
|
cena:
368,81 |
![]() |
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online
ISBN: 9780128000113 / Angielski / Miękka / 2013 / 152 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal... Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat o... |
cena:
104,06 |
![]() |
Alfresco for Administrators
ISBN: 9781782175032 / Angielski / Miękka / 2016 / 188 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
143,16 |
![]() |
Pond of Scams
ISBN: 9781532985805 / Angielski / Miękka / 2016 / 90 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
36,41 |
![]() |
SUSE Linux Enterprise Desktop 12 - Security Guide
ISBN: 9789888406609 / Angielski / Miękka / 2016 / 370 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
162,69 |
![]() |
SUSE Linux Enterprise Server 12 - Security Guide
ISBN: 9789888406548 / Angielski / Miękka / 2016 / 434 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
162,69 |
![]() |
Hacking Made Easy: Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century
ISBN: 9781532878763 / Angielski / Miękka / 2016 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,98 |
![]() |
IBM I Security Administration and Compliance
ISBN: 9781583474297 / Angielski / Miękka / 2016 / 448 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
278,78 |
![]() |
Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?
ISBN: 9781532792007 / Angielski / Miękka / 2016 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
73,03 |
![]() |
Intruders at the Gate: Building an Effective Malware Defense System
ISBN: 9781500479572 / Angielski / Miękka / 2014 / 90 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
81,17 |
![]() |
State Fragility Around the World: Fractured Justice and Fierce Reprisal
ISBN: 9781466577671 / Angielski / Twarda / 2016 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics to maintain order and stay in power. State Fragility Around the World: Fractured Justice and Fierce Reprisal analyzes the path to state failure, one manifestation of which appears through the fragility and dysfunction of its criminal justice system. This book examines what happens when a government loses the ability, or will, to provide basic goods and services to its... Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequentl... |
cena:
470,93 |
![]() |
Hacking: Basic Security, Penetration Testing and How to Hack
ISBN: 9781329463158 / Angielski / Twarda / 2015 / 148 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? . This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Within this book's pages, you'll find the answers to these questions and more. Just some of the questions and topics covered include: Penetration Testing Grey Hat Hacking Basic Security Guidelines General Tips Of Computer Safety How to Hack This book...
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking...
|
cena:
156,05 |
![]() |
Crime Prevention: Theory and Practice, Second Edition
ISBN: 9781466577114 / Angielski / Twarda / 2014 / 532 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest research, the most recently published articles and books, and feedback from professors and students using the first edition. Providing an introduction to dominant approaches, key concepts, theories, and research, the book supplies concrete advice on planning, implementing, and evaluating a crime prevention plan. This edition includes a new chapter applying crime prevention through social development principles to adolescents and... In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest res... |
cena:
941,94 |
![]() |
Trends in Corrections: Interviews with Corrections Leaders Around the World, Volume Two
ISBN: 9781466591561 / Angielski / Twarda / 2014 / 310 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system. Presenting transcribed interviews of corrections leaders, it offered a comprehensive survey of correctional programming and management styles used across nations. The general conclusion drawn from the inaugural publication was that the correctional leaders interviewed exhibited striking similarities despite vast differences in the... The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great d... |
cena:
917,15 |
![]() |
Architectures and Protocols for Secure Information Technology Infrastructures
ISBN: 9781466645141 / Angielski / Twarda / 2013 / 427 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making th...
|
cena:
1004,85 |
![]() |
Cloud Computing and Virtualization Technologies in Libraries
ISBN: 9781466646315 / Angielski / Twarda / 2013 / 385 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of technologies utilized, cloud computing and virtual technology has become an advantage for libraries to provide a single efficient system that saves money and time. Cloud Computing and Virtualization Technologies in Libraries highlights the concerns and limitations that need addressed in order to optimize the benefits of cloud computing to the virtualization of libraries. Focusing on the latest innovations and technological advancements, this book...
The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of te...
|
cena:
901,79 |
![]() |
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
ISBN: 9781466646919 / Angielski / Twarda / 2013 / 577 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current... While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
|
cena:
1004,85 |
![]() |
Network Security Technologies: Design and Applications
ISBN: 9781466647893 / Angielski / Twarda / 2013 / 330 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested...
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologie...
|
cena:
1004,85 |
![]() |
Analyzing Security, Trust, and Crime in the Digital World
ISBN: 9781466648562 / Angielski / Twarda / 2013 / 281 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizatio...
|
cena:
1004,85 |