• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Viruses & Malware

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Viruses & Malware

ilość książek w kategorii: 692

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Malware, Rootkits & Botnets Elisan, Christopher 9780071792066 0
Malware, Rootkits & Botnets

ISBN: 9780071792066 / Angielski / Miękka / 432 str.

ISBN: 9780071792066/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Elisan
Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for...

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the m...

cena: 199,84 zł

 Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition Collier, Mark 9780071798761 0
Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition

ISBN: 9780071798761 / Angielski / Miękka / 560 str.

ISBN: 9780071798761/Angielski/Miękka/560 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Collier
The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up...

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th...

cena: 234,42 zł

 Anti-Hacker Tool Kit, Fourth Edition Mike Shema 9780071800143 0
Anti-Hacker Tool Kit, Fourth Edition

ISBN: 9780071800143 / Angielski / Miękka / 624 str.

ISBN: 9780071800143/Angielski/Miękka/624 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Shema
Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,...

cena: 211,37 zł

 Hacking Exposed Mobile: Security Secrets & Solutions Bergman, Neil 9780071817011 0
Hacking Exposed Mobile: Security Secrets & Solutions

ISBN: 9780071817011 / Angielski / Miękka / 320 str.

ISBN: 9780071817011/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joel Scambray
Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior...

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The autho...

cena: 234,42 zł

 Computer Viruses for Dummies Gregory, Peter H. 9780764574184 0
Computer Viruses for Dummies

ISBN: 9780764574184 / Angielski / Miękka / 288 str.

ISBN: 9780764574184/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter H Gregory
Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:

  • Understand the risks and analyze your PC's current condition
  • Select, install, and configure antivirus software
  • Scan your computer and e-mail
  • Rid your computer of viruses it's...
Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in comi...
cena: 51,19 zł

 Hacking Made Easy: Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century University, Hacking 9781532878763 Createspace Independent Publishing Platform
Hacking Made Easy: Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century

ISBN: 9781532878763 / Angielski / Miękka / 88 str.

ISBN: 9781532878763/Angielski/Miękka/88 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dr Robot; Hacking University
cena: 60,49 zł

 You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets William Webb 9781490369396 Createspace
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets

ISBN: 9781490369396 / Angielski / Miękka / 172 str.

ISBN: 9781490369396/Angielski/Miękka/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
William Webb
cena: 40,31 zł

 Android Security Cookbook Keith Makan 9781782167167 Packt Publishing
Android Security Cookbook

ISBN: 9781782167167 / Angielski / Miękka / 350 str.

ISBN: 9781782167167/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keith Makan
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Overview * Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems* Develop custom vulnerability assessment tools using the Drozer Android Security Assessment Framework* Reverse-engineer Android applications for security vulnerabilities* Protect your Android application with up to date hardening techniques In Detail Android Security Cookbook discusses many common...
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Overv...
cena: 210,86 zł

 Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware Sood, Aditya 9780128006047 SYNGRESS MEDIA
Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware

ISBN: 9780128006047 / Angielski / Miękka / 158 str.

ISBN: 9780128006047/Angielski/Miękka/158 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aditya Sood

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.

Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of...

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Ta...

cena: 116,78 zł

 Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices Amiri   9780128022221 Syngress Publishing
Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices

ISBN: 9780128022221 / Angielski / Miękka / 72 str.

ISBN: 9780128022221/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Amiri

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with...

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technolo...

cena: 233,60 zł

 Corporate Security Crossroads: Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment Richard J. Chasdi 9781440832857 Praeger
Corporate Security Crossroads: Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment

ISBN: 9781440832857 / Angielski / Twarda / 242 str.

ISBN: 9781440832857/Angielski/Twarda/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard J. Chasdi

Multinational corporations are on the front lines of terrorism and cyberattacks--two of world's biggest threats to global security. How can corporate leaders mitigate their organizations' risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment.

This compelling work is organized into seven...

Multinational corporations are on the front lines of terrorism and cyberattacks--two of world's biggest threats to global security. How can corpora...

cena: 256,20 zł

 Advanced Malware Analysis Christopher Elisan 9780071819749 McGraw-Hill/Osborne Media
Advanced Malware Analysis

ISBN: 9780071819749 / Angielski / Miękka / 544 str.

ISBN: 9780071819749/Angielski/Miękka/544 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Elisan
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings

Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.

After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then,...

A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings

Advanced Malware Analy...

cena: 307,44 zł

 Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger Lawrence, Eric 9781511572903 Createspace
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger

ISBN: 9781511572903 / Angielski / Miękka / 370 str.

ISBN: 9781511572903/Angielski/Miękka/370 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Lawrence
Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers, and enthusiasts to inspect traffic, set breakpoints, and "fiddle" with incoming or outgoing data. Fiddler includes powerful event-based scripting, and can be extended using any .NET language. FiddlerCore, the core proxy engine underlying Fiddler, is available to integrate into any .NET application.
Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers, and enthusiasts to i...
cena: 92,77 zł

 
Safe Computing is Like Safe Sex: You have to practice it to avoid infection

ISBN: 9781943517008 / Angielski / Miękka / 232 str.

ISBN: 9781943517008/Angielski/Miękka/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lowe Jr G Richard;Richard Jr Lowe;Cureton Ken
I'll bet you think your computer is safe from viruses and hackers. But is it really? Isn't it reasonable to expect your computer to be secure straight out-of-the-box? What does it mean to secure a system anyway? Huge security breaches have been all over the news lately. It sometimes seems that not a day goes by without another massive computer hack being announced. If huge corporations with multi-million dollar computer security budgets can get hacked, what hope is there for the ordinary person? If you are anything like me, you don't have huge amounts of money and time to spare to protect...
I'll bet you think your computer is safe from viruses and hackers. But is it really? Isn't it reasonable to expect your computer to be secure straight...
cena: 57,60 zł

 Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide Spivak, Walter 9781512317589 Createspace
Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide

ISBN: 9781512317589 / Angielski / Miękka / 176 str.

ISBN: 9781512317589/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Walter Spivak
Welcome to your Cyber-Security Playground Guide ***3rd Edition***Free bonus inside (Right After Conclusion) - Get limited time offer, Get your BONUS right NOW Would you like to acquire an impressive online skill such as writing a VIRUS? Have you always wanted to understand how people get your information? Are you interested in increasing your personal security online or your hacking toolkit? If you can say 'yes' to any one of these questions, then Computer Hacking is the book for you. In this book, you will learn several skills and techniques that you need to acquire in order to become a...
Welcome to your Cyber-Security Playground Guide ***3rd Edition***Free bonus inside (Right After Conclusion) - Get limited time offer, Get your BONUS ...
cena: 33,17 zł

 Wireshark Network Security Piyush Verma 9781784393335 Packt Publishing
Wireshark Network Security

ISBN: 9781784393335 / Angielski / Miękka / 138 str.

ISBN: 9781784393335/Angielski/Miękka/138 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Piyush Verma
cena: 189,34 zł

 Apoc@lypse: The End of Antivirus Winter, Rogerio 9781514863671 Createspace
Apoc@lypse: The End of Antivirus

ISBN: 9781514863671 / Angielski / Miękka / 136 str.

ISBN: 9781514863671/Angielski/Miękka/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rodrigo Ruiz; Rogerio Winter; Kil Park
www.facebook.com/apocalypseantivirus Terrifying, educational, informative, frightening, scary, real. Discover why you and the digital world are at risk. 150 antivirus companies have the same problem and they can destroy your data and hurt your business. Imagine your company losing customer data, products and suppliers. Imagine you losing your school work, years of his family photographs destroyed. Imagine being paralyzed governments. This threat is real and immediate. We openly report a didactic way for anyone and even including all codes. It's your chance to protect yourselves, present a...
www.facebook.com/apocalypseantivirus Terrifying, educational, informative, frightening, scary, real. Discover why you and the digital world are at ris...
cena: 25,42 zł

 Windows Malware Analysis Essentials Victor Marak 9781785281518 Packt Publishing
Windows Malware Analysis Essentials

ISBN: 9781785281518 / Angielski / Miękka / 330 str.

ISBN: 9781785281518/Angielski/Miękka/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Victor Marak
cena: 236,69 zł

 Leading Issues in Cyber Warfare and Security Julie Ryan 9781910810644 Acpil
Leading Issues in Cyber Warfare and Security

ISBN: 9781910810644 / Angielski / Miękka / 252 str.

ISBN: 9781910810644/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Julie Ryan
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence of such stories reveals an overwhelming weakness in the security of the systems we increasingly rely on for everything: shopping, banking, health services, education, and even voting. That these problems persist even as the world rushes headlong into the Internet-of-Things and cloud based everything underscores the importance of understanding the current and potential aspects of information warfare, also known as cyberwarfare. Having passed...
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence...
cena: 135,58 zł

 Under Attack The World's Leading Experts 9780996688703 Celebrity PR
Under Attack

ISBN: 9780996688703 / Angielski / Twarda / 264 str.

ISBN: 9780996688703/Angielski/Twarda/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The World's Leading Experts
cena: 113,63 zł

Pierwsza Podprzednia  1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia