• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5049

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Conducting Network Penetration and Espionage in a Global Environment Bruce Middleton 9781482206470 Auerbach Publications
Conducting Network Penetration and Espionage in a Global Environment

ISBN: 9781482206470 / Angielski / Twarda / 2014 / 599 str.

ISBN: 9781482206470/Angielski/Twarda/2014/599 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Bruce Middleton

When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.
The book taps into Bruce Middleton s decades...

When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Condu...

cena: 570,12

 Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition Ang, Dennis 9781482230116 CRC Press
Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition

ISBN: 9781482230116 / Angielski / Twarda / 2014 / 241 str.

ISBN: 9781482230116/Angielski/Twarda/2014/241 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Elena Mastors

Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding. The author examines the current state of the terrorist network and describes what groups in the network are doing to recruit, plan, and carry out attacks worldwide.
The book reports on intelligence and counterterror methods being used to garner information on al-Qaeda. It describes how the destabilization of Arab countries has led to opportunities for...

Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, cover...

cena: 366,81

 Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives) Willburn, Michael 9781483963167 Createspace
Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives)

ISBN: 9781483963167 / Angielski / Miękka / 2013 / 130 str.

ISBN: 9781483963167/Angielski/Miękka/2013/130 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Willburn
cena: 44,71

 Instant Ossec Host-Based Intrusion Detection System Lhotsky, Brad 9781782167648 Packt Publishing
Instant Ossec Host-Based Intrusion Detection System

ISBN: 9781782167648 / Angielski / Miękka / 2013 / 62 str.

ISBN: 9781782167648/Angielski/Miękka/2013/62 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Brad Lhotsky
cena: 130,14

 Vmware View Security Essentials Langenhan, Daniel 9781782170082 Packt Publishing
Vmware View Security Essentials

ISBN: 9781782170082 / Angielski / Miękka / 2013 / 130 str.

ISBN: 9781782170082/Angielski/Miękka/2013/130 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Daniel Langenhan
Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered security Secure all your connections between client and desktop
Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered ...
cena: 190,89

 Information Security Management: Global Challenges in the New Millennium Dhillon, Gurpreet S. 9781878289780 Idea Group Publishing
Information Security Management: Global Challenges in the New Millennium

ISBN: 9781878289780 / Angielski / Miękka / 2012 / 196 str.

ISBN: 9781878289780/Angielski/Miękka/2012/196 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gurpreet S. Dhillon; Gurpreet Dhillon
Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This volume offers a compilation of the work of researchers and practitioners addressing issues, trends and challenges facing the management of information security in the third millennium. The book focuses on aspects of information security planning, evaluation, design and implementation.
Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This vol...
cena: 360,45

 Hacking Exposed Computer Forensics Philipp 9780071832502 McGraw-Hill
Hacking Exposed Computer Forensics

ISBN: 9780071832502 / Angielski / Twarda / 2009 / 546 str.

ISBN: 9780071832502/Angielski/Twarda/2009/546 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Philipp
cena: 306,09

 Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics Wyant, R. T. 9781466563032 CRC Press
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics

ISBN: 9781466563032 / Angielski / Twarda / 2014 / 334 str.

ISBN: 9781466563032/Angielski/Twarda/2014/334 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rick T. Wyant; Thomas Burns

Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies. Injury or loss of life can best be avoided if agencies have accurate knowledge and proper training in less lethal options. Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics discusses how lessons learned from major disturbances have helped law enforcement professionals develop concepts and techniques that police departments can apply to increase successful outcomes, manage risk, and limit liability....

Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies....

cena: 520,55

 You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets William Webb 9781490369396 Createspace
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets

ISBN: 9781490369396 / Angielski / Miękka / 2013 / 172 str.

ISBN: 9781490369396/Angielski/Miękka/2013/172 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
William Webb
cena: 40,65

 FAA Computer Security: Recommenations to Address Continuing Weaknesses U. S. General Accounting Office 9781493627431 Createspace
FAA Computer Security: Recommenations to Address Continuing Weaknesses

ISBN: 9781493627431 / Angielski / Miękka / 2000 / 44 str.

ISBN: 9781493627431/Angielski/Miękka/2000/44 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
U. S. General Accounting Office
cena: 60,98

 The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud Francisco Rocha Salvador Abreu Miguel Correia 9780769549781 IEEE Computer Society Press
The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud

ISBN: 9780769549781 / Angielski / Miękka / 2013 / 66 str.

ISBN: 9780769549781/Angielski/Miękka/2013/66 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Francisco Rocha; Salvador Abreu; Miguel Correia
cena: 77,30

 Getting Started with Fortigate Volpe, Fabrizio 9781782178200 Packt Publishing
Getting Started with Fortigate

ISBN: 9781782178200 / Angielski / Miękka / 2013 / 126 str.

ISBN: 9781782178200/Angielski/Miękka/2013/126 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fabrizio Volpe; Fabbri Rosato
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
cena: 143,16

 Introduction to Information Security and ISO 27001: 2013 It Governance Publishing 9781849285261 Itgp
Introduction to Information Security and ISO 27001: 2013

ISBN: 9781849285261 / Angielski / Miękka / 2013 / 56 str.

ISBN: 9781849285261/Angielski/Miękka/2013/56 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
It Governance; Steve G. Watkins
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable and auditable. This pocket guide will help you to: *Make informed decisions. Use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project....
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An ...
cena: 77,26

 Corporate Cyberwar (Mandarin) Dr Michael Teng 9789810713461 Corporate Turnaround Centre Pte Ltd
Corporate Cyberwar (Mandarin)

ISBN: 9789810713461 / Chiński / Miękka / 2012 / 68 str.

ISBN: 9789810713461/Chiński/Miękka/2012/68 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Teng
cena: 81,36

 Corporate Cyberwar Dr Michael Teng 9789810897574 Corporate Turnaround Centre Pte Ltd
Corporate Cyberwar

ISBN: 9789810897574 / Angielski / Miękka / 2011 / 60 str.

ISBN: 9789810897574/Angielski/Miękka/2011/60 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Teng
cena: 81,36

 Detecting and Combating Malicious Email Julie JCH Ryan (Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington Uni 9780128001103 Syngress Media,U.S.
Detecting and Combating Malicious Email

ISBN: 9780128001103 / Angielski / Miękka / 2014 / 94 str.

ISBN: 9780128001103/Angielski/Miękka/2014/94 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Julie JCH Ryan (Associate Professor and Chair of Engineering;Cade Kamachi

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The...

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The p...

cena: 168,76

 Routledge Handbook of Surveillance Studies Kirstie Ball Kevin Haggerty David Lyon 9781138026025 Routledge
Routledge Handbook of Surveillance Studies

ISBN: 9781138026025 / Angielski / Miękka / 2014 / 460 str.

ISBN: 9781138026025/Angielski/Miękka/2014/460 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kirstie Ball; Kevin Haggerty; David Lyon

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative Handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life.

With a collection of over forty essays from the leading names in...

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency...

cena: 327,15

 Transnational Security Marie-Helen Maras 9781466594449 CRC Press
Transnational Security

ISBN: 9781466594449 / Angielski / Twarda / 2014 / 373 str.

ISBN: 9781466594449/Angielski/Twarda/2014/373 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Marie-Helen Maras

Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and institutions around the world. Transnational Security addresses these issues, which are at the forefront of every global security professional s agenda.

This book analyzes the most pressing current transnational security threats, including weapons of mass destruction, terrorism, organized crime, cybercrime, natural disasters,...

Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Prevent...

cena: 594,91

 Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding Fiori, Alessandro 9781466650190 Information Science Reference
Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding

ISBN: 9781466650190 / Angielski / Twarda / 2014 / 363 str.

ISBN: 9781466650190/Angielski/Twarda/2014/363 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fiori
The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able to access the information they desire without having to search through a mountain of unrelated data, so algorithms and methods for effectively seeking out pertinent information are of critical importance. Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding evaluates some of the existing approaches to information retrieval and summarization of digital documents, as well as current research and future...
The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able...
cena: 901,79

 Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques Girod, Robert J. 9781482230727 CRC Press
Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques

ISBN: 9781482230727 / Angielski / Twarda / 2014 / 564 str.

ISBN: 9781482230727/Angielski/Twarda/2014/564 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sr. Robert J. Girod

Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is a covert agent for the government or an identity thief and con man, the methods, practices, tactics, and techniques are often the same and sometimes learned from the same sources. Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques reveals how intelligence officers and investigators conduct their tradecraft. You ll learn how...

Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandes...

cena: 768,42

Podprzednia  34  35  36  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia