• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2685

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cybersecurity of Industrial Internet of Things (Iiot) Atdhe Buja 9781032467818 CRC Press
Cybersecurity of Industrial Internet of Things (Iiot)

ISBN: 9781032467818 / Angielski

ISBN: 9781032467818/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Atdhe Buja
cena: 597,30

 From Web 1.0 to Web 3.0: Understanding the Past, Present, and Future of the Internet Daniel Strode 9781041012689 CRC Press
From Web 1.0 to Web 3.0: Understanding the Past, Present, and Future of the Internet

ISBN: 9781041012689 / Angielski

ISBN: 9781041012689/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Strode
cena: 597,30

 Cyberterrorism: The Rise of Misinformation and Disinformation Ravi (Apollo Biometrics, Inc., Chicago, Illinois, USA) Das 9781041077374 CRC Press
Cyberterrorism: The Rise of Misinformation and Disinformation

ISBN: 9781041077374 / Angielski

ISBN: 9781041077374/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA) Das Illinois Chicago Inc. Ravi (Apollo Biometrics
cena: 597,30

 Systematic Security: Building Quantum Security: Preparing for Q-Day and Beyond Timur Qader 9781041166634 CRC Press
Systematic Security: Building Quantum Security: Preparing for Q-Day and Beyond

ISBN: 9781041166634 / Angielski

ISBN: 9781041166634/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Timur Qader
cena: 597,30

 Mitigating the Risks of AI Deepfakes  9781032823508 Taylor & Francis Ltd
Mitigating the Risks of AI Deepfakes

ISBN: 9781032823508 / Angielski / Twarda / 30-04-2026 / 288 str.

ISBN: 9781032823508/Angielski/Twarda/30-04-2026/288 str.

Książka dostępna od: 30-04-2026
Termin ukazania się książki: 30-04-2026
Książkę można już zamówić z rabatem 5%
597,30
567,44

 Research Advances in Network Technologies: Volume 3  9781041145172 Taylor & Francis Ltd
Research Advances in Network Technologies: Volume 3

ISBN: 9781041145172 / Angielski / Twarda / 12-05-2026 / 384 str.

ISBN: 9781041145172/Angielski/Twarda/12-05-2026/384 str.

Książka dostępna od: 12-05-2026
Termin ukazania się książki: 12-05-2026
Książkę można już zamówić z rabatem 5%
597,30
567,44

 Managing Information Risk and the Economics of Security M. Eric Johnson 9780387097619 Springer
Managing Information Risk and the Economics of Security

ISBN: 9780387097619 / Niemiecki / Twarda / 347 str.

ISBN: 9780387097619/Niemiecki/Twarda/347 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. Eric Johnson
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
cena: 610,90

 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan 9780387772677 SPRINGER-VERLAG NEW YORK INC.
Primality Testing and Integer Factorization in Public-Key Cryptography

ISBN: 9780387772677 / Angielski / Twarda / 371 str.

ISBN: 9780387772677/Angielski/Twarda/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer...

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,...

cena: 610,90

 Open Source Software for Digital Forensics Ewa Huebner Stefano Zanero 9781441958020 Springer
Open Source Software for Digital Forensics

ISBN: 9781441958020 / Angielski / Twarda / 124 str.

ISBN: 9781441958020/Angielski/Twarda/124 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ewa Huebner; Stefano Zanero

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution.

Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited...

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics....

cena: 610,90

 Trustworthy Internet Luca Salgarelli Giuseppe Bianchi Nicola Blefari-Melazzi 9788847018174 Not Avail
Trustworthy Internet

ISBN: 9788847018174 / Angielski / Miękka / 388 str.

ISBN: 9788847018174/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Luca Salgarelli; Giuseppe Bianchi; Nicola Blefari-Melazzi
This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "Trustworthy Internet." The workshop provided a lively discussion on the challenges involved in reshaping the Internet into a trustworthy reality, articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things, supported by the Network Infrastructure foundation. The papers have been revised after the workshop to take account of feedbacks received...
This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and ...
cena: 610,90

 Counterterrorism and Open Source Intelligence Uffe Kock Wiil 9783709103876 Not Avail
Counterterrorism and Open Source Intelligence

ISBN: 9783709103876 / Angielski / Twarda / 458 str.

ISBN: 9783709103876/Angielski/Twarda/458 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Uffe Kock Wiil
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open...
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there...
cena: 610,90

 Managing Information Risk and the Economics of Security M. Eric Johnson 9781441935298 Springer
Managing Information Risk and the Economics of Security

ISBN: 9781441935298 / Angielski / Miękka / 347 str.

ISBN: 9781441935298/Angielski/Miękka/347 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. Eric Johnson
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
cena: 610,90

 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan 9781441945860 Not Avail
Primality Testing and Integer Factorization in Public-Key Cryptography

ISBN: 9781441945860 / Angielski / Miękka / 371 str.

ISBN: 9781441945860/Angielski/Miękka/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer...

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,...

cena: 610,90

 Open Source Software for Digital Forensics Ewa Huebner Stefano Zanero  9781489983282 Springer
Open Source Software for Digital Forensics

ISBN: 9781489983282 / Angielski / Miękka / 124 str.

ISBN: 9781489983282/Angielski/Miękka/124 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ewa Huebner;Stefano Zanero

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution.

Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited...

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics....

cena: 610,90

 Intelligent and Cloud Computing: Proceedings of ICICC 2019, Volume 2 Mishra, Debahuti 9789811562044 Springer Singapore
Intelligent and Cloud Computing: Proceedings of ICICC 2019, Volume 2

ISBN: 9789811562044 / Angielski / Miękka / 712 str.

ISBN: 9789811562044/Angielski/Miękka/712 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system...
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 20...
cena: 610,90

 Emerging Trends in Intelligent Systems & Network Security  9783031151903 Springer International Publishing
Emerging Trends in Intelligent Systems & Network Security

ISBN: 9783031151903 / Angielski / Miękka

ISBN: 9783031151903/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of...

This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022...

cena: 610,90

 Bring Your Own Device Security Policy Compliance Framework Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah 9783031868009 Springer International Publishing AG
Bring Your Own Device Security Policy Compliance Framework

ISBN: 9783031868009 / Angielski / Twarda / 195 str.

ISBN: 9783031868009/Angielski/Twarda/195 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. The influx of these devices has created information security challenges within organizations, further exacerbated with employees’ inconsistent adherence with BYOD security policy. To prevent information security breaches, compliance with BYOD security policy and procedures is vital. This book aims to investigate the factors that determine employees' BYOD security policy compliance by using mixed methods approach. Security policy compliance...
Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. Th...
cena: 610,90

 Web Programming with HTML5, CSS, and JavaScript John Dean 9781284091793 Jones & Bartlett Publishers
Web Programming with HTML5, CSS, and JavaScript

ISBN: 9781284091793 / Angielski / Twarda / 678 str.

ISBN: 9781284091793/Angielski/Twarda/678 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Dean
Web Programming With HTML 5, CSS, And Javascript Is Written For The Undergraduate, Client-Side Web Programming Course. It Covers The Three Client-Side Technologies (HTML5, CSS, And Javascript) In Depth, With No Dependence On Server-Side Technologies. One Of The Distinguishing Features Of This New Text Is Its Coverage Of Canvas, One Of The Most Important New Features Of HTML5. Topics Are Presented In A Logical, Comprehensive Manner And Code Is Presented In Both Short Code Fragments And Complete Web Pages, Allowing Readers To Grasp Concepts Quickly And Then Apply The Concepts In The Context Of...
Web Programming With HTML 5, CSS, And Javascript Is Written For The Undergraduate, Client-Side Web Programming Course. It Covers The Three Client-Side...
cena: 612,23

 Cybersecurity: Ethics, Legal, Risks, and Policies Ishaani Priyadarshini Chase Cotton 9781774630228 Apple Academic Press
Cybersecurity: Ethics, Legal, Risks, and Policies

ISBN: 9781774630228 / Angielski / Twarda / 416 str.

ISBN: 9781774630228/Angielski/Twarda/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ishaani Priyadarshini; Chase Cotton
cena: 617,21

 Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation Claudia Lanza 9781032250809 CRC Press
Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation

ISBN: 9781032250809 / Angielski / Twarda / 180 str.

ISBN: 9781032250809/Angielski/Twarda/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claudia Lanza
cena: 622,19

Pierwsza Podprzednia  127  128  129  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia