• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 D/DoS: Denial of Service Attacks Aquilina, Antonio 9781530026883 Createspace Independent Publishing Platform
D/DoS: Denial of Service Attacks

ISBN: 9781530026883 / Angielski / Miękka / 154 str.

ISBN: 9781530026883/Angielski/Miękka/154 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antonio Aquilina
A Denial of Service or Distributed Denial of Service attack is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations. Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks, credit card payment gateways; but motives of revenge, blackmail or activism can be behind other attacks.
A Denial of Service or Distributed Denial of Service attack is analogous to a group of people crowding the entry door or gate to a shop or business, a...
cena: 242,77

 Cryptographic Attacks: Computer Security Exploits Basil Krzewinski 9781530025299 Createspace Independent Publishing Platform
Cryptographic Attacks: Computer Security Exploits

ISBN: 9781530025299 / Angielski / Miękka / 330 str.

ISBN: 9781530025299/Angielski/Miękka/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Basil Krzewinski
A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic pro...
cena: 242,77

 Kali Linux Web Penetration Testing Cookbook Gilberto Najera-Gutierrez 9781784392918 Packt Publishing
Kali Linux Web Penetration Testing Cookbook

ISBN: 9781784392918 / Angielski / Miękka / 296 str.

ISBN: 9781784392918/Angielski/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilberto Najera-Gutierrez
cena: 237,33

 Communication, Control and Security Challenges for the Smart Grid S. M. Muyeen Saifur Rahman 9781785611421 Institution of Engineering & Technology
Communication, Control and Security Challenges for the Smart Grid

ISBN: 9781785611421 / Angielski / Twarda / 576 str.

ISBN: 9781785611421/Angielski/Twarda/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. M. Muyeen; Saifur Rahman
The Smart Grid is a modern electricity grid allowing for distributed, renewable intermittent generation, partly owned by consumers. This requires advanced control and communication technologies in order to provide high quality power supply and secure generation, transmission and distribution. This book outlines these emerging technologies.

This essential reading focuses specifically on security and control aspects of the smart grid. It covers various related topics including smart grid architecture; communications and networking features; measuring and sensing devices; and smart...
The Smart Grid is a modern electricity grid allowing for distributed, renewable intermittent generation, partly owned by consumers. This requires adva...
cena: 681,67

 Journal of Cyber Security and Mobility 4-4 Ashutosh Dutta Ruby Lee Neeli R. Prasad 9788793379732 River Publishers
Journal of Cyber Security and Mobility 4-4

ISBN: 9788793379732 / Angielski / Miękka / 102 str.

ISBN: 9788793379732/Angielski/Miękka/102 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ashutosh Dutta; Ruby Lee; Neeli R. Prasad
Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT)...
Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable...
cena: 222,10

 Learning Python for Forensics: Learn the art of designing, developing, and deploying innovative forensic solutions through Python Miller, Preston 9781783285235 Packt Publishing
Learning Python for Forensics: Learn the art of designing, developing, and deploying innovative forensic solutions through Python

ISBN: 9781783285235 / Angielski / Miękka / 488 str.

ISBN: 9781783285235/Angielski/Miękka/488 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Preston Miller; Chapin Bryce
cena: 284,81

 CISSP in 21 Days, Second Edition Srinivasan, M. L. 9781785884498 Packt Publishing
CISSP in 21 Days, Second Edition

ISBN: 9781785884498 / Angielski / Miękka / 402 str.

ISBN: 9781785884498/Angielski/Miękka/402 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. L. Srinivasan
cena: 211,44

 Linux Networking Cookbook Gregory Boyce 9781785287916 Packt Publishing
Linux Networking Cookbook

ISBN: 9781785287916 / Angielski / Miękka / 152 str.

ISBN: 9781785287916/Angielski/Miękka/152 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory Boyce
cena: 168,27

 Hacking: The Ultimate Beginners Handbook Max Green 9781533530264 Createspace Independent Publishing Platform
Hacking: The Ultimate Beginners Handbook

ISBN: 9781533530264 / Angielski / Miękka / 52 str.

ISBN: 9781533530264/Angielski/Miękka/52 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Max Green
The Ultimate Computer Hacking Handbook
Have you ever wanted to learn how to hack? Hacking: The Ultimate Beginners Handbook, contains tons of tips and strategies on how to hack. This step by step guide will teach you everything you need to know about hacking. This book also studies the best hackers that have ever lived and their experiences. Become a hacking master today
Here Is A Preview Of What You'll Learn...
  • Hacking - The Basics
  • How to Get Started
  • How to Avoid Getting Hacked
  • Notorious Hackers
  • Types of Hackers
  • The Best of the...
The Ultimate Computer Hacking Handbook
Have you ever wanted to learn how to hack? Hacking: The Ultimate Beginners Handbook, contains tons of tip...
cena: 149,67

 The Insider Threat: Assessment and Mitigation of Risks Eleanor E. Thompson 9781498747080 Auerbach Publications
The Insider Threat: Assessment and Mitigation of Risks

ISBN: 9781498747080 / Angielski / Twarda / 230 str.

ISBN: 9781498747080/Angielski/Twarda/230 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eleanor E. Thompson
cena: 352,59

 Fundamentals of Speaker Recognition Homayoon Beigi 9781489979223 Springer
Fundamentals of Speaker Recognition

ISBN: 9781489979223 / Angielski / Miękka / 942 str.

ISBN: 9781489979223/Angielski/Miękka/942 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Homayoon Beigi
Speaker Recognition is a popular new technology that can authenticate voices over the phone. This comprehensive text covers the basics and the latest developments of this technology and includes examples and exercises at the end of each chapter.
Speaker Recognition is a popular new technology that can authenticate voices over the phone. This comprehensive text covers the basics and the latest ...
cena: 402,53

 Satellite Network Threats Hacking & Security Analysis: Satellite Network Hacking Security Analysis, Threats and Attacks, Architecture Operation design Hudaib, Adam Ali Zare 9781535252546 Createspace Independent Publishing Platform
Satellite Network Threats Hacking & Security Analysis: Satellite Network Hacking Security Analysis, Threats and Attacks, Architecture Operation design

ISBN: 9781535252546 / Angielski / Miękka / 124 str.

ISBN: 9781535252546/Angielski/Miękka/124 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lpt Adam Ali Zare Hudaib
Satellite network & communication services cover practically many important sectors and any interference with them could have a serious effect. They are a strategic asset for every country and are considered as critical infrastructure, they are considerable as privileged targets for cyber attack. In this High professional Book with 200 references we discusses the Satellite Communications architecture operation design and technologies Vulnerabilities & Possible attacks .Satellites Network Needs More funding in Security It's important to increase the cost of satellite network security . The...
Satellite network & communication services cover practically many important sectors and any interference with them could have a serious effect. They a...
cena: 647,39

 Advanced Penetration Testing: Hacking the World's Most Secure Networks Wil Allsopp 9781119367680 John Wiley & Sons Inc
Advanced Penetration Testing: Hacking the World's Most Secure Networks

ISBN: 9781119367680 / Angielski / Miękka / 288 str.

ISBN: 9781119367680/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wil Allsopp
Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen...

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure N...

cena: 196,26

 Intelligent Data Analysis for E-Learning: Enhancing Security and Trustworthiness in Online Learning Systems Miguel, Jorge 9780128045350 Academic Press
Intelligent Data Analysis for E-Learning: Enhancing Security and Trustworthiness in Online Learning Systems

ISBN: 9780128045350 / Angielski / Miękka / 192 str.

ISBN: 9780128045350/Angielski/Miękka/192 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jorge Miguel; Santi Caballe; Fatos Xhafa

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements.

This book provides functional approaches of trustworthiness...

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security w...

cena: 440,80

 Security Operations Center: Building, Operating, and Maintaining your SOC AlFardan, Nadhem 9780134052014 Pearson Education (US)
Security Operations Center: Building, Operating, and Maintaining your SOC

ISBN: 9780134052014 / Angielski / Miękka / 448 str.

ISBN: 9780134052014/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nadhem AlFardan
cena: 237,33

 Security Solutions for Hyperconnectivity and the Internet of Things Maurice Dawson Mohamed Eltayeb Marwan Omar 9781522507413 Information Science Reference
Security Solutions for Hyperconnectivity and the Internet of Things

ISBN: 9781522507413 / Angielski / Twarda / 370 str.

ISBN: 9781522507413/Angielski/Twarda/370 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maurice Dawson; Mohamed Eltayeb; Marwan Omar
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for r...
cena: 1098,12

 Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within Julie E. Mehan 9781849288392 It Governance Ltd
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within

ISBN: 9781849288392 / Angielski / Miękka / 312 str.

ISBN: 9781849288392/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Julie E. Mehan
Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Withinlooks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat programme. Read this book to learn: .The seven organizational characteristics common to insider threat victims. .The ten stages of a malicious attack. .The ten steps of a successful insider threat programme. .How...
Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Withinlooks beyond perimeter protection tools, and shows ho...
cena: 230,59

 Security Awareness: Applying Practical Security in Your World Ciampa, Mark D. 9781305500372
Security Awareness: Applying Practical Security in Your World

ISBN: 9781305500372 / Angielski / Miękka / 256 str.

ISBN: 9781305500372/Angielski/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
cena: 324,74

 Cybersecurity Essentials Donald Short 9781119362395 John Wiley & Sons
Cybersecurity Essentials

ISBN: 9781119362395 / Angielski / Miękka / 784 str.

ISBN: 9781119362395/Angielski/Miękka/784 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Donald Short
An accessible introduction to cybersecurity concepts and practices

Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of...

An accessible introduction to cybersecurity concepts and practices

Cybersecurity Essentials provides a comprehensive introduction to ...

cena: 161,85

 Network Forensics Messier, Ric 9781119328285 John Wiley & Sons
Network Forensics

ISBN: 9781119328285 / Angielski / Miękka / 360 str.

ISBN: 9781119328285/Angielski/Miękka/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ric Messier
Intensively hands-on training for real-world network forensics

Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log...

Intensively hands-on training for real-world network forensics

Network Forensics provides a uniquely practical guide for IT and law ...

cena: 244,89

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia