• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Viruses & Malware

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Viruses & Malware

ilość książek w kategorii: 692

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Managing Security with Snort and IDS Tools Cox, Kerry J. 9780596006617 O'Reilly Media
Managing Security with Snort and IDS Tools

ISBN: 9780596006617 / Angielski / Miękka / 269 str.

ISBN: 9780596006617/Angielski/Miękka/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kerry Cox; Christopher Gerg

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the...

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure t...

cena: 153,53 zł

 Computer Security Basics: Computer Security Lehtinen, Rick 9780596006693 O'Reilly Media
Computer Security Basics: Computer Security

ISBN: 9780596006693 / Angielski / Miękka / 296 str.

ISBN: 9780596006693/Angielski/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rick Lehtinen; Deborah Russell; Sr. G. T. Gangemi

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.



The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security...

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamenta...

cena: 172,89 zł

 Silence On The Wire Michal Zalewski 9781593270469 No Starch Press,US
Silence On The Wire

ISBN: 9781593270469 / Angielski / Miękka / 312 str.

ISBN: 9781593270469/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michal Zalewski

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an...

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. ...

cena: 204,19 zł

 Technological Turf Wars: A Case Study of the AntiVirus Industry Jessica R. Johnston 9781592138814 Temple University Press
Technological Turf Wars: A Case Study of the AntiVirus Industry

ISBN: 9781592138814 / Angielski / Twarda / 232 str.

ISBN: 9781592138814/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jessica R. Johnston
In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the...
In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, techn...
cena: 287,20 zł

 Technological Turf Wars: A Case Study of the Computer AntiVirus Industry Johnston, Jessica R. 9781592138821 Temple University Press
Technological Turf Wars: A Case Study of the Computer AntiVirus Industry

ISBN: 9781592138821 / Angielski / Miękka / 232 str.

ISBN: 9781592138821/Angielski/Miękka/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jessica R. Johnston
Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives and considers the dynamics within companies by looking at facets such as gender bias and power politics.
Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics a...
cena: 111,91 zł

 Mobile Malware Attacks and Defense Ken Dunham 9781597492980 SYNGRESS MEDIA,U.S.
Mobile Malware Attacks and Defense

ISBN: 9781597492980 / Angielski / Miękka / 409 str.

ISBN: 9781597492980/Angielski/Miękka/409 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ken Dunham
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the...
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This fir...
cena: 214,14 zł

 Constraint-based Analysis of Security Properties Sarna-Starosta, Beata 9783639071863 VDM Verlag
Constraint-based Analysis of Security Properties

ISBN: 9783639071863 / Angielski / Miękka / 160 str.

ISBN: 9783639071863/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Beata Sarna-Starosta
cena: 264,53 zł

 Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions Knapp, Kenneth J. 9781605663265 Information Science Publishing
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

ISBN: 9781605663265 / Angielski / Twarda / 460 str.

ISBN: 9781605663265/Angielski/Twarda/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth J. Knapp
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating...
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-securi...
cena: 988,93 zł

 Cybercrime, Cyberterrorism, and Cyberwarfare Robert T. Mba MS Uda 9781441572172 Xlibris Corporation
Cybercrime, Cyberterrorism, and Cyberwarfare

ISBN: 9781441572172 / Angielski / Miękka / 276 str.

ISBN: 9781441572172/Angielski/Miękka/276 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert T. Mba MS Uda
cena: 80,66 zł

 Least Privilege Security for Windows 7, Vista and XP Russell Smith 9781849680042 Packt Publishing
Least Privilege Security for Windows 7, Vista and XP

ISBN: 9781849680042 / Angielski / Miękka / 464 str.

ISBN: 9781849680042/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Russell Smith
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...
cena: 284,04 zł

 Privacy, Intrusion Detection and Response: Technologies for Protecting Networks Kabiri, Peyman 9781609608361 Information Science Publishing
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

ISBN: 9781609608361 / Angielski / Twarda / 292 str.

ISBN: 9781609608361/Angielski/Twarda/292 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peyman Kabiri
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...
cena: 988,93 zł

 The Psychology of Cyber Crime: Concepts and Principles Kirwan, Gráinne 9781613503508 Information Science Reference
The Psychology of Cyber Crime: Concepts and Principles

ISBN: 9781613503508 / Angielski / Twarda / 304 str.

ISBN: 9781613503508/Angielski/Twarda/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Grinne Kirwan; Andrew Power
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures.
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers ...
cena: 996,68 zł

 The Death of the Internet Markus Jakobsson 9781118062418 IEEE Computer Society Press
The Death of the Internet

ISBN: 9781118062418 / Angielski / Miękka / 386 str.

ISBN: 9781118062418/Angielski/Miękka/386 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Markus Jakobsson
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue,...
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or ...
cena: 382,85 zł

 Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) Marcos Christodont 9780615330150 Proactive Assurance LLC
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)

ISBN: 9780615330150 / Angielski / Miękka / 72 str.

ISBN: 9780615330150/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcos Christodonte II
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...
cena: 32,08 zł

 The CEO's Manual on Cyber Security James Scott 9780989253598 New Renaissance Corporation
The CEO's Manual on Cyber Security

ISBN: 9780989253598 / Angielski / Miękka / 244 str.

ISBN: 9780989253598/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Scott
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
cena: 60,32 zł

 Hacking Walter Spivak 9781365046612 Lulu.com
Hacking

ISBN: 9781365046612 / Angielski / Twarda / 176 str.

ISBN: 9781365046612/Angielski/Twarda/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Walter Spivak
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.

Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.

Hacking...
cena: 152,80 zł

 Android Malware Xuxian Jiang Yajin Zhou 9781461473930 Springer
Android Malware

ISBN: 9781461473930 / Angielski / Miękka / 44 str.

ISBN: 9781461473930/Angielski/Miękka/44 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xuxian Jiang; Yajin Zhou

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns.

Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history,...

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their succe...

cena: 201,72 zł

 Android Application Security Essentials Pragati Rai 9781849515603 COMPUTER BOOKSHOPS
Android Application Security Essentials

ISBN: 9781849515603 / Angielski / Miękka / 218 str.

ISBN: 9781849515603/Angielski/Miękka/218 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pragati Rai
cena: 210,86 zł

 Reverse Deception: Organized Cyber Threat Counter-Exploitation Sean Bodmer 9780071772495 0
Reverse Deception: Organized Cyber Threat Counter-Exploitation

ISBN: 9780071772495 / Angielski / Miękka / 464 str.

ISBN: 9780071772495/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Bodmer

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and...

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in t...

cena: 199,84 zł

 Hacking Exposed 7 George Kurtz 9780071780285 McGraw-Hill Education - Europe
Hacking Exposed 7

ISBN: 9780071780285 / Angielski / Miękka / 768 str.

ISBN: 9780071780285/Angielski/Miękka/768 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Kurtz

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment

"Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the...

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s...

cena: 234,42 zł

 1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia