• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security: Principles and New Concepts (Volume II) Fiona Hobbs 9781632403070 Clanrye International
Information Security: Principles and New Concepts (Volume II)

ISBN: 9781632403070 / Angielski / Twarda / 222 str.

ISBN: 9781632403070/Angielski/Twarda/222 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fiona Hobbs
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be sec...
cena: 577,84

 Information Security: Principles and New Concepts (Volume III) Fiona Hobbs 9781632403087 Clanrye International
Information Security: Principles and New Concepts (Volume III)

ISBN: 9781632403087 / Angielski / Twarda / 214 str.

ISBN: 9781632403087/Angielski/Twarda/214 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fiona Hobbs
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be sec...
cena: 577,84

 Information Security: Principles and New Concepts (Volume IV) Fiona Hobbs 9781632403094 Clanrye International
Information Security: Principles and New Concepts (Volume IV)

ISBN: 9781632403094 / Angielski / Twarda / 210 str.

ISBN: 9781632403094/Angielski/Twarda/210 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fiona Hobbs
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be sec...
cena: 577,84

 Wireless Ad-Hoc Networks Timothy Kolaya 9781632405241 Clanrye International
Wireless Ad-Hoc Networks

ISBN: 9781632405241 / Angielski / Twarda / 174 str.

ISBN: 9781632405241/Angielski/Twarda/174 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Timothy Kolaya
This book discusses the topic of wireless ad-hoc networks with the help of state-of-the-art information. A wireless ad-hoc network can be defined as a wireless network set up without any infrastructure. These types of networks include mobile ad-hoc networks, vehicular ad-hoc networks, and wireless mesh networks. This book highlights the basic-most aspects of these networks. It consists of information related to the analysis of routing protocols for better efficiency, the design of the link layer for enhanced performance, and practical issues in application. These topics are critical for...
This book discusses the topic of wireless ad-hoc networks with the help of state-of-the-art information. A wireless ad-hoc network can be defined as a...
cena: 365,89

 Internet Security: How to Defend Against Attackers on the Web: How to Defend Against Attackers on the Web Harwood, Mike 9781284090550 Jones & Bartlett Publishers
Internet Security: How to Defend Against Attackers on the Web: How to Defend Against Attackers on the Web

ISBN: 9781284090550 / Angielski / Miękka / 438 str.

ISBN: 9781284090550/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Harwood
The Second Edition Of Internet Security: How To Defend Against Attackers On The Web (Formerly Titled Security Strategies In Web Applications And Social Networking) Provides An In-Depth Look At How To Secure Mobile Users As Customer-Facing Information Migrates From Mainframe Computers And Application Servers To Web-Enabled Applications. Written By An Industry Expert, This Book Provides A Comprehensive Explanation Of The Evolutionary Changes That Have Occurred In Computing, Communications, And Social Networking And Discusses How To Secure Systems Against All The Risks, Threats, And...
The Second Edition Of Internet Security: How To Defend Against Attackers On The Web (Formerly Titled Security Strategies In Web Applications And Socia...
cena: 406,51

 Cyber-Physical Attacks: A Growing Invisible Threat George Loukas 9780128012901 ELSEVIER
Cyber-Physical Attacks: A Growing Invisible Threat

ISBN: 9780128012901 / Angielski / Miękka / 270 str.

ISBN: 9780128012901/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Loukas

Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.

The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political,...

Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable camer...

cena: 181,17

 Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se Garcia-Alfaro, Joaquin 9783319170152 Springer
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se

ISBN: 9783319170152 / Angielski / Miękka / 343 str.

ISBN: 9783319170152/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquin Garcia-Alfaro; Jordi Herrera-Joancomarti; Emil Lupu
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 9th International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1...
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Worksh...
cena: 201,24

 Hacking Wireless Networks - The ultimate hands-on guide Kolokithas, Andreas 9781508476344 Createspace
Hacking Wireless Networks - The ultimate hands-on guide

ISBN: 9781508476344 / Angielski / Miękka / 430 str.

ISBN: 9781508476344/Angielski/Miękka/430 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
MR Andreas Kolokithas
Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup your own hacking lab and learn through practice? If yes, then this is the book for you Hacking Wireless Networks - The ultimate hands-on guide, is a book written for people who seek to practice the techniques of assessing the security of wireless infrastructures.Through 30 real life scenarios and more than 300 figures the book examines in details the following areas: - Discovery and Profiling of wireless networks - Denial of Service attacks -...
Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup yo...
cena: 69,84

 Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide Crawley, Don R. 9780983660750 Soundtraining.Net
Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide

ISBN: 9780983660750 / Angielski / Miękka / 258 str.

ISBN: 9780983660750/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Don R. Crawley
Cisco ASA for Accidental Administrators is a major update to the previous Accidental Administrator ASA book. This new edition is packed with 48 easy-to-follow hands-on exercises to help you build a working firewall configuration from scratch. Based on software version 9.x, it continues as the most straight-forward approach to learning how to configure the Cisco ASA Security Appliance, filled with practical tips and secrets learned from years of teaching and consulting on the ASA. There is no time wasted on boring theory. The essentials are covered in chapters on installing, backups and...
Cisco ASA for Accidental Administrators is a major update to the previous Accidental Administrator ASA book. This new edition is packed with 48 easy-t...
cena: 173,41

 Learning Puppet Security Jason Slagle 9781784397753 Packt Publishing
Learning Puppet Security

ISBN: 9781784397753 / Angielski / Miękka / 236 str.

ISBN: 9781784397753/Angielski/Miękka/236 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jason Slagle
cena: 189,86

 Handbook of Research on Threat Detection and Countermeasures in Network Security Alaa Hussein Al-Hamami Allaa Hussein Al-Hamami Ghossoon M. Walee 9781466665835 Information Science Reference
Handbook of Research on Threat Detection and Countermeasures in Network Security

ISBN: 9781466665835 / Angielski / Twarda / 452 str.

ISBN: 9781466665835/Angielski/Twarda/452 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alaa Hussein Al-Hamami; Allaa Hussein Al-Hamami; Ghossoon M. Waleed Al-Saadoon
As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats.
As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online communit...
cena: 1665,68

 DNS Security: Defending the Domain Name System Liska, Allan   9780128033067 Elsevier Science
DNS Security: Defending the Domain Name System

ISBN: 9780128033067 / Angielski / Miękka / 226 str.

ISBN: 9780128033067/Angielski/Miękka/226 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers...

DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common D...

cena: 181,17

 VMware vSphere Essentials Kumar, Kunal 9781784398750 Packt Publishing
VMware vSphere Essentials

ISBN: 9781784398750 / Angielski / Miękka / 228 str.

ISBN: 9781784398750/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kunal Kumar
cena: 211,44

 Journal of Cyber Security and Mobility 3-4 Ashutosh Dutta Ruby Lee Neeli Rashmi Prasad 9788793237650 River Publishers
Journal of Cyber Security and Mobility 3-4

ISBN: 9788793237650 / Angielski / Miękka / 82 str.

ISBN: 9788793237650/Angielski/Miękka/82 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ashutosh Dutta; Ruby Lee; Neeli Rashmi Prasad
Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT)...
Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable...
cena: 222,10

 Secure Your Node.Js Web Application: Keep Attackers Out and Users Happy Duuna, Karl 9781680500851 John Wiley & Sons
Secure Your Node.Js Web Application: Keep Attackers Out and Users Happy

ISBN: 9781680500851 / Angielski / Miękka / 200 str.

ISBN: 9781680500851/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users.

Bake security into your code from the start. See how to protect your Node.js applications...

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to ste...

cena: 165,08

 The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology Scott, James 9781514331361 Createspace
The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology

ISBN: 9781514331361 / Angielski / Miękka / 168 str.

ISBN: 9781514331361/Angielski/Miękka/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Scott
The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings you a complete and up-to-date overview of the key issues related to the adoption and use of information technology, communications and healthcare, with detailed practical information to support students, professionals and other stakeholders in the field of healthcare. Health Informatics, an evolving specialization, strives to improve the quality and safety of patient care. This book addresses the concepts, tasks and skills that professionals...
The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings...
cena: 60,49

 Juniper MX Series: A Comprehensive Guide to Trio Technologies on the MX Hanks, Jr. Douglas Richard 9781491932728 John Wiley & Sons
Juniper MX Series: A Comprehensive Guide to Trio Technologies on the MX

ISBN: 9781491932728 / Angielski / Miękka / 1140 str.

ISBN: 9781491932728/Angielski/Miękka/1140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Discover why routers in the Juniper MX Series--with their advanced feature sets and record-breaking scale--are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features.

This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX...

Discover why routers in the Juniper MX Series--with their advanced feature sets and record-breaking scale--are so popular among enterprises and net...

cena: 280,98

 
Cyber Nation: How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.

ISBN: 9781514863220 / Angielski / Miękka / 148 str.

ISBN: 9781514863220/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ross Blankenship
"The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the next World War - an epic battle against states, governments, companies and individuals? Venture capital and cybersecurity expert, Ross Blankenship (http: //angelkings.com/invest), shows you who's on the most wanted cyber criminal list, what methods cyber hackers are using to attack networks, where these cyber attacks have taken place (Anthem, Target, Sony, and the United States' Office of Personnel Management), when these attacks...
"The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the ...
cena: 80,72

 
Hacking: The Ultimate Hacking Guide for Beginner's

ISBN: 9781514893128 / Angielski / Miękka / 46 str.

ISBN: 9781514893128/Angielski/Miękka/46 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
T. J. Wilson
This book contains proven steps and strategies on how to hack computer systems and devices in order to promote better security and ethical computing practices. This book is all about learning security and preventing malicious networking and physical practices that are designed to steal information or invade privacy. Contrary to popular belief, hacking is not created to promote illegal activities such as these - hacking is actually an ingenious way to thwart these malicious activities. This book will teach you how to effectively outsmart crackers and script kiddies who are out there to steal...
This book contains proven steps and strategies on how to hack computer systems and devices in order to promote better security and ethical computing p...
cena: 40,43

 Journal of Cyber Security and Mobility 4-1: Resilient and Trustworthy IoT Systems Køien, Geir M. 9788793237667 River Publishers
Journal of Cyber Security and Mobility 4-1: Resilient and Trustworthy IoT Systems

ISBN: 9788793237667 / Angielski / Miękka / 96 str.

ISBN: 9788793237667/Angielski/Miękka/96 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Geir M. Koien
The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that the IoT systems we design, develop, and deploy are resilient and trustworthy. Almost universal availability is expected, yet individual devices will routinely fail and/or be compromised. Despite this, the services should be resilient and trustworthy. The environments where the devices will be deployed will range from protected and controlled environments to potentially very hostile environments where the exposure is extreme.
The cyber security...
The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that th...
cena: 194,22

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia