• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2615

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Open Source Software for Digital Forensics Ewa Huebner Stefano Zanero  9781489983282 Springer
Open Source Software for Digital Forensics

ISBN: 9781489983282 / Angielski / Miękka / 124 str.

ISBN: 9781489983282/Angielski/Miękka/124 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ewa Huebner;Stefano Zanero

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution.

Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited...

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics....

cena: 603,81

 Cyber-Physical System Design with Sensor Networking Technologies Sherali Zeadally Nafaa Jabeur 9781849198240 Institution of Engineering & Technology
Cyber-Physical System Design with Sensor Networking Technologies

ISBN: 9781849198240 / Angielski / Twarda / 368 str.

ISBN: 9781849198240/Angielski/Twarda/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sherali Zeadally; Nafaa Jabeur
This is the first book in this new area and it uniquely focuses on sensor networks in cyber-physical systems. It has been peer-reviewed by experts in the areas of sensor networks and cyber-physical systems. Furthermore, the book describes how wireless sensor networking technologies can help in establishing and maintaining seamless communications between the physical and cyber systems--acquiring data, pushing data from the physical system to the cyber system, and routing decisions to appliances.

Cyber-Physical System Design with Sensor Networking Technologies is essential...
This is the first book in this new area and it uniquely focuses on sensor networks in cyber-physical systems. It has been peer-reviewed by experts in ...
cena: 486,97

 Code of Practice for Cyber Security in the Built Environment Iet 9781849198912 Institution of Engineering & Technology
Code of Practice for Cyber Security in the Built Environment

ISBN: 9781849198912 / Angielski / Miękka / 140 str.

ISBN: 9781849198912/Angielski/Miękka/140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Iet
This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing on building-related systems and all connections to the wider cyber environment. It provides clear practical guidance to help multidisciplinary teams understand how the management of key aspects of cyber security relate to their specific jobs and responsibilities in maintaining the security of a building. It is intended to act as an integral part of an organization's overall management system ensuring the cyber security of building related...
This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing ...
cena: 456,29

 Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Sudhanshu Chauhan 9780128018675 SYNGRESS MEDIA
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

ISBN: 9780128018675 / Angielski / Miękka / 300 str.

ISBN: 9780128018675/Angielski/Miękka/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sudhanshu Chauhan

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment--that is, reconnaissance--is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data.

Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a...

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abu...

cena: 213,70

 MPLS in the SDN Era Krzysztof Grzegor Szarkowicz 9781491905456 O'Reilly Media
MPLS in the SDN Era

ISBN: 9781491905456 / Angielski / Miękka / 920 str.

ISBN: 9781491905456/Angielski/Miękka/920 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Krzysztof Grzegor Szarkowicz

How can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of multivendor Multiprotocol Label Switching (MPLS) services on networks, down to the configuration level. You'll learn where Juniper Network's Junos, Cisco's IOS XR, and OpenContrail, interoperate and where they don't.

Two network and cloud professionals from Juniper describe how MPLS technologies and applications have rapidly evolved through services and architectures such as Ethernet VPNs, Network Function Virtualization, Seamless MPLS,...

How can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of m...

cena: 286,30

 Threats, Countermeasures, and Advances in Applied Information Security Manish Gupta John Walp Raj Sharman 9781466609785 Information Science Reference
Threats, Countermeasures, and Advances in Applied Information Security

ISBN: 9781466609785 / Angielski / Twarda / 548 str.

ISBN: 9781466609785/Angielski/Twarda/548 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manish Gupta; John Walp; Raj Sharman
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially. Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while effectively managing risks has never been so critical. This book contains 24 chapters on the most relevant and important issues and advances in applied information security management. The chapters are authored by leading researchers and practitioners in the field of information security from...
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow expo...
cena: 985,79

 Essential Cybersecurity Science Josiah Dykstra 9781491920947 O'Reilly Media
Essential Cybersecurity Science

ISBN: 9781491920947 / Angielski / Miękka / 190 str.

ISBN: 9781491920947/Angielski/Miękka/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josiah Dykstra

If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.

Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics,...

If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to...

cena: 204,49

 Wireshark Network Security Piyush Verma 9781784393335 Packt Publishing
Wireshark Network Security

ISBN: 9781784393335 / Angielski / Miękka / 138 str.

ISBN: 9781784393335/Angielski/Miękka/138 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Piyush Verma
cena: 187,27

 Introduction to Evolutionary Informatics Winston (Evolutionary Informatics Lab, Usa) Ewert 9789813142145 World Scientific Publishing Co Pte Ltd
Introduction to Evolutionary Informatics

ISBN: 9789813142145 / Angielski / Miękka / 332 str.

ISBN: 9789813142145/Angielski/Miękka/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Usa) Ewert Winston (Evolutionary Informatics Lab
Science has made great strides in modeling space, time, mass and energy. Yet little attention has been paid to the precise representation of the information ubiquitous in nature.Introduction to Evolutionary Informatics fuses results from complexity modeling and information theory that allow both meaning and design difficulty in nature to be measured in bits. Built on the foundation of a series of peer-reviewed papers published by the authors, the book is written at a level easily understandable to readers with knowledge of rudimentary high school math. Those seeking a quick first read or...
Science has made great strides in modeling space, time, mass and energy. Yet little attention has been paid to the precise representation of the infor...
cena: 233,17

 Hacking University: Freshman Edition: Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beg Isaac D. Cody 9781535445023 Createspace Independent Publishing Platform
Hacking University: Freshman Edition: Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beg

ISBN: 9781535445023 / Angielski / Miękka / 82 str.

ISBN: 9781535445023/Angielski/Miękka/82 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Isaac D. Cody

Have you ever wanted to be a hacker? Does cracking passwords and the exfiltration of data intrigue you?


Hacking University: Freshman Edition is a beginner's guide to the complex security concepts involved with hacking. Whether you are an aspiring -hacktivist- or a security-minded individual, this book can start you on your career of exploration.


This book contains demonstrations of hacking techniques and actual code. Aspiring hackers can follow along to get a feel for how professions operate, and persons wishing to hide...

Have you ever wanted to be a hacker? Does cracking passwords and the exfiltration of data intrigue you?


cena: 51,84

 Computer Science and Technology: Proceedings of the International Conference (CST2016) Ning Cai 9789813146419 World Scientific Publishing Company
Computer Science and Technology: Proceedings of the International Conference (CST2016)

ISBN: 9789813146419 / Angielski / Twarda / 1288 str.

ISBN: 9789813146419/Angielski/Twarda/1288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ning Cai
This proceedings consists of selected papers presented at the International Conference on Computer Science and Technology (CST2016), which was successfully held in Shenzhen, China during January 8-10, 2016.CST2016 covered a wide range of fundamental studies, technical innovations and industrial applications in 7 areas, namely Computer Systems, Computer Network, Security, Databases and Information Systems, Artificial Intelligence and Multimedia, Theory and Software Engineering and Computer Applications.CST 2016 aims to provide a forum for researchers, engineers, and students in the area of...
This proceedings consists of selected papers presented at the International Conference on Computer Science and Technology (CST2016), which was success...
cena: 1991,71

 Foundations of Security Analysis and Design VIII: Fosad 2014/2015/2016 Tutorial Lectures Aldini, Alessandro 9783319430041 Springer
Foundations of Security Analysis and Design VIII: Fosad 2014/2015/2016 Tutorial Lectures

ISBN: 9783319430041 / Angielski / Miękka / 163 str.

ISBN: 9783319430041/Angielski/Miękka/163 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Aldini; Javier Lopez; Fabio Martinelli

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research.
This book presents thoroughly revised versions of four tutorial lectures given by leading researchers during three International Schools on Foundations...

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in comp...

cena: 169,08

 Ransomware: Defending Against Digital Extortion Liska                                    Gallo 9781491967881 O'Reilly Media
Ransomware: Defending Against Digital Extortion

ISBN: 9781491967881 / Angielski / Miękka / 190 str.

ISBN: 9781491967881/Angielski/Miękka/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liska;Gallo

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.

Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for...

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay...

cena: 152,00

 Computer Science, Technology and Application - Proceedings of the 2016 International Conference on Computer Science, Technology and Application (Csta2 Zhang, Xing 9789813200432 World Scientific Publishing Company
Computer Science, Technology and Application - Proceedings of the 2016 International Conference on Computer Science, Technology and Application (Csta2

ISBN: 9789813200432 / Angielski / Twarda / 576 str.

ISBN: 9789813200432/Angielski/Twarda/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xiaolong Li
The 2016 International Conference on Computer Science, Technology and Application (CSTA2016) were held in Changsha, China on March 18-20, 2016. The main objective of the joint conference is to provide a platform for researchers, academics and industrial professionals to present their research findings in the fields of computer science and technology.The CSTA2016 received more than 150 submissions, but only 67 articles were selected to be included in this proceedings, which are organized into 6 chapters; covering Image and Signal Processing, Computer Network, Algorithm and Simulation, Data...
The 2016 International Conference on Computer Science, Technology and Application (CSTA2016) were held in Changsha, China on March 18-20, 2016. The ma...
cena: 1161,02

 Attacking Network Protocols James Forshaw 9781593277505 John Wiley & Sons
Attacking Network Protocols

ISBN: 9781593277505 / Angielski / Miękka / 336 str.

ISBN: 9781593277505/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Forshaw
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.

Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro,...

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehens...
cena: 271,70

 How to Disappear From The Internet Completely While Leaving False Trails: How to Be Anonymous Online Phillips, Raymond 9781539618768 Createspace Independent Publishing Platform
How to Disappear From The Internet Completely While Leaving False Trails: How to Be Anonymous Online

ISBN: 9781539618768 / Angielski / Miękka / 52 str.

ISBN: 9781539618768/Angielski/Miękka/52 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raymond Phillips

How to Disappear From The Internet Completely While Leaving False Trails

How to Be Anonymous Online

Why do some people want to erase themselves completely from the internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are reading this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step...

How to Disappear From The Internet Completely While Leaving False Trails

How to Be Anonymous Online<...

cena: 58,07

 Docker Networking Cookbook Jon Langemak 9781786461148 Packt Publishing
Docker Networking Cookbook

ISBN: 9781786461148 / Angielski / Miękka / 378 str.

ISBN: 9781786461148/Angielski/Miękka/378 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jon Langemak
60 practical recipes that help you gain expertise with Docker networking and understand the underlying constructs that make it all work About This Book Enhance your Docker networking skills and protect your organization using advanced networking functions Learn how to use third party tools to extend Docker networking This practical and recipe-based book demonstrates the different ways in which you can network containers leveraging the Docker engine. Who This Book Is For The book is for system administrators as well as developers who are well versed with the concepts of Docker and have basic...
60 practical recipes that help you gain expertise with Docker networking and understand the underlying constructs that make it all work About This Boo...
cena: 234,10

 Troubleshooting OpenVPN Crist, Eric F. 9781786461964 Packt Publishing
Troubleshooting OpenVPN

ISBN: 9781786461964 / Angielski / Miękka / 178 str.

ISBN: 9781786461964/Angielski/Miękka/178 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric F. Crist
cena: 165,98

 Metasploit Bootcamp Nipun Jaswal 9781788297134 Packt Publishing
Metasploit Bootcamp

ISBN: 9781788297134 / Angielski / Miękka / 230 str.

ISBN: 9781788297134/Angielski/Miękka/230 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nipun Jaswal
cena: 208,56

 Metasploit for Beginners: Create a threat-free environment with the best-in-class tool Rahalkar, Sagar 9781788295970 Packt Publishing
Metasploit for Beginners: Create a threat-free environment with the best-in-class tool

ISBN: 9781788295970 / Angielski / Miękka / 190 str.

ISBN: 9781788295970/Angielski/Miękka/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sagar Rahalkar
Covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics, this book carries out penetration testing in highly-secured environments with Metasploit. It helps you learn to bypass different defenses to gain access into different systems.
Covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics, ...
cena: 165,98

Pierwsza Podprzednia  112  113  114  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia