• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Viruses & Malware

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2139965]
• Literatura piękna
 [1463989]

  więcej...
• Turystyka
 [61241]
• Informatyka
 [139065]
• Komiksy
 [25395]
• Encyklopedie
 [22151]
• Dziecięca
 [456720]
• Hobby
 [92140]
• AudioBooki
 [3353]
• Literatura faktu
 [212065]
• Muzyka CD
 [7039]
• Słowniki
 [2087]
• Inne
 [541956]
• Kalendarze
 [662]
• Podręczniki
 [89931]
• Poradniki
 [410678]
• Religia
 [399388]
• Czasopisma
 [553]
• Sport
 [51186]
• Sztuka
 [174006]
• CD, DVD, Video
 [774]
• Technologie
 [147234]
• Zdrowie
 [74607]
• Książkowe Klimaty
 [88]
• Puzzle, gry
 [2696]
• Large Print
 [20523]
• Literatura w języku ukraińskim
 [181]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Viruses & Malware

ilość książek w kategorii: 425

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Managing Security with Snort & IDS Tools Kerry Cox Christopher Gerg 9780596006617 O'Reilly Media
Managing Security with Snort & IDS Tools

ISBN: 9780596006617 / Angielski / Miękka / 269 str.

ISBN: 9780596006617/Angielski/Miękka/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kerry Cox; Christopher Gerg

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the...

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure t...

cena: 162,34 zł

 Technological Turf Wars: A Case Study of the AntiVirus Industry Jessica R. Johnston 9781592138814 Temple University Press
Technological Turf Wars: A Case Study of the AntiVirus Industry

ISBN: 9781592138814 / Angielski / Twarda / 232 str.

ISBN: 9781592138814/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jessica R. Johnston
In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the...
In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, techn...
cena: 337,46 zł

 Technological Turf Wars : A Case Study of the Computer Antivirus Industry Jessica R. Johnston 9781592138821 Temple University Press
Technological Turf Wars : A Case Study of the Computer Antivirus Industry

ISBN: 9781592138821 / Angielski / Miękka / 232 str.

ISBN: 9781592138821/Angielski/Miękka/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jessica R. Johnston
Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives and considers the dynamics within companies by looking at facets such as gender bias and power politics.
Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics a...
cena: 133,86 zł

 Mobile Malware Attacks and Defense Ken Dunham 9781597492980 SYNGRESS MEDIA,U.S.
Mobile Malware Attacks and Defense

ISBN: 9781597492980 / Angielski / Miękka / 409 str.

ISBN: 9781597492980/Angielski/Miękka/409 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ken Dunham
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the...
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This fir...
cena: 235,63 zł

 Constraint-Based Analysis of Security Properties Beata Sarna-Starosta 9783639071863 VDM Verlag
Constraint-Based Analysis of Security Properties

ISBN: 9783639071863 / Angielski / Miękka / 160 str.

ISBN: 9783639071863/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Beata Sarna-Starosta
cena: 370,08 zł

 Cyber-security and Global Information Assurance : Threat Analysis and Response Solutions Kenneth J. Knapp 9781605663265 Information Science Publishing
Cyber-security and Global Information Assurance : Threat Analysis and Response Solutions

ISBN: 9781605663265 / Angielski / Twarda / 460 str.

ISBN: 9781605663265/Angielski/Twarda/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth J. Knapp
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating...
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-securi...
cena: 1195,48 zł

 Cybercrime, Cyberterrorism, and Cyberwarfare Robert T. Mba MS Uda 9781441572172 Xlibris Corporation
Cybercrime, Cyberterrorism, and Cyberwarfare

ISBN: 9781441572172 / Angielski / Miękka / 276 str.

ISBN: 9781441572172/Angielski/Miękka/276 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert T. Mba MS Uda
cena: 96,75 zł

 Least Privilege Security for Windows 7, Vista and XP Russell Smith 9781849680042 Packt Publishing
Least Privilege Security for Windows 7, Vista and XP

ISBN: 9781849680042 / Angielski / Miękka / 464 str.

ISBN: 9781849680042/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Russell Smith
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...
cena: 386,17 zł

 Privacy, Intrusion Detection, and Response : Technologies for Protecting Networks Peyman Kabiri 9781609608361 Information Science Publishing
Privacy, Intrusion Detection, and Response : Technologies for Protecting Networks

ISBN: 9781609608361 / Angielski / Twarda / 292 str.

ISBN: 9781609608361/Angielski/Twarda/292 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peyman Kabiri
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...
cena: 1195,48 zł

 The Psychology of Cyber Crime : Concepts and Principles Grinne Kirwan Andrew Power 9781613503508 Information Science Reference
The Psychology of Cyber Crime : Concepts and Principles

ISBN: 9781613503508 / Angielski / Twarda / 304 str.

ISBN: 9781613503508/Angielski/Twarda/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Grinne Kirwan; Andrew Power
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures.
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers ...
cena: 1195,48 zł

 Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) Marcos Christodont 9780615330150 Proactive Assurance LLC
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)

ISBN: 9780615330150 / Angielski / Miękka / 72 str.

ISBN: 9780615330150/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcos Christodonte II
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...
cena: 38,48 zł

 # PRIVACY Tweet Book01 : Addressing Privacy Concerns in the Day of Social Media Lori Ruff Rajesh Setty 9781607730880 Thinkaha
# PRIVACY Tweet Book01 : Addressing Privacy Concerns in the Day of Social Media

ISBN: 9781607730880 / Angielski / Miękka / 114 str.

ISBN: 9781607730880/Angielski/Miękka/114 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lori Ruff; Rajesh Setty
Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefore no surprise that privacy online is of such great concern in our connected world. Today, when we conduct so much of our life online--bank transactions, credit card payments, transmission of personal messages and images to friends and family--it is completely understandable that we should be concerned about the privacy of our communication and information.

Privacy concerns in the virtual world are often compounded by lack of information and...

Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefor...
cena: 91,96 zł

 The CEO's Manual on Cyber Security James Scott 9780989253598 New Renaissance Corporation
The CEO's Manual on Cyber Security

ISBN: 9780989253598 / Angielski / Miękka / 244 str.

ISBN: 9780989253598/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Scott
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
cena: 72,36 zł

 Hacking Walter Spivak 9781365046612 Lulu.com
Hacking

ISBN: 9781365046612 / Angielski / Twarda / 176 str.

ISBN: 9781365046612/Angielski/Twarda/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Walter Spivak
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.

Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.

Hacking...
cena: 194,73 zł

 Malware Narratives: An Introduction Dmitry Vostokov Software Diagnostics Services 9781908043481 Opentask
Malware Narratives: An Introduction

ISBN: 9781908043481 / Angielski / Miękka / 56 str.

ISBN: 9781908043481/Angielski/Miękka/56 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dmitry Vostokov;Software Diagnostics Services
Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especially in the pattern-driven and pattern-based analysis of software logs from complex systems with millions of events, thousands of threads, hundreds of processes and modules. This is a transcript of Software Diagnostics Services Webinar on the new application of software narratology to malware analysis.
Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especi...
cena: 129,07 zł

 Android Application Security Essentials Pragati Rai 9781849515603 COMPUTER BOOKSHOPS
Android Application Security Essentials

ISBN: 9781849515603 / Angielski / Miękka / 218 str.

ISBN: 9781849515603/Angielski/Miękka/218 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pragati Rai
cena: 288,08 zł

 Reverse Deception: Organized Cyber Threat Counter-Exploitation Sean Bodmer 9780071772495 0
Reverse Deception: Organized Cyber Threat Counter-Exploitation

ISBN: 9780071772495 / Angielski / Miękka / 464 str.

ISBN: 9780071772495/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Bodmer

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and...

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in t...

cena: 193,60 zł

 Malware, Rootkits & Botnets A Beginner's Guide Christopher Elisan 9780071792066 0
Malware, Rootkits & Botnets A Beginner's Guide

ISBN: 9780071792066 / Angielski / Miękka / 432 str.

ISBN: 9780071792066/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Elisan
Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for...

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the m...

cena: 193,60 zł

 Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition Mark Collier 9780071798761 0
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

ISBN: 9780071798761 / Angielski / Miękka / 560 str.

ISBN: 9780071798761/Angielski/Miękka/560 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Collier
The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up...

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th...

cena: 253,52 zł

 Anti-Hacker Tool Kit, Fourth Edition Mike Shema 9780071800143 0
Anti-Hacker Tool Kit, Fourth Edition

ISBN: 9780071800143 / Angielski / Miękka / 624 str.

ISBN: 9780071800143/Angielski/Miękka/624 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Shema
Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,...

cena: 253,52 zł

 1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl
Opinie o Krainaksiazek.pl na Opineo.pl
Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2023 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia