• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Viruses & Malware

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Viruses & Malware

ilość książek w kategorii: 691

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 AI and ML-Driven Cybersecurity: Industrial IoT and WSN with Python Scripting Atdhe Buja 9781041051411 CRC Press
AI and ML-Driven Cybersecurity: Industrial IoT and WSN with Python Scripting

ISBN: 9781041051411 / Angielski

ISBN: 9781041051411/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Atdhe Buja
cena: 219,45 zł

 Hacking Tricks, Methods, and Offensive Strategies: Digital reconnaissance, network enumeration, and system exploitation strategies (English Edition) Dale Meredith 9789365897005 Bpb Publications
Hacking Tricks, Methods, and Offensive Strategies: Digital reconnaissance, network enumeration, and system exploitation strategies (English Edition)

ISBN: 9789365897005 / Angielski

ISBN: 9789365897005/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dale Meredith
cena: 171,95 zł

 AI In Cybersecurity: Simplifying Cyber Risk with Smart, Affordable Tools for Small Business Defense Lebouthillier 9781069643780 Acrasolution
AI In Cybersecurity: Simplifying Cyber Risk with Smart, Affordable Tools for Small Business Defense

ISBN: 9781069643780 / Angielski

ISBN: 9781069643780/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lebouthillier
cena: 72,83 zł

 
Red Team Evaluation Framework: Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team

ISBN: 9781041111061 / Angielski / 05-02-2026

ISBN: 9781041111061/Angielski/05-02-2026

Książka dostępna od: 05-02-2026
Matthias Muhlert
Termin ukazania się książki: 05-02-2026
Książkę można już zamówić z rabatem 5%
536,56 zł
509,73 zł

 
Red Team Evaluation Framework: Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team

ISBN: 9781041111078 / Angielski / 05-02-2026

ISBN: 9781041111078/Angielski/05-02-2026

Książka dostępna od: 05-02-2026
Matthias Muhlert
Termin ukazania się książki: 05-02-2026
Książkę można już zamówić z rabatem 5%
146,29 zł
138,97 zł

 The Ghidra Book, 2nd Edition: The Definitive Guide Kara Nance 9781718504684 No Starch Press
The Ghidra Book, 2nd Edition: The Definitive Guide

ISBN: 9781718504684 / Angielski / 24-03-2026

ISBN: 9781718504684/Angielski/24-03-2026

Książka dostępna od: 24-03-2026
Kara Nance
Termin ukazania się książki: 24-03-2026
Książkę można już zamówić z rabatem 5%
272,33 zł
258,71 zł

 Scams, Hacking, and Cybersecurity: The Ultimate Guide to Online Safety and Privacy May Brooks-Kempler Itamar Kempler 9781965480069 Authority Publishing
Scams, Hacking, and Cybersecurity: The Ultimate Guide to Online Safety and Privacy

ISBN: 9781965480069 / Angielski

ISBN: 9781965480069/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
May Brooks-Kempler; Itamar Kempler
cena: 134,12 zł

 The AI Cybersecurity Handbook Caroline Wong 9781394340866 Wiley
The AI Cybersecurity Handbook

ISBN: 9781394340866 / Angielski / 24-03-2026

ISBN: 9781394340866/Angielski/24-03-2026

Książka dostępna od: 24-03-2026
Caroline Wong
Termin ukazania się książki: 24-03-2026
Książkę można już zamówić z rabatem 5%
131,65 zł
125,07 zł

 
CyberSentinel+: An Advanced Hybrid Honeypot Intrusion Detection System Augmented with Big Data Analytics and Machine Learning Intelligence

ISBN: 9781041115168 / Angielski / 06-03-2026

ISBN: 9781041115168/Angielski/06-03-2026

Książka dostępna od: 06-03-2026
Akshay Mudgal
Termin ukazania się książki: 06-03-2026
Książkę można już zamówić z rabatem 5%
690,46 zł
655,94 zł

 A Day in the Life of a CISO: Personal Mentorship from 24+ Battle-Tested CISOs - Mentoring We Never Got David J. Gee 9781806110698 Packt Publishing
A Day in the Life of a CISO: Personal Mentorship from 24+ Battle-Tested CISOs - Mentoring We Never Got

ISBN: 9781806110698 / Angielski

ISBN: 9781806110698/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David J. Gee
cena: 258,21 zł

 Social Engineering in Cybersecurity: Threats and Defenses Gururaj H Janhavi V Ambika V 9781032524429 CRC Press
Social Engineering in Cybersecurity: Threats and Defenses

ISBN: 9781032524429 / Angielski / 26-12-2025

ISBN: 9781032524429/Angielski/26-12-2025

Książka dostępna od: 26-12-2025
Gururaj H. L.; Janhavi V; Ambika V
Termin ukazania się książki: 26-12-2025
Książkę można już zamówić z rabatem 5%
243,84 zł
231,65 zł

 802.11 Security Bruce Potter Bob Fleck 9780596002909 O'Reilly Media
802.11 Security

ISBN: 9780596002909 / Angielski / Miękka / 196 str.

ISBN: 9780596002909/Angielski/Miękka/196 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Potter; Bob Fleck

Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your...

Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for go...

cena: 134,46 zł

 Gray Hat Python Justin Seitz 9781593271923 No Starch Press,US
Gray Hat Python

ISBN: 9781593271923 / Angielski / Miękka / 216 str.

ISBN: 9781593271923/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Justin Seitz

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin...

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly,...

cena: 191,63 zł

 Surviving Cyberwar Richard Stiennon 9781605906881 Government Institutes
Surviving Cyberwar

ISBN: 9781605906881 / Angielski / Miękka / 176 str.

ISBN: 9781605906881/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard Stiennon
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
cena: 319,59 zł

 Security and Privacy Assurance in Advancing Technologies: New Developments Nemati, Hamid 9781609602000 Information Science Publishing
Security and Privacy Assurance in Advancing Technologies: New Developments

ISBN: 9781609602000 / Angielski / Twarda / 496 str.

ISBN: 9781609602000/Angielski/Twarda/496 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid R. Nemati
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
cena: 919,08 zł

 The Tangled Web Michal Zalewski 9781593273880 No Starch Press
The Tangled Web

ISBN: 9781593273880 / Angielski / Miękka / 320 str.

ISBN: 9781593273880/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michal Zalewski

"Thorough and comprehensive coverage from one of the foremost experts in browser security."

--Tavis Ormandy, Google Inc.

Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.

In The Tangled Web, Michal Zalewski, one of the world's top...

"Thorough and comprehensive coverage from one of the foremost experts in browser security."

--Tavis Ormandy, Google Inc.

...

cena: 287,47 zł

 Automatic Malware Analysis: An Emulator Based Approach Yin, Heng 9781461455226 Springer
Automatic Malware Analysis: An Emulator Based Approach

ISBN: 9781461455226 / Angielski / Miękka / 73 str.

ISBN: 9781461455226/Angielski/Miękka/73 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Heng Yin; Dawn Song

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems.

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for...

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam...

cena: 201,72 zł

 The Healthy Pc: Preventive Care, Home Remedies, and Green Computing, 2nd Edition Hart-Davis, Guy 9780071752916 0
The Healthy Pc: Preventive Care, Home Remedies, and Green Computing, 2nd Edition

ISBN: 9780071752916 / Angielski / Miękka / 304 str.

ISBN: 9780071752916/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carey Holzman
Get your PC running at full speed again--and remove malevolent software

Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing, Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for making your PC start up faster, keeping its hard drive in good shape, and updating Windows with the latest security fixes. This hands-on guide also explains how to protect your PC for free using Microsoft Security Essentials, use the Internet...

Get your PC running at full speed again--and remove malevolent software

Save yourself time, money, and frustration by becoming your own computer gu...

cena: 119,13 zł

 Application Security for the Android Platform: Processes, Permissions, and Other Safeguards Six, Jeff 9781449315078 0
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards

ISBN: 9781449315078 / Angielski / Miękka / 78 str.

ISBN: 9781449315078/Angielski/Miękka/78 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeff Six

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker s opportunity to compromise your app and steal user data.

How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information....

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge yo...

cena: 74,46 zł

 The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory AAron Walters 9781118825099 John Wiley & Sons Inc
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

ISBN: 9781118825099 / Angielski / Miękka / 912 str.

ISBN: 9781118825099/Angielski/Miękka/912 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
AAron Walters
Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,...

Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memo...

cena: 266,99 zł

Pierwsza Podprzednia  28  29  30  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia