• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Viruses & Malware

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Viruses & Malware

ilość książek w kategorii: 688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The Art of Cyber Security: A Practical Guide to Winning the War on Cyber Crime It Governance Publishing 9781787783652 Itgp
The Art of Cyber Security: A Practical Guide to Winning the War on Cyber Crime

ISBN: 9781787783652 / Angielski / Miękka / 218 str.

ISBN: 9781787783652/Angielski/Miękka/218 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gary Hibberd
cena: 200,07

 Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS Stevenson, James 9781399921954 James Stevenson
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS

ISBN: 9781399921954 / Angielski / Miękka / 110 str.

ISBN: 9781399921954/Angielski/Miękka/110 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Stevenson
cena: 102,87

 
Days of Pandemic

ISBN: 9781783825301 / Angielski / Miękka / 54 str.

ISBN: 9781783825301/Angielski/Miękka/54 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Aldred
cena: 91,25

 Fixing American Cybersecurity: Creating a Strategic Public-Private Partnership  9781647121495 Georgetown University Press
Fixing American Cybersecurity: Creating a Strategic Public-Private Partnership

ISBN: 9781647121495 / Angielski / Twarda / 272 str.

ISBN: 9781647121495/Angielski/Twarda/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
cena: 142,88

 Data Exfiltration Malware, Detection, and Prevention Technologies Suaboot, Jakapan 9781119898870 John Wiley and Sons Ltd
Data Exfiltration Malware, Detection, and Prevention Technologies

ISBN: 9781119898870 / Angielski / Twarda / 300 str.

ISBN: 9781119898870/Angielski/Twarda/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zahir Tari
cena: 520,51

 Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2023 Jack W. Plunkett 9781628316346 Plunkett Research, Ltd
Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2023

ISBN: 9781628316346 / Miękka

ISBN: 9781628316346/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jack W. Plunkett
cena: 1604,64

 Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and WinDbg Practice Exercises, Third Edition Dmitry Vostokov, Software Diagnostics Services 9781912636969 Opentask
Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and WinDbg Practice Exercises, Third Edition

ISBN: 9781912636969 / Angielski / Miękka / 326 str.

ISBN: 9781912636969/Angielski/Miękka/326 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dmitry Vostokov;Software Diagnostics Services
cena: 422,61

 7 Rules To Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals Chirag D Joshi 9780648662389 Chirag Joshi
7 Rules To Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals

ISBN: 9780648662389 / Angielski / Miękka / 144 str.

ISBN: 9780648662389/Angielski/Miękka/144 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chirag D Joshi
cena: 75,99

 Intelligent Mobile Malware Detection Roopak Surendran 9780367638719 Taylor & Francis Ltd
Intelligent Mobile Malware Detection

ISBN: 9780367638719 / Angielski / Twarda / 200 str.

ISBN: 9780367638719/Angielski/Twarda/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roopak Surendran
cena: 363,54

 Botnets: Architectures, Countermeasures, and Challenges Georgios Kambourakis Marios Anagnostopoulos Weizhi Meng (Institute for Infocomm Rese 9781032401133 Taylor & Francis Ltd
Botnets: Architectures, Countermeasures, and Challenges

ISBN: 9781032401133 / Angielski / Miękka / 438 str.

ISBN: 9781032401133/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Georgios Kambourakis;Marios Anagnostopoulos;Weizhi Meng (Institute for Infocomm Rese
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including bo...
cena: 227,80

 Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation Routin, David 9781801074292 Packt Publishing Limited
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation

ISBN: 9781801074292 / Angielski / Miękka / 450 str.

ISBN: 9781801074292/Angielski/Miękka/450 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Samuel Rossier
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the or...
cena: 179,25

 
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs

ISBN: 9781803242996 / Angielski / Miękka / 246 str.

ISBN: 9781803242996/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anthony Particini
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. T...
cena: 179,25

 Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Wilhoit, Kyle 9781801814683 Packt Publishing Limited
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

ISBN: 9781801814683 / Angielski / Miękka / 460 str.

ISBN: 9781801814683/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph Opacki
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You'll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their ca...
cena: 200,59

 Cyber Weapons of Mass Psychological Destruction: and the People Who Use Them Sethi, Vikram 9781734818895 Greylander Press, LLC
Cyber Weapons of Mass Psychological Destruction: and the People Who Use Them

ISBN: 9781734818895 / Angielski / Twarda / 280 str.

ISBN: 9781734818895/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vikram Sethi
cena: 190,53

 Advance Cyber Security Manmohan Singh Priyanka Sharma Rahul Sharma 9781774695333 Arcler Press
Advance Cyber Security

ISBN: 9781774695333 / Angielski / Twarda

ISBN: 9781774695333/Angielski/Twarda

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manmohan Singh; Priyanka Sharma; Rahul Sharma
cena: 722,33

 Deadly Odds 5.0 Allen Wyler 9781949267921 Stairway Press
Deadly Odds 5.0

ISBN: 9781949267921 / Angielski / Miękka / 330 str.

ISBN: 9781949267921/Angielski/Miękka/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Allen Wyler
cena: 72,36

 An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments Kushantha Gunawardana 9781801810210 Packt Publishing
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

ISBN: 9781801810210 / Angielski / Miękka / 322 str.

ISBN: 9781801810210/Angielski/Miękka/322 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kushantha Gunawardana
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book DescriptionAs the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to...
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public...
cena: 157,91

 Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response Gerard Johansen 9781803238678 Packt Publishing Limited
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response

ISBN: 9781803238678 / Angielski / Miękka / 532 str.

ISBN: 9781803238678/Angielski/Miękka/532 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerard Johansen
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key Features Create a solid incident response framework and manage cyber incidents effectively Learn to apply digital forensics tools and techniques to investigate cyber threats Explore the real-world threat of ransomware and apply proper incident response techniques for investigation and recovery Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key...
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-wo...
cena: 234,75

 Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes John Paul Mueller 9781804618851 Packt Publishing
Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes

ISBN: 9781804618851 / Angielski

ISBN: 9781804618851/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Paul Mueller
Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be...
Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, pois...
cena: 200,59

 Cyber Threat Hunting AlFardan, Nadhem 9781633439474 Manning Publications
Cyber Threat Hunting

ISBN: 9781633439474 / Angielski

ISBN: 9781633439474/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nadhem AlFardan
Cyber Threat Hunting is a practical guide to the subject giving a reliable and repeatable framework to see and stop attacks. With many key features including ways to design and implement the right framework that will make you see through the eyes of your adversaries, you will learn how to effectively see and stop attacks.
Cyber Threat Hunting is a practical guide to the subject giving a reliable and repeatable framework to see and stop attacks. With many key features in...
cena: 256,10

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia