• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Viruses & Malware

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2356919]
• Literatura piękna
 [1528081]

  więcej...
• Turystyka
 [83198]
• Informatyka
 [206002]
• Komiksy
 [30243]
• Encyklopedie
 [25035]
• Dziecięca
 [521036]
• Hobby
 [129040]
• AudioBooki
 [28122]
• Literatura faktu
 [218008]
• Muzyka CD
 [12315]
• Słowniki
 [2465]
• Inne
 [424627]
• Kalendarze
 [984]
• Podręczniki
 [119807]
• Poradniki
 [474825]
• Religia
 [383511]
• Czasopisma
 [351]
• Sport
 [76671]
• Sztuka
 [206644]
• CD, DVD, Video
 [1791]
• Technologie
 [144579]
• Zdrowie
 [86637]
• Książkowe Klimaty
 [61]
• Puzzle, gry
 [1872]
• Large Print
 [36866]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Viruses & Malware

ilość książek w kategorii: 422

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Mobile Malware Attacks and Defense Ken Dunham 9781597492980
Mobile Malware Attacks and Defense

ISBN: 9781597492980 / Angielski / Miękka / 409 str.

ISBN: 9781597492980/Angielski/Miękka/409 str.

Termin realizacji zamówienia: ok. 22-25 dni roboczych.
Ken Dunham
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the...
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This fir...

    
cena: 227,91 zł

 Cybercrime, Cyberterrorism, and Cyberwarfare Robert T. Mba MS Uda 9781441572172
Cybercrime, Cyberterrorism, and Cyberwarfare

ISBN: 9781441572172 / Angielski / Miękka / 276 str.

ISBN: 9781441572172/Angielski/Miękka/276 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Robert T. Mba MS Uda

    
cena: 84,14 zł

 Least Privilege Security for Windows 7, Vista and XP Russell Smith 9781849680042
Least Privilege Security for Windows 7, Vista and XP

ISBN: 9781849680042 / Angielski / Miękka / 464 str.

ISBN: 9781849680042/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Russell Smith
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...

    
cena: 339,81 zł

 Privacy, Intrusion Detection, and Response : Technologies for Protecting Networks Peyman Kabiri 9781609608361
Privacy, Intrusion Detection, and Response : Technologies for Protecting Networks

ISBN: 9781609608361 / Angielski / Twarda / 292 str.

ISBN: 9781609608361/Angielski/Twarda/292 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Peyman Kabiri
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...

    
cena: 772,96 zł

 The Death of the Internet Markus Jakobsson 9781118062418
The Death of the Internet

ISBN: 9781118062418 / Angielski / Miękka / 386 str.

ISBN: 9781118062418/Angielski/Miękka/386 str.

Termin realizacji zamówienia: ok. 25-30 dni roboczych.
Markus Jakobsson
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue,...
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or ...

    
cena: 340,34 zł

 Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) Marcos Christodont 9780615330150
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)

ISBN: 9780615330150 / Angielski / Miękka / 72 str.

ISBN: 9780615330150/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Marcos Christodonte II
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...

    
cena: 34,09 zł

 # PRIVACY Tweet Book01 : Addressing Privacy Concerns in the Day of Social Media Lori Ruff Rajesh Setty 9781607730880
# PRIVACY Tweet Book01 : Addressing Privacy Concerns in the Day of Social Media

ISBN: 9781607730880 / Angielski / Miękka / 114 str.

ISBN: 9781607730880/Angielski/Miękka/114 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Lori Ruff; Rajesh Setty
Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefore no surprise that privacy online is of such great concern in our connected world. Today, when we conduct so much of our life online--bank transactions, credit card payments, transmission of personal messages and images to friends and family--it is completely understandable that we should be concerned about the privacy of our communication and information.

Privacy concerns in the virtual world are often compounded by lack of information and...

Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefor...

    
cena: 80,02 zł

 The CEO's Manual on Cyber Security James Scott 9780989253598
The CEO's Manual on Cyber Security

ISBN: 9780989253598 / Angielski / Miękka / 244 str.

ISBN: 9780989253598/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Scott
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....

    
cena: 63,19 zł

 Victimware: The Missing Part of the Equation Dmitry Vostokov Software Diagnostics Services 9781908043634
Victimware: The Missing Part of the Equation

ISBN: 9781908043634 / Angielski / Miękka / 28 str.

ISBN: 9781908043634/Angielski/Miękka/28 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dmitry Vostokov;Software Diagnostics Services
Some software components are innocent victims of other component coding mistakes or deliberate subversion and some start as a part of crimeware and malware but eventually become victims themselves (they crash, hang, spike, leak, are dumped, subverted, etc.) This is a transcript of Software Diagnostics Services Webinar about unified malware and victimware analysis by using behavioural and structural patterns including a live memory dump analysis example.
Some software components are innocent victims of other component coding mistakes or deliberate subversion and some start as a part of crimeware and ma...

    
cena: 60,43 zł

 Hacking Walter Spivak 9781365046612
Hacking

ISBN: 9781365046612 / Angielski / Twarda / 176 str.

ISBN: 9781365046612/Angielski/Twarda/176 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Walter Spivak
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.

Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.

Hacking...

    
cena: 168,27 zł

 Malware Narratives: An Introduction Dmitry Vostokov Software Diagnostics Services 9781908043481
Malware Narratives: An Introduction

ISBN: 9781908043481 / Angielski / Miękka / 56 str.

ISBN: 9781908043481/Angielski/Miękka/56 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dmitry Vostokov;Software Diagnostics Services
Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especially in the pattern-driven and pattern-based analysis of software logs from complex systems with millions of events, thousands of threads, hundreds of processes and modules. This is a transcript of Software Diagnostics Services Webinar on the new application of software narratology to malware analysis.
Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especi...

    
cena: 100,01 zł

 Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and Windbg Practice Exercises Dmitry Vostokov Software Diagnostics Services  9781908043443
Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and Windbg Practice Exercises

ISBN: 9781908043443 / Angielski / Miękka / 234 str.

ISBN: 9781908043443/Angielski/Miękka/234 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dmitry Vostokov;Software Diagnostics Services
Learn how to navigate process, kernel and physical spaces and diagnose various malware patterns in Windows memory dump files. We use a unique and innovative pattern-driven analysis approach to speed up the learning curve. The training consists of practical step-by-step hands-on exercises using WinDbg, process, kernel and complete memory dumps. Covered more than 20 malware analysis patterns. The main audience are software technical support and escalation engineers who analyze memory dumps from complex software environments and need to check for possible malware presence in cases of abnormal...
Learn how to navigate process, kernel and physical spaces and diagnose various malware patterns in Windows memory dump files. We use a unique and inno...

    
cena: 396,90 zł

 Android Application Security Essentials Pragati Rai 9781849515603
Android Application Security Essentials

ISBN: 9781849515603 / Angielski / Miękka / 218 str.

ISBN: 9781849515603/Angielski/Miękka/218 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Pragati Rai

    
cena: 256,68 zł

 Reverse Deception: Organized Cyber Threat Counter-Exploitation Sean Bodmer 9780071772495
Reverse Deception: Organized Cyber Threat Counter-Exploitation

ISBN: 9780071772495 / Angielski / Miękka / 464 str.

ISBN: 9780071772495/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sean Bodmer

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and...

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in t...


    
cena: 167,31 zł

 Malware, Rootkits & Botnets A Beginner's Guide Christopher Elisan 9780071792066
Malware, Rootkits & Botnets A Beginner's Guide

ISBN: 9780071792066 / Angielski / Miękka / 353 str.

ISBN: 9780071792066/Angielski/Miękka/353 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Christopher Elisan
Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for...

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the m...


    
cena: 167,31 zł

 Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition Mark Collier 9780071798761
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

ISBN: 9780071798761 / Angielski / Miękka / 531 str.

ISBN: 9780071798761/Angielski/Miękka/531 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Collier
The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up...

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th...


    
cena: 198,98 zł

 Anti-Hacker Tool Kit, Fourth Edition Mike Shema 9780071800143
Anti-Hacker Tool Kit, Fourth Edition

ISBN: 9780071800143 / Angielski / Miękka / 624 str.

ISBN: 9780071800143/Angielski/Miękka/624 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mike Shema
Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,...


    
cena: 198,98 zł

 Hacking Exposed Mobile Joel Scambray 9780071817011
Hacking Exposed Mobile

ISBN: 9780071817011 / Angielski / Miękka / 320 str.

ISBN: 9780071817011/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joel Scambray
Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior...

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The autho...


    
cena: 198,98 zł

 Computer Viruses For Dummies Peter H Gregory 9780764574184
Computer Viruses For Dummies

ISBN: 9780764574184 / Angielski / Miękka / 288 str.

ISBN: 9780764574184/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 22-25 dni roboczych.
Peter H Gregory
Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:

  • Understand the risks and analyze your PC's current condition
  • Select, install, and configure antivirus software
  • Scan your computer and e-mail
  • Rid your computer of viruses it's...
Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in comi...

    
cena: 49,85 zł

 Hacking Made Easy: Hack Your Way Through Life One Step at a Time - Discover the Revolutionary Hacking Secrets of the 21st Century Dr Robot Hacking University 9781532878763
Hacking Made Easy: Hack Your Way Through Life One Step at a Time - Discover the Revolutionary Hacking Secrets of the 21st Century

ISBN: 9781532878763 / Angielski / Miękka / 88 str.

ISBN: 9781532878763/Angielski/Miękka/88 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.

    
cena: 63,36 zł

 1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl
Opinie o Krainaksiazek.pl na Opineo.pl
Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2021 DolnySlask.com Agencja Internetowa

© 1997-2019 DolnySlask.com Agencja Internetowa
Wtyczki do przeglądarki Firefox i IE:
Autor | ISBN13 | Tytuł
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - Płatności Payu
Przechowalnia Przechowalnia