• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Viruses & Malware

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Viruses & Malware

ilość książek w kategorii: 689

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Security: The Human Factor It Governance Publishing 9781849280631 IT Governance
Security: The Human Factor

ISBN: 9781849280631 / Miękka / 72 str.

ISBN: 9781849280631/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul Kearney
Security: The Human Factor looks at the challenges associated with information security, the consequences of failing to meet them and - most importantly - at the steps organisations can take to make themselves and their information more secure.
Security: The Human Factor looks at the challenges associated with information security, the consequences of failing to meet them and - most important...
cena: 75,79

 Computer Viruses and Malware John Aycock 9781441940162 Not Avail
Computer Viruses and Malware

ISBN: 9781441940162 / Angielski / Miękka / 228 str.

ISBN: 9781441940162/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Aycock

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

Computer Viruses and Malware...

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger...

cena: 522,07

 Virtual Chaos: Our Vulnerability to Cyber-Crime and How to Prevent It Rohrbach, Shawn 9780984580149 Authormike Ink
Virtual Chaos: Our Vulnerability to Cyber-Crime and How to Prevent It

ISBN: 9780984580149 / Angielski / Miękka / 288 str.

ISBN: 9780984580149/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shawn Rohrbach
In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, entertainment and communication. Instead of giving complex and intimidating remedies, Rohrbach provides real security solutions any computer user can implement.

You will learn how to:
• Analyze your computer for viruses, malware and spyware
• Protect your children while they use the Internet
• Secure your home and small business wireless network
• Prevent cyber stalking and unwarranted intrusion into your personal life
• Ensure your on...
In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, enterta...
cena: 85,10

 21st Century Chinese Cyberwarfare It Governance 9781849283342 It Governance Ltd
21st Century Chinese Cyberwarfare

ISBN: 9781849283342 / Angielski / Miękka / 328 str.

ISBN: 9781849283342/Angielski/Miękka/328 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
It Governance
Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu (The Art of War), the Thirty-Six Principles from the Warring States...
Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The P...
cena: 303,28

 Worm: The First Digital World War Mark Bowden 9780802145949 Grove Press
Worm: The First Digital World War

ISBN: 9780802145949 / Angielski / Miękka / 264 str.

ISBN: 9780802145949/Angielski/Miękka/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Bowden
The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world.
Surprisingly, the U.S. government was only vaguely aware of the threat that...
The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, tele...
cena: 60,82

 Database Nation: The Death of Privacy in the 21st Century Garfinkel, Simson 9780596001056 0
Database Nation: The Death of Privacy in the 21st Century

ISBN: 9780596001056 / Angielski / Miękka / 338 str.

ISBN: 9780596001056/Angielski/Miękka/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simson Garfinkel

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were...

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video su...

cena: 64,43

 Cuckoo Malware Analysis Digit Oktavianto Iqbal Muhardianto 9781782169239 Packt Publishing
Cuckoo Malware Analysis

ISBN: 9781782169239 / Angielski / Miękka / 142 str.

ISBN: 9781782169239/Angielski/Miękka/142 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Digit Oktavianto; Iqbal Muhardianto
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
cena: 178,75

 Implementing Appfog Nohr, Matthew 9781849698184 Packt Publishing
Implementing Appfog

ISBN: 9781849698184 / Angielski / Miękka / 86 str.

ISBN: 9781849698184/Angielski/Miękka/86 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matthew Nohr
AppFog is the leading platform-as-a-service provider of PHP, Ruby, Node.js, and Java solutions. It is used by developers worldwide to deploy tens of thousands of applications. AppFog delivers a reliable, scalable, and fast platform for deploying applications in the cloud. This book is a hands-on guide that will walk you through creating and deploying applications to the cloud using AppFog, which will allow you to get your application deployed without the hassle of setting up servers. This book demonstrates how to use the AppFog service to build an application and have it running in the Cloud....
AppFog is the leading platform-as-a-service provider of PHP, Ruby, Node.js, and Java solutions. It is used by developers worldwide to deploy tens of t...
cena: 140,44

 Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Elisan, Christopher 9780071823074 McGraw-Hill/Osborne Media
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

ISBN: 9780071823074 / Angielski / Miękka / 384 str.

ISBN: 9780071823074/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Davis; Sean Bodmer; Aaron Lemasters

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion...

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve ...

cena: 277,47

 Android Security Internals Nikolay Elenkov 9781593275815 No Starch Press,US
Android Security Internals

ISBN: 9781593275815 / Angielski / Miękka / 432 str.

ISBN: 9781593275815/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikolay Elenkov
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals--until now.

In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys-tem. Elenkov describes Android security archi-tecture from the bottom up, delving into the imple-mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic...

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h...
cena: 240,93

 Android Malware and Analysis Ken Dunham 9781482252194 Auerbach Publications
Android Malware and Analysis

ISBN: 9781482252194 / Angielski / Twarda / 242 str.

ISBN: 9781482252194/Angielski/Twarda/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ken Dunham

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.
In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and...

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal ma...

cena: 300,52

 Stuxnet: The True Story of Hunt and Evolution Roman Poroshyn 9781499709223 Createspace
Stuxnet: The True Story of Hunt and Evolution

ISBN: 9781499709223 / Angielski / Miękka / 172 str.

ISBN: 9781499709223/Angielski/Miękka/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roman Poroshyn
Computer viruses can be confusing. They can also be fascinating. This book is about a notorious computer virus Stuxnet. You might be wondering: there are so many computer viruses, why Stuxnet? What is so special about the Stuxnet computer worm? Stuxnet never managed to become the biggest, the scariest, or the most sophisticated malware. At the same time, because of some unexpected twists of fate, Stuxnet had become much more than just a computer worm. Stuxnet brought from shadows into spotlight some very serious issues with the Internet security ranging from stolen digital certificates and...
Computer viruses can be confusing. They can also be fascinating. This book is about a notorious computer virus Stuxnet. You might be wondering: there ...
cena: 40,87

 Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements Brian S McWilliams   9781491913710 O'Reilly Media
Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements

ISBN: 9781491913710 / Angielski / Miękka / 372 str.

ISBN: 9781491913710/Angielski/Miękka/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brian S McWilliams

"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings, an investigative look into the shady world of email spammers and the people trying to stop them.

This compelling expose explores the shadowy world of the people responsible for today's junk-email epidemic. Investigative journalist Brian McWilliams delivers a fascinating account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and anti-spam activists.

McWilliams chronicles the activities of several...

"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings

cena: 94,98

 Code of Practice for Cyber Security in the Built Environment Iet 9781849198912 Institution of Engineering & Technology
Code of Practice for Cyber Security in the Built Environment

ISBN: 9781849198912 / Angielski / Miękka / 140 str.

ISBN: 9781849198912/Angielski/Miękka/140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Iet
This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing on building-related systems and all connections to the wider cyber environment. It provides clear practical guidance to help multidisciplinary teams understand how the management of key aspects of cyber security relate to their specific jobs and responsibilities in maintaining the security of a building. It is intended to act as an integral part of an organization's overall management system ensuring the cyber security of building related...
This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing ...
cena: 455,36

 Hyper-V Security Eric Siron Andy Syrewicze  9781782175490 Packt Publishing
Hyper-V Security

ISBN: 9781782175490 / Angielski / Miękka / 184 str.

ISBN: 9781782175490/Angielski/Miękka/184 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Siron;Andy Syrewicze
cena: 140,44

 Getting Started with Windows Server Security Santhosh Sivarajan 9781784398729 Packt Publishing
Getting Started with Windows Server Security

ISBN: 9781784398729 / Angielski / Miękka / 240 str.

ISBN: 9781784398729/Angielski/Miękka/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Santhosh Sivarajan
cena: 208,56

 Cybersecurity Policies and Strategies for Cyberwarfare Prevention Richet Jean-Loup Jean-Loup Richet 9781466684560 Information Science Reference
Cybersecurity Policies and Strategies for Cyberwarfare Prevention

ISBN: 9781466684560 / Angielski / Twarda / 494 str.

ISBN: 9781466684560/Angielski/Twarda/494 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richet Jean-Loup; Jean-Loup Richet
cena: 1238,56

 Information Security & Cybersecurity at the Federal Aviation Administration: Challenges & Control Efforts Victor Morris 9781634833127 Nova Science Publishers Inc
Information Security & Cybersecurity at the Federal Aviation Administration: Challenges & Control Efforts

ISBN: 9781634833127 / Angielski / Twarda / 86 str.

ISBN: 9781634833127/Angielski/Twarda/86 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Victor Morris
cena: 795,00

 Dark Territory: The Secret History of Cyber War  9781476763262 Simon & Schuster
Dark Territory: The Secret History of Cyber War

ISBN: 9781476763262 / Angielski / Miękka / 352 str.

ISBN: 9781476763262/Angielski/Miękka/352 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
"An important, disturbing, and gripping history" (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars--where every country can be a major power player and every hacker a mass destroyer.

In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security....

"An important, disturbing, and gripping history" (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and t...
cena: 75,98

 Robotics + Human-Computer Interaction + Cryptography Kenneth Fraser 9781530180332 Createspace Independent Publishing Platform
Robotics + Human-Computer Interaction + Cryptography

ISBN: 9781530180332 / Angielski / Miękka / 84 str.

ISBN: 9781530180332/Angielski/Miękka/84 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth Fraser
Robotics at its best

Discover A Book That Tells You What You Should Do and How

Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier.

This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Examples are provided for a more knowledgeable approach on your learning

You will also learn the designs and forms of Robotics, and what's more...

Robotics at its best

Discover A Book That Tells You What You Should Do and How

Instead of jumping right into the instruct...

cena: 76,27

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia