![]() |
Cyber War: The Next Threat to National Security and What to Do About It
ISBN: 9780061962240 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict--Cyber War Every concerned American should read this startling and explosive book that offers an insider's view of White House 'Situation Room' operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security. This is no X-Files... Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard ... |
cena:
76,19 |
![]() |
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data
ISBN: 9780071713405 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts... Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats... |
cena:
247,75 |
![]() |
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice
ISBN: 9780124059320 / Angielski / Miękka / 155 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn't a part of their day-to-day responsibility. Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in... As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement clo... |
cena:
126,78 |
| |
Network Forensics: Tracking Hackers Through Cyberspace
ISBN: 9780132564717 / Angielski / Twarda / 545 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field. Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. It s like a symphony meeting an encyclopedia meeting a spy novel. Michael Ford, Corero Network Security On the Internet, every...
This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditio...
|
cena:
328,66 |
![]() |
Digital Archaeology: The Art and Science of Digital Forensics
ISBN: 9780321803900 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has written the most thorough, realistic, and up-to-date guide to the principles and techniques of modern digital forensics. Graves begins by providing a solid understanding of the legal underpinnings of and critical laws affecting computer forensics, including key principles of evidence and case law....
The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensic...
|
cena:
362,82 |
![]() |
Software Architecture and Design Illuminated
ISBN: 9780763754204 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The SE 2004 Of The ACM/IEEE Computing Curriculum Project Recommends Software Design And Architecture As One Of Its Ten Essential Areas Of Study. Software Architecture And Design Illuminated Is The Ideal Text For Undergraduate And Graduate Students Delving Into This Critical Area Of The Software Development Process. This Text Offers A Coherent And Integrated Approach To The Discipline Of Software Architectural Design And Covers A Complete Set Of Important Methodologies, Architectural Styles, Design Guidelines, And Design Tools. Java Is Used Throughout The Book To Explain Design Principles And...
The SE 2004 Of The ACM/IEEE Computing Curriculum Project Recommends Software Design And Architecture As One Of Its Ten Essential Areas Of Study. Softw...
|
cena:
487,78 |
![]() |
Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations
ISBN: 9781449316631 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long -travelogue- follows a team of Juniper Networks warriors as they solve specific needs with emerging network platform architectures. In these case studies, Southwick and his fellow warriors analyze a client's particular situation, arrive at an architectural solution, and work through the deployment details. For anyone who operates,... In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing... |
cena:
246,40 |
![]() |
Data Structures Using Java
ISBN: 9781449628079 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Data Structures & Theory of Computation
Data Structures & Theory of Computation
|
cena:
809,71 |
![]() |
Intro to Web Development Using HTML 5
ISBN: 9781449686543 / Angielski / Miękka / 590 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The HTML 5 Web Development Book Provides A Hands-On Experience That Allows First-Time Web-Site Developers To Create Their First Web Pages And Experienced Developers To Quickly Master HTML 5. The Book Is Filled With Thousands Of Real-World Examples. The Book Starts By Introducing Standard HTML And Its Use In Creating Traditional Web Sites. Within This Context, The Book Teaches Developers How To Format And Style Their Pages Using Cascading Style Sheets (CSS) And How To Automate Pages Using Javascript And Jquery. HTML 5 Allows Web Developers To Not Only Build Pages For The World Wide Web, But...
The HTML 5 Web Development Book Provides A Hands-On Experience That Allows First-Time Web-Site Developers To Create Their First Web Pages And Experien...
|
cena:
590,22 |
![]() |
Introduction to Digital Multimedia 2e
ISBN: 9781449688394 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer Graphics & Graphics Applications
Computer Graphics & Graphics Applications
|
cena:
487,78 |
![]() |
Game Design: Theory and Practice, Second Edition: Theory and Practice, Second Edition
ISBN: 9781556229121 / Angielski / Miękka / 704 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. “Both Burgeoning Game Designers And Devoted Gamers Should Consider Game Design: Theory & Practice] An Essential Read.” — Computer Gaming World “Ultimately, In Both Theory And Practice, Rouse’S Game Design Bible Gets The Job Done. Let Us Pray.” - Next Generation Magazine In The Second Edition To The Acclaimed Game Design: Theory & Practice, Designer Richard Rouse III Balances A Discussion Of The Essential Concepts Behind Game Design With An Explanation Of How You Can Implement Them In Your Current Project. Detailed Analysis Of Successful Games Is...
“Both Burgeoning Game Designers And Devoted Gamers Should Consider Game Design: Theory & Practice] An Essential Read.” — Compute...
|
cena:
204,87 |
![]() |
Advances in Secure Computing, Internet Services, and Applications
ISBN: 9781466649408 / Angielski / Twarda / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilsed in efforts to secure this data and avoid potential complex problems.
Advances in Secure Computing, Internet Services, and Applications presents current research on the applications of computational intelligence in order to focus on the challenge humans face when securing knowledge and data. This book is a vital reference source for researchers, lecturers, professors, students, and... Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evo...
|
cena:
988,51 |
![]() |
Microsoft Directaccess Best Practices and Troubleshooting
ISBN: 9781782171065 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. DirectAccess is an amazing Microsoft technology that is truly the evolution of VPN; any Microsoft-centric shop needs this technology. DirectAccess is an automatic remote access solution that takes care of everything from planning to deployment. Microsoft DirectAccess Best Practices and Troubleshooting will provide you with the precise steps you need to take for the very best possible implementation of DirectAccess in your network. You will find answers to some of the most frequently asked questions from administrators and explore unique troubleshooting scenarios that you will want to...
DirectAccess is an amazing Microsoft technology that is truly the evolution of VPN; any Microsoft-centric shop needs this technology. DirectAccess is ...
|
cena:
179,25 |
![]() |
Juniper Qfx5100 Series: A Comprehensive Guide to Building Next-Generation Networks
ISBN: 9781491949573 / Angielski / Miękka / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Ideal for network engineers involved in building a data center, this practical guide provides a comprehensive and technical deep-dive into the new Juniper QFX5100 switching family. You'll learn how the Juniper QFX5100 enables you to create simple-to-use data centers or build some of the largest IP Fabrics in the world. This book is chock-full of helpful technical illustrations and code examples to help you get started on all of the major architectures and features of Juniper QFX5100 switches, whether you're an enterprise or service provider. With this book, you'll be well on your way... Ideal for network engineers involved in building a data center, this practical guide provides a comprehensive and technical deep-dive into the new ... |
cena:
246,40 |
![]() |
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
ISBN: 9780071821650 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Best practices for protecting critical data and systems
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance... Best practices for protecting critical data and systems
Information Assurance Handbook: Effective Computer Security and Risk Management Strategi... |
cena:
278,24 |
![]() |
Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia
ISBN: 9781466657762 / Angielski / Twarda / 325 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a timely and thorough discussion on the integration of terrorism and the media, exploring the influence of traditional and new media on global terrorism--
This book presents a timely and thorough discussion on the integration of terrorism and the media, exploring the influence of traditional and new medi...
|
cena:
988,51 |
![]() |
Configuration Management with Chef-Solo
ISBN: 9781783982462 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
106,68 |
![]() |
Game Theory Applications in Network Design
ISBN: 9781466660502 / Angielski / Twarda / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The use of game theoretic techniques is playing an increasingly important role in the network design domain. Understanding the background, concepts, and principles in using game theory approaches is necessary for engineers in network design. Game Theory Applications in Network Design provides the basic idea of game theory and the fundamental understanding of game theoretic interactions among network entities. The material in this book also covers recent advances and open issues, offering game theoretic solutions for specific network design issues. This publication will benefit students,...
The use of game theoretic techniques is playing an increasingly important role in the network design domain. Understanding the background, concepts, a...
|
cena:
1140,59 |
![]() |
A Machine-Learning Approach to Phishing Detection and Defense
ISBN: 9780128029275 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of...
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account n...
|
cena:
234,09 |
![]() |
Handbook of FPGA Design Security
ISBN: 9789400798403 / Angielski / Miękka / 177 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical design approach and worked examples for combating real world threats. To address the spectrum of lifecycle and operational threats against FPGA systems, a holistic view of FPGA security is presented, from formal top level speci?cation to low level policy...
The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic d...
|
cena:
403,47 |