
ilość książek w kategorii: 5049
![]() |
Information and Network Security Management: Strategic Concept Applications
ISBN: 9781491236338 / Angielski / Miękka / 2013 / 396 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students'...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for bo...
|
cena:
455,64 |
![]() |
WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues
ISBN: 9781493555871 / Angielski / Miękka / 2013 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websites that are visited by more than three hundred and seventy one million people each month. Survey website W3Techs reports around seventeen percent of the world's websites are powered by WordPress. Hackers tend to find WordPress to be easy prey, due to its extensive use of plugins, which total more than twenty five thousand. A recent study by Checkmarx found that no less than thirty percent of the top fifty WordPress plugins were determined to...
Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websi...
|
cena:
24,37 |
![]() |
The Zealots Guide To Computer Security 2013
ISBN: 9781484977248 / Angielski / Miękka / 2013 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
|
cena:
81,32 |
![]() |
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit
ISBN: 9783950309317 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obtain all kinds of great media on the Internet, ranging from full-length movies, music files, video clips, ebooks, apps, software programs, images, documents to basically any digital content you can think of. Downloading and sharing torrents can "feel" anonymous, but this is deceptive. Unless you take some extra steps to protect your privacy while downloading and sharing torrents, the prying eyes of unwelcome snoops can eavesdrop, monitor and...
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obta...
|
cena:
21,88 |
![]() |
Network Coding
ISBN: 9781118759578 / Angielski / Digital / CD / DVD / / 2014 / 265 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
394,20 |
![]() |
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o
ISBN: 9781475022797 / Angielski / Miękka / 2011 / 156 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) are often found in the industrial control sectors. ICS are typically used in industries such as electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g.,...
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include su...
|
cena:
97,60 |
![]() |
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security
ISBN: 9781475023732 / Angielski / Miękka / 2012 / 180 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the...
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to estab...
|
cena:
59,36 |
![]() |
Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95
ISBN: 9781475023794 / Angielski / Miękka / 2012 / 132 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA design and development based on Web services. This publication also provides practical, real-world guidance on current and emerging standards applicable to Web services, as well as background information on the most common security threats to SOAs based on Web services. This document presents information that is largely independent of particular hardware platforms, operating systems, and applications. Supplementary security mechanisms (i.e.,...
This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA desi...
|
cena:
85,40 |
![]() |
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special
ISBN: 9781475027747 / Angielski / Miękka / 2012 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information...
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating inter...
|
cena:
64,89 |
![]() |
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92
ISBN: 9781475057652 / Angielski / Miękka / 2012 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of...
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare ...
|
cena:
47,16 |
![]() |
Cybersecurity
ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
|
cena:
56,91 |
![]() |
Cybresecurity: Selected Legal Issues
ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
|
cena:
56,91 |
![]() |
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!
ISBN: 9781494783808 / Angielski / Miękka / 2013 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
|
cena:
60,49 |
![]() |
IBM Smartcloud Essentials
ISBN: 9781782170648 / Angielski / Miękka / 2013 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Use the IBM SmartCloud portfolio for building cloud solutions. Readers can learn how to understand the basic concepts of cloud computing and learn about common cloud standards. The book is full of clearly explained concepts, step-by-step instructions and hands-on exercises.
Use the IBM SmartCloud portfolio for building cloud solutions. Readers can learn how to understand the basic concepts of cloud computing and learn abo...
|
cena:
190,89 |
![]() |
Cyber Infrastructure Protection
ISBN: 9781470064358 / Angielski / Miękka / 2011 / 324 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
97,60 |
![]() |
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology
ISBN: 9781477621059 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
65,05 |
![]() |
Guidelines on Security and Privacy in Public Cloud Computing
ISBN: 9781477621639 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
50,81 |
![]() |
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
ISBN: 9781477650080 / Angielski / Miękka / 2012 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,91 |
![]() |
Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i: Recommendations of the National Institute of Standards and Technology (Specia
ISBN: 9781478166801 / Angielski / Miękka / 2012 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
73,19 |
![]() |
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)
ISBN: 9781478168966 / Angielski / Miękka / 2012 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,91 |