• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Informatyka  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]
• Turystyka
 [52246]
• Informatyka
 [151406]
Programowanie
[16696]
Bazy danych
[38067]
Bezpieczeństwo
[4997]
Sieci komputerowe
[3158]
Internet
[13815]
Grafika komputerowa
[4173]
Sprzęt komputerowy
[2949]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5049

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 String Searching Algorithms Graham A. Stephen   9789810218294 World Scientific Publishing Co Pte Ltd
String Searching Algorithms

ISBN: 9789810218294 / Angielski

ISBN: 9789810218294/Angielski

Termin realizacji zamówienia: ok. 30 dni roboczych.
Graham A. Stephen
String searching is a subject of both theoretical and practical interest in computer science. This book presents a bibliographic overview of the field and an anthology of detailed descriptions of the principal algorithms available. The aim is twofold: on the one hand, to provide an easy-to-read comparison of the available techniques in each area, and on the other, to furnish the reader with a reference of in-depth descriptions of the major algorithms. Topics covered include methods for finding exact and approximate string matches, calculating "edit" distances between strings, finding common...
String searching is a subject of both theoretical and practical interest in computer science. This book presents a bibliographic overview of the field...
cena: 292,50

 Security Careers Stephen Walker 9780128001042 Elsevier Science & Technology
Security Careers

ISBN: 9780128001042 / Angielski / Miękka / 2014 / 224 str.

ISBN: 9780128001042/Angielski/Miękka/2014/224 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Stephen Walker

The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethics occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushee Group, which has been conducting this research since 1980.

Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough...

The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance,...

cena: 342,03

 Cyber Crime Protection for Beginners: The Battle Against Cyber Crime in the 21st Century Felix Taiwo 9781484874066 Createspace
Cyber Crime Protection for Beginners: The Battle Against Cyber Crime in the 21st Century

ISBN: 9781484874066 / Angielski / Miękka / 2013 / 50 str.

ISBN: 9781484874066/Angielski/Miękka/2013/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Felix Taiwo
The widespread use of information and communication technology (ICT) has created a global platform for the exchange of ideas. It has also created boundless opportunities for fraud and deception. Cyber crime is one of the most widespread criminal practices around the globe, whether in the form of violation of company policies, fraud, crime, child pornography, or terrorism. It is therefore paramount that organisations, industries, and individuals raise their game to combat these threats. This is an issue of global importance as researchers, government officials, company executives and law...
The widespread use of information and communication technology (ICT) has created a global platform for the exchange of ideas. It has also created boun...
cena: 32,59

 Assessment of Access Control Systems Nist 9781493756292 Createspace
Assessment of Access Control Systems

ISBN: 9781493756292 / Angielski / Miękka / 2013 / 72 str.

ISBN: 9781493756292/Angielski/Miękka/2013/72 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password mechanism, but many require more sophisticated and complex control. In addition to the authentication mechanism (such as a password), access control is concerned with how authorizations are structured. In some cases, authorization may mirror the structure of the organization, while in others it may be based on the sensitivity level of various...
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense in...
cena: 57,07

 A Framework for Designing Cryptographic Key Management Systems Nist 9781494446055 Createspace
A Framework for Designing Cryptographic Key Management Systems

ISBN: 9781494446055 / Angielski / Miękka / 2013 / 128 str.

ISBN: 9781494446055/Angielski/Miękka/2013/128 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that need to be addressed by the design specification. Thus, any CKMS that addresses each of these requirements would have a design specification that is compliant with this Framework
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing ...
cena: 61,15

 Border Gateway Protocol Security Nist 9781494469733 Createspace
Border Gateway Protocol Security

ISBN: 9781494469733 / Angielski / Miękka / 2013 / 64 str.

ISBN: 9781494469733/Angielski/Miękka/2013/64 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to...
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can hel...
cena: 57,07

 Computer Security Incident Handling Guide Nist 9781494726379 Createspace
Computer Security Incident Handling Guide

ISBN: 9781494726379 / Angielski / Miękka / 2013 / 94 str.

ISBN: 9781494726379/Angielski/Miękka/2013/94 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring computing services. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Topics covered include...
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not...
cena: 57,07

 Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology Kent, Karen 9781494951924 Createspace
Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology

ISBN: 9781494951924 / Angielski / Miękka / 2005 / 126 str.

ISBN: 9781494951924/Angielski/Miękka/2005/126 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sheila Frankel; Karen Kent; Ryan Lewkowski
This publication seeks to assist organizations in mitigating the risks associated with the transmission of sensitive information across networks by providing practical guidance on implementing security services based on Internet Protocol Security (IPsec).
This publication seeks to assist organizations in mitigating the risks associated with the transmission of sensitive information across networks by pr...
cena: 55,85

 Proceedings of Defining the State of the Art in Software Security Tools Workshop Paul E. Black Elizabeth Fong U. S. Department of Commerce 9781494952136 Createspace
Proceedings of Defining the State of the Art in Software Security Tools Workshop

ISBN: 9781494952136 / Angielski / Miękka / 2005 / 116 str.

ISBN: 9781494952136/Angielski/Miękka/2005/116 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Paul E. Black; Elizabeth Fong;U. S. Department of Commerce
This is the proceeding of the workshop on Defining the State of the Art in Software Security Tools held on August 10 and 11, 2005. It was hosted by the Software Diagnostics and Conformance Testing Division, Information Technology Laboratory, at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD, USA.
This is the proceeding of the workshop on Defining the State of the Art in Software Security Tools held on August 10 and 11, 2005. It was hosted by th...
cena: 69,31

 Creating a Patch and Vulnerability Management Program: Recommendations of the National Institute of Standards and Technology (NIST) Bergeron, Tiffany 9781494952259 Createspace
Creating a Patch and Vulnerability Management Program: Recommendations of the National Institute of Standards and Technology (NIST)

ISBN: 9781494952259 / Angielski / Miękka / 2005 / 76 str.

ISBN: 9781494952259/Angielski/Miękka/2005/76 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Peter Mell; Tiffany Bergeron; David Henning
This publication is designed to assist organizations in implementing security patch and vulnerability remediation programs. It focuses on how to create an organizational process and test the effectiveness of the process. It also seeks to inform the reader about the technical solutions that are available for vulnerability remediation.
This publication is designed to assist organizations in implementing security patch and vulnerability remediation programs. It focuses on how to creat...
cena: 39,77

 Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology Peter Mell Karen Kent Joseph Nusbaum 9781494952365 Createspace
Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology

ISBN: 9781494952365 / Angielski / Miękka / 2005 / 100 str.

ISBN: 9781494952365/Angielski/Miękka/2005/100 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Peter Mell; Karen Kent; Joseph Nusbaum
This publication is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. In addition to providing background information on the major categories of malware, it provides practical, real-world guidance on preventing malware incidents and responding to malware incidents in an effective, efficient manner.
This publication is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. I...
cena: 73,38

 Recommendation for Block Cipher Modes of Operation Methods and Techniques Nist 9781495211041 Createspace
Recommendation for Block Cipher Modes of Operation Methods and Techniques

ISBN: 9781495211041 / Angielski / Miękka / 2014 / 70 str.

ISBN: 9781495211041/Angielski/Miękka/2014/70 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
cena: 57,07

 Introduction to Public Key Technology and the Federal PKI Infrastructure Nist 9781495211331 Createspace
Introduction to Public Key Technology and the Federal PKI Infrastructure

ISBN: 9781495211331 / Angielski / Miękka / 2014 / 60 str.

ISBN: 9781495211331/Angielski/Miękka/2014/60 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI functions and their applications. Additional documentation will be required to fully analyze the costs and benefits of PKI systems for agency use, and to develop plans for their implementation. This document provides a starting point and references to more comprehensive publications.
This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be d...
cena: 48,91

 Computer Security: Bibliography Of Selected Computer Security Publications January 1980-October 1989 Nist 9781495242595 Createspace
Computer Security: Bibliography Of Selected Computer Security Publications January 1980-October 1989

ISBN: 9781495242595 / Angielski / Miękka / 2014 / 218 str.

ISBN: 9781495242595/Angielski/Miękka/2014/218 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre-1980 publications is also provided, as well as an appendix containing addresses of...
This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an a...
cena: 61,15

 Disaster Recovery and Business Continuity B. S., Thejendra 9781849285384 Itgp
Disaster Recovery and Business Continuity

ISBN: 9781849285384 / Angielski / Miękka / 2014 / 294 str.

ISBN: 9781849285384/Angielski/Miękka/2014/294 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Thejendra B. S.
Establish a disaster recovery plan and minimise the risks to your business.
Establish a disaster recovery plan and minimise the risks to your business.
cena: 203,92

 Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Elisan, Christopher 9780071823074 McGraw-Hill/Osborne Media
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

ISBN: 9780071823074 / Angielski / Miękka / 2016 / 384 str.

ISBN: 9780071823074/Angielski/Miękka/2016/384 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Davis; Sean Bodmer; Aaron Lemasters

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion...

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve ...

cena: 283,61

 Computer Security Division 2010 Annual Report Nist 9781493763399 Createspace
Computer Security Division 2010 Annual Report

ISBN: 9781493763399 / Angielski / Miękka / 2013 / 70 str.

ISBN: 9781493763399/Angielski/Miękka/2013/70 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year...
cena: 57,07

 Computer Security Division 2011 Annual Report Nist 9781493763450 Createspace
Computer Security Division 2011 Annual Report

ISBN: 9781493763450 / Angielski / Miękka / 2013 / 80 str.

ISBN: 9781493763450/Angielski/Miękka/2013/80 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s Information Technology Laboratory (ITL), is to provide standards and technology that protects information systems against threats to the confidentiality, integrity, and availability of information and services. During Fiscal...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annua...
cena: 57,07

 Creating a Patch and Vulnerability Management Program Nist 9781494729035 Createspace
Creating a Patch and Vulnerability Management Program

ISBN: 9781494729035 / Angielski / Miękka / 2013 / 80 str.

ISBN: 9781494729035/Angielski/Miękka/2013/80 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The primary audience is security managers who are responsible for designing and implementing the program. However, this document also contains information useful to system administrators and operations personnel who are responsible for applying patches and deploying solutions (i.e., information related to testing patches and enterprise patching software).
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The p...
cena: 57,07

 The New York City Police Department: The Impact of Its Policies and Practices John A. Eterno 9781466575844 CRC Press
The New York City Police Department: The Impact of Its Policies and Practices

ISBN: 9781466575844 / Angielski / Miękka / 2014 / 230 str.

ISBN: 9781466575844/Angielski/Miękka/2014/230 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John A. Eterno

Studying the flagship New York City Police Department is critical to understanding policing and democratic society. An examination of the department by experts who have been studying it for years, The New York City Police Department: The Impact of Its Policies and Practices provides a frank and open discussion about the NYPD from an elite group of scholars with varying viewpoints and concerns.

The authors in this book are uniquely qualified to discuss and analyze the intricacies of policies and their impact. Researchers working the streets of Brooklyn expose...

Studying the flagship New York City Police Department is critical to understanding policing and democratic society. An examination of the departmen...

cena: 470,93

Podprzednia  37  38  39  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia