• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5049

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information and Network Security Management: Strategic Concept Applications Dr Richmond S. Adebiaye 9781491236338 Createspace
Information and Network Security Management: Strategic Concept Applications

ISBN: 9781491236338 / Angielski / Miękka / 2013 / 396 str.

ISBN: 9781491236338/Angielski/Miękka/2013/396 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Richmond S. Adebiaye
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students'...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for bo...
cena: 455,64

 WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues Webster, Blake 9781493555871 Createspace
WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues

ISBN: 9781493555871 / Angielski / Miękka / 2013 / 72 str.

ISBN: 9781493555871/Angielski/Miękka/2013/72 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Blake Webster
Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websites that are visited by more than three hundred and seventy one million people each month. Survey website W3Techs reports around seventeen percent of the world's websites are powered by WordPress. Hackers tend to find WordPress to be easy prey, due to its extensive use of plugins, which total more than twenty five thousand. A recent study by Checkmarx found that no less than thirty percent of the top fifty WordPress plugins were determined to...
Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websi...
cena: 24,37

 The Zealots Guide To Computer Security 2013 Taylor, Brian 9781484977248 Createspace
The Zealots Guide To Computer Security 2013

ISBN: 9781484977248 / Angielski / Miękka / 2013 / 32 str.

ISBN: 9781484977248/Angielski/Miękka/2013/32 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Brian Taylor
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
cena: 81,32

 Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit Matthew Bailey 9783950309317 Nerel Publications
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit

ISBN: 9783950309317 / Angielski / Miękka / 2013 / 66 str.

ISBN: 9783950309317/Angielski/Miękka/2013/66 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Matthew Bailey
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obtain all kinds of great media on the Internet, ranging from full-length movies, music files, video clips, ebooks, apps, software programs, images, documents to basically any digital content you can think of. Downloading and sharing torrents can "feel" anonymous, but this is deceptive. Unless you take some extra steps to protect your privacy while downloading and sharing torrents, the prying eyes of unwelcome snoops can eavesdrop, monitor and...
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obta...
cena: 21,88

 
Network Coding

ISBN: 9781118759578 / Angielski / Digital / CD / DVD / / 2014 / 265 str.

ISBN: 9781118759578/Angielski/Digital / CD / DVD //2014/265 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Muriel Médard; Frank H. P. Fitzek; Daniel Lucani
cena: 394,20

 Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o Falco, Joe 9781475022797 Createspace
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o

ISBN: 9781475022797 / Angielski / Miękka / 2011 / 156 str.

ISBN: 9781475022797/Angielski/Miękka/2011/156 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Keith Stouffer; Joe Falco; Karen Scarfone
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) are often found in the industrial control sectors. ICS are typically used in industries such as electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g.,...
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include su...
cena: 97,60

 Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security Pauline Bowen Joan Hash Mark Wilson 9781475023732 Createspace
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security

ISBN: 9781475023732 / Angielski / Miękka / 2012 / 180 str.

ISBN: 9781475023732/Angielski/Miękka/2012/180 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Pauline Bowen; Joan Hash; Mark Wilson
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the...
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to estab...
cena: 59,36

 Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95 Winograd, Theodore 9781475023794 Createspace
Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95

ISBN: 9781475023794 / Angielski / Miękka / 2012 / 132 str.

ISBN: 9781475023794/Angielski/Miękka/2012/132 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Anoop Singhal; Theodore Winograd; Karen Scarfone
This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA design and development based on Web services. This publication also provides practical, real-world guidance on current and emerging standards applicable to Web services, as well as background information on the most common security threats to SOAs based on Web services. This document presents information that is largely independent of particular hardware platforms, operating systems, and applications. Supplementary security mechanisms (i.e.,...
This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA desi...
cena: 85,40

 Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special Hash, Joan 9781475027747 Createspace
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special

ISBN: 9781475027747 / Angielski / Miękka / 2012 / 58 str.

ISBN: 9781475027747/Angielski/Miękka/2012/58 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tim Grance; Joan Hash; Jonathan Smith
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information...
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating inter...
cena: 64,89

 Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92 Karen Kent Murugiah Souppaya 9781475057652 Createspace
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92

ISBN: 9781475057652 / Angielski / Miękka / 2012 / 72 str.

ISBN: 9781475057652/Angielski/Miękka/2012/72 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Karen Kent; Murugiah Souppaya
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of...
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare ...
cena: 47,16

 Cybersecurity Government Accountability Office 9781482383966 Createspace
Cybersecurity

ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str.

ISBN: 9781482383966/Angielski/Miękka/2013/66 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Government Accountability Office
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
cena: 56,91

 Cybresecurity: Selected Legal Issues Edward C. Liu Gina Stevens Kathleen Ann Ruane 9781482384062 Createspace
Cybresecurity: Selected Legal Issues

ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str.

ISBN: 9781482384062/Angielski/Miękka/2013/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edward C. Liu; Gina Stevens; Kathleen Ann Ruane
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
cena: 56,91

 Hackers and Crackers: Cyber-Criminal Have YOU Targeted! Preston, Treat 9781494783808 Createspace
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!

ISBN: 9781494783808 / Angielski / Miękka / 2013 / 162 str.

ISBN: 9781494783808/Angielski/Miękka/2013/162 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Treat Preston
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
cena: 60,49

 IBM Smartcloud Essentials Schouten, Edwin 9781782170648 Packt Publishing
IBM Smartcloud Essentials

ISBN: 9781782170648 / Angielski / Miękka / 2013 / 112 str.

ISBN: 9781782170648/Angielski/Miękka/2013/112 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edwin Schouten
Use the IBM SmartCloud portfolio for building cloud solutions. Readers can learn how to understand the basic concepts of cloud computing and learn about common cloud standards. The book is full of clearly explained concepts, step-by-step instructions and hands-on exercises.
Use the IBM SmartCloud portfolio for building cloud solutions. Readers can learn how to understand the basic concepts of cloud computing and learn abo...
cena: 190,89

 Cyber Infrastructure Protection Tarek Saadawi Louis Jordan 9781470064358 Createspace
Cyber Infrastructure Protection

ISBN: 9781470064358 / Angielski / Miękka / 2011 / 324 str.

ISBN: 9781470064358/Angielski/Miękka/2011/324 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tarek Saadawi; Louis Jordan
cena: 97,60

 Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology Lee Badger Tim Grance Robert Patt-Corner 9781477621059 Createspace
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology

ISBN: 9781477621059 / Angielski / Miękka / 2012 / 82 str.

ISBN: 9781477621059/Angielski/Miękka/2012/82 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lee Badger; Tim Grance; Robert Patt-Corner
cena: 65,05

 Guidelines on Security and Privacy in Public Cloud Computing National Institute of St An Wayne Jansen Timothy Grance 9781477621639 Createspace
Guidelines on Security and Privacy in Public Cloud Computing

ISBN: 9781477621639 / Angielski / Miękka / 2012 / 82 str.

ISBN: 9781477621639/Angielski/Miękka/2012/82 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
National Institute of St And Technology; Wayne Jansen; Timothy Grance
cena: 50,81

 Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement Kristin M. Finklea Catherine a. Theohary 9781477650080 Createspace
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

ISBN: 9781477650080 / Angielski / Miękka / 2012 / 32 str.

ISBN: 9781477650080/Angielski/Miękka/2012/32 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kristin M. Finklea; Catherine a. Theohary
cena: 56,91

 Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i: Recommendations of the National Institute of Standards and Technology (Specia Sheila Frankel Bernard Eydt Les Owens 9781478166801 Createspace
Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i: Recommendations of the National Institute of Standards and Technology (Specia

ISBN: 9781478166801 / Angielski / Miękka / 2012 / 162 str.

ISBN: 9781478166801/Angielski/Miękka/2012/162 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sheila Frankel; Bernard Eydt; Les Owens
cena: 73,19

 Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1) John Padgette Karen Scarfone Lily Chen 9781478168966 Createspace
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)

ISBN: 9781478168966 / Angielski / Miękka / 2012 / 50 str.

ISBN: 9781478168966/Angielski/Miękka/2012/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John Padgette; Karen Scarfone; Lily Chen
cena: 56,91

Podprzednia  37  38  39  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia