• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Penetration Testing Georgia Weidman 9781593275648 No Starch Press,US
Penetration Testing

ISBN: 9781593275648 / Angielski / Miękka / 528 str.

ISBN: 9781593275648/Angielski/Miękka/528 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Georgia Weidman

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you...

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security exper...

cena: 192,63

 Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings Aditya Bagchi, Indrakshi Ray 9783642452031 Springer-Verlag Berlin and Heidelberg GmbH &
Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings

ISBN: 9783642452031 / Angielski / Miękka / 404 str.

ISBN: 9783642452031/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aditya Bagchi;Indrakshi Ray
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India...
cena: 201,24

 Information and Network Security Management: Strategic Concept Applications Dr Richmond S. Adebiaye 9781491236338 Createspace
Information and Network Security Management: Strategic Concept Applications

ISBN: 9781491236338 / Angielski / Miękka / 396 str.

ISBN: 9781491236338/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richmond S. Adebiaye
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students'...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for bo...
cena: 453,17

 The Zealots Guide To Computer Security 2013 Taylor, Brian 9781484977248 Createspace
The Zealots Guide To Computer Security 2013

ISBN: 9781484977248 / Angielski / Miękka / 32 str.

ISBN: 9781484977248/Angielski/Miękka/32 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brian Taylor
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
cena: 80,88

 Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1) John Padgette Karen Scarfone Lily Chen 9781478168966 Createspace
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)

ISBN: 9781478168966 / Angielski / Miękka / 50 str.

ISBN: 9781478168966/Angielski/Miękka/50 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Padgette; Karen Scarfone; Lily Chen
cena: 56,61

 Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Elisan, Christopher 9780071823074 McGraw-Hill/Osborne Media
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

ISBN: 9780071823074 / Angielski / Miękka / 384 str.

ISBN: 9780071823074/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Davis; Sean Bodmer; Aaron Lemasters

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion...

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve ...

cena: 281,31

 The Privacy Engineer's Manifesto: Getting from Policy to Code to Qa to Value Dennedy, Michelle 9781430263555 Springer
The Privacy Engineer's Manifesto: Getting from Policy to Code to Qa to Value

ISBN: 9781430263555 / Angielski / Miękka / 400 str.

ISBN: 9781430263555/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.

The authors, a uniquely skilled...

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy a...
cena: 181,11

 Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham, Garcia-Alfaro, Joaquin 9783642545672 Springer
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham,

ISBN: 9783642545672 / Angielski / Miękka / 400 str.

ISBN: 9783642545672/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquin Garcia-Alfaro; Georgios Lioudakis; Nora Cuppens-Boulahia
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the...
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Wo...
cena: 201,24

 Guide to Securing Legacy IEEE 802.11 Wireless Networks Karen Scarfone Derrick Dicoi Matthew Sexton 9781495990243 Createspace
Guide to Securing Legacy IEEE 802.11 Wireless Networks

ISBN: 9781495990243 / Angielski / Miękka / 58 str.

ISBN: 9781495990243/Angielski/Miękka/58 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karen Scarfone; Derrick Dicoi; Matthew Sexton
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. Details on securing WLANs capable of IEEE 802.11i can be found in NIST Special Publication (SP) 800-97. Recommendations for securely using external WLANs, such as public wireless access points, are outside the scope of this document.
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that can...
cena: 40,02

 Using the BACnet Communications DLL v1.0 Galler, Michael a. 9781495990519 Createspace
Using the BACnet Communications DLL v1.0

ISBN: 9781495990519 / Angielski / Miękka / 32 str.

ISBN: 9781495990519/Angielski/Miękka/32 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael a. Galler
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control system. The BACnet Communications Dynamically Linked Library (DLL) enables researchers to implement selected BACnet communications, creating an interface for data collection that is easy to use. Researchers can integrate the BACnet Communications DLL (BCD) into existing tools, create a new tool with the BCD, or use the BCD with common data acquisition and analysis tools. The BCD has already been used to collect data in a variety of locations.
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control ...
cena: 64,70

 Network Attacks and Exploitation: A Framework Monte, Matthew 9781118987124 John Wiley & Sons
Network Attacks and Exploitation: A Framework

ISBN: 9781118987124 / Angielski / Miękka / 216 str.

ISBN: 9781118987124/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Monte
Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and...

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, com...

cena: 185,60

 Building the Infrastructure for Cloud Security: A Solutions View Yeluri, Raghuram 9781430261452 Springer
Building the Infrastructure for Cloud Security: A Solutions View

ISBN: 9781430261452 / Angielski / Miękka / 244 str.

ISBN: 9781430261452/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raghu Yeluri; Enrique Castro-Leon

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity...

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. T...
cena: 152,93

 Legal Issues In Information Security Joanna Lyn Grama 9781284054743 Jones & Bartlett Publishers
Legal Issues In Information Security

ISBN: 9781284054743 / Angielski / Miękka / 550 str.

ISBN: 9781284054743/Angielski/Miękka/550 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joanna Lyn Grama
Part Of The Jones & Bartlett Learning Information Systems Security And Assurance Series Http: //Www.Issaseries.Com Revised And Updated To Address The Many Changes In This Evolving Field, The Second Edition Of Legal Issues In Information Security (Textbook With Lab Manual) Addresses The Area Where Law And Information Security Concerns Intersect. Information Systems Security And Legal Compliance Are Now Required To Protect Critical Governmental And Corporate Infrastructure, Intellectual Property Created By Individuals And Organizations Alike, And Information That Individuals Believe Should Be...
Part Of The Jones & Bartlett Learning Information Systems Security And Assurance Series Http: //Www.Issaseries.Com Revised And Updated To Address The ...
cena: 406,51

 Cyberwarfare: Information Operations in a Connected World Mike Chapple David Seidl 9781284058482 Jones & Bartlett Publishers
Cyberwarfare: Information Operations in a Connected World

ISBN: 9781284058482 / Angielski / Miękka / 428 str.

ISBN: 9781284058482/Angielski/Miękka/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Chapple; David Seidl
Part Of The Jones & Bartlett Learning Information Systems Security & Assurance Series Cyberwarfare Puts Students On The Real-World Battlefield Of Cyberspace Students Will Learn The History Of Cyberwarfare, Techniques Used In Both Offensive And Defensive Information Warfare, And How Cyberwarfare Is Shaping Military Doctrine. Written By Subject Matter Experts, This Book Combines Accessible Explanations With Realistic Experiences And Case Studies That Make Cyberwar Evident And Understandable. Key Features: - Incorporates Hands-On Activities, Relevant Examples, And Realistic Exercises To Prepare...
Part Of The Jones & Bartlett Learning Information Systems Security & Assurance Series Cyberwarfare Puts Students On The Real-World Battlefield Of Cybe...
cena: 406,51

 Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure Allen, Lee 9781849519489 Packt Publishing
Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure

ISBN: 9781849519489 / Angielski / Miękka / 454 str.

ISBN: 9781849519489/Angielski/Miękka/454 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tedi Heriyanto; Lee Allen
cena: 211,44

 Gitolite Essentials Sitaram Chamarty 9781783282371 Packt Publishing
Gitolite Essentials

ISBN: 9781783282371 / Angielski / Miękka / 120 str.

ISBN: 9781783282371/Angielski/Miękka/120 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sitaram Chamarty
cena: 142,38

 Multidisciplinary Perspectives in Cryptology and Information Security Nidaa A. Abbas Sattar B. Sadkha 9781466658080 Information Science Reference
Multidisciplinary Perspectives in Cryptology and Information Security

ISBN: 9781466658080 / Angielski / Twarda / 334 str.

ISBN: 9781466658080/Angielski/Twarda/334 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nidaa A. Abbas; Sattar B. Sadkhan Al Maliky
This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions--
This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offeri...
cena: 1255,66

 Lab Manual to Accompany Auditing It Infrastructure for Compliance Martin Weiss 9781284059182 Jones & Bartlett Publishers
Lab Manual to Accompany Auditing It Infrastructure for Compliance

ISBN: 9781284059182 / Angielski / Miękka / 90 str.

ISBN: 9781284059182/Angielski/Miękka/90 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin Weiss
The Laboratory Manual To Accompany Auditing IT Infrastructure For Compliance Is The Lab Companion To Weiss' Auditing IT Infrastructure For Compliance. It Provides Hands-On Exercises, Each With Measurable Learning Outcomes. About The Series Visit Www.Issaseries.Com For A Complete Look At The Series The Jones & Bartlett Learning Information System & Assurance Series Delivers Fundamental IT Security Principles Packed With Real-World Applications And Examples For IT Security, Cybersecurity, Information Assurance, And Information Systems Security Programs. Authored By Certified Information...
The Laboratory Manual To Accompany Auditing IT Infrastructure For Compliance Is The Lab Companion To Weiss' Auditing IT Infrastructure For Compliance....
cena: 161,63

 Mastering Metasploit Nipun Jaswal 9781782162223 Packt Publishing
Mastering Metasploit

ISBN: 9781782162223 / Angielski / Miękka / 378 str.

ISBN: 9781782162223/Angielski/Miękka/378 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nipun Jaswal
cena: 237,33

 Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework Bullock, Jessey 9781118918210 John Wiley & Sons
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

ISBN: 9781118918210 / Angielski / Miękka / 288 str.

ISBN: 9781118918210/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jessey Bullock

Master Wireshark to solve real-world security problems

If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment.

Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware...

Master Wireshark to solve real-world security problems

If you don't already use Wireshark for a wide range of information security t...

cena: 211,94

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia