• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Chaotic Secure Communication: Principles and Technologies Sun, Kehui 9783110426885 De Gruyter
Chaotic Secure Communication: Principles and Technologies

ISBN: 9783110426885 / Angielski / Twarda / 346 str.

ISBN: 9783110426885/Angielski/Twarda/346 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kehui Sun;Tsinghua University Press
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secu...
cena: 594,70

 How Privacy Keeps You From Tindering: To swipe or not to swipe!: Privacy and The Law Odisho, Sandra 9781539753223 Createspace Independent Publishing Platform
How Privacy Keeps You From Tindering: To swipe or not to swipe!: Privacy and The Law

ISBN: 9781539753223 / Angielski / Miękka / 64 str.

ISBN: 9781539753223/Angielski/Miękka/64 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sandra Odisho
What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in detail or do they take all the data that we give them for their own benefit? This book will look at an indepth analysis of Tinder's privacy policy and whether or not it protects our rights. It also gives us a clear understanding of how much information the user is willing to share.
What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in detail or do they take all the data ...
cena: 80,92

 Trusted Computing: Principles and Applications Feng, Dengguo 9783110476040 de Gruyter
Trusted Computing: Principles and Applications

ISBN: 9783110476040 / Angielski / Twarda / 311 str.

ISBN: 9783110476040/Angielski/Twarda/311 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dengguo Feng;Tsinghua University Press
cena: 594,70

 Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, Icgs3 2017, London, Uk, Jan Jahankhani, Hamid 9783319510637 Springer
Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, Icgs3 2017, London, Uk, Jan

ISBN: 9783319510637 / Angielski / Miękka / 407 str.

ISBN: 9783319510637/Angielski/Miękka/407 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Jahankhani; Alex Carlile; David Emm

This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017.

The 32 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on the future of digital forensics; cyber intelligence and operation; information systems security management; systems security, safety, and sustainability; cyber infrastructure protection.


This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held...

cena: 201,24

 Mobile Payment security analysis Types and Penetration Testing an Security Architecture: Mobile Payment security analysis and Penetration Testing , Pa Hudaib, Adam Ali Zre 9781518877322 Createspace Independent Publishing Platform
Mobile Payment security analysis Types and Penetration Testing an Security Architecture: Mobile Payment security analysis and Penetration Testing , Pa

ISBN: 9781518877322 / Angielski / Miękka / 166 str.

ISBN: 9781518877322/Angielski/Miękka/166 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adam Ali Zre Hudaib
In this High professional Book with more than 360 references we discusses the different types of technologies used for mobile payment systems, such as: SMS, USSD, WAP, BLE, QR Code, Offline NFC, HCE, P2P-Paid, Cloud Based m-payment, Mobile Wallet. For every type of these payment mobile systems we will show the Security Architecture and Operations we will explain how every type is working and will discuss and analysis the possible security threats for every type also in General we will explain how these systems could be hacked by black hat attackers .we will provide recommendations and Best...
In this High professional Book with more than 360 references we discusses the different types of technologies used for mobile payment systems, such as...
cena: 647,39

 Next Generation of Cyber Threats a New Principles in Modern Attacks: The New Principles of Modern Attacks for Pen Testing MR Adam Ali Zare Hudaib 9781540614254 Createspace Independent Publishing Platform
Next Generation of Cyber Threats a New Principles in Modern Attacks: The New Principles of Modern Attacks for Pen Testing

ISBN: 9781540614254 / Angielski / Miękka / 66 str.

ISBN: 9781540614254/Angielski/Miękka/66 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
MR Adam Ali Zare Hudaib
cena: 485,54

 Security Breaches and Threat Prevention in the Internet of Things N. Jeyanthi R. Thandeeswaran 9781522522966 Information Science Reference
Security Breaches and Threat Prevention in the Internet of Things

ISBN: 9781522522966 / Angielski / Twarda / 296 str.

ISBN: 9781522522966/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
N. Jeyanthi; R. Thandeeswaran
cena: 922,53

 Network Security Through Data Analysis: From Data to Action Michael S. Collins 9781491962848 O'Reilly Media
Network Security Through Data Analysis: From Data to Action

ISBN: 9781491962848 / Angielski / Miękka / 428 str.

ISBN: 9781491962848/Angielski/Miękka/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael S. Collins

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to protect and improve it.

Divided into three sections, the updated second edition of this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It's ideal...

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security re...

cena: 231,17

 Security, Privacy and Reliability in Computer Communications and Networks Kewei Sha Aaron Striegel Min Song 9788793379893 River Publishers
Security, Privacy and Reliability in Computer Communications and Networks

ISBN: 9788793379893 / Angielski / Twarda / 200 str.

ISBN: 9788793379893/Angielski/Twarda/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kewei Sha; Aaron Striegel; Min Song
Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability.

Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the...
Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfil...
cena: 401,56

 Convergence Security: Journal Volume 1 - 2016 Kuinam K Kim 9788793519534 River Publishers
Convergence Security: Journal Volume 1 - 2016

ISBN: 9788793519534 / Angielski / Miękka / 62 str.

ISBN: 9788793519534/Angielski/Miękka/62 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kuinam K Kim

Convergence security can be defined as the security created by merging the physical and information security or the combining security with other non-IT technologies. Convergence Security Journal is an open access journal dedicated to the publication and discussion of research articles, short communications, and review papers on all areas of convergence security. The primary objective is to publish a high-quality journal with free Internet-based access for researchers and other interested people throughout the world. Papers published by the journal represent important advances of...

Convergence security can be defined as the security created by merging the physical and information security or the combining security with other n...

cena: 145,67

 Python Scapy Dot11: Programacion en Python para pentesters Wi-Fi Hansen, Yago 9781542748704 Createspace Independent Publishing Platform
Python Scapy Dot11: Programacion en Python para pentesters Wi-Fi

ISBN: 9781542748704 / Hiszpański / Miękka / 226 str.

ISBN: 9781542748704/Hiszpański/Miękka/226 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yago Hansen
cena: 121,18

 Der Paketfilter bei OpenWrt Weidner, Mathias 9781542690645 Createspace Independent Publishing Platform
Der Paketfilter bei OpenWrt

ISBN: 9781542690645 / Niemiecki / Miękka / 226 str.

ISBN: 9781542690645/Niemiecki/Miękka/226 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mathias Weidner
OpenWrt bietet sich als alternatives Betriebssystem an fur SOHO-Router, die nicht mehr oder zu selten aktualisiert werden. Aufgrund seiner Modularitat eignet es sich auch fur andere Projekte mit der unterstutzten Hardware. Somit sind die Hurden, einen Router mit OpenWrt zu betreiben, sehr gering. Dabei sollte nicht auer Acht gelassen werden, dass mit einem schlecht gewarteten Router sehr leicht beinahe jeder Zugriff auf die angeschlossenen Netzwerke und die darin enthaltenen Gerate erlangen kann. Hier kann man mit dem in OpenWrt enthaltenen Paketfilter regulierend eingreifen.Wenn man die...
OpenWrt bietet sich als alternatives Betriebssystem an fur SOHO-Router, die nicht mehr oder zu selten aktualisiert werden. Aufgrund seiner Modularitat...
cena: 80,51

 Mastering Modern Web Penetration Testing Prakhar Prasad 9781785284588 Packt Publishing
Mastering Modern Web Penetration Testing

ISBN: 9781785284588 / Angielski / Miękka / 298 str.

ISBN: 9781785284588/Angielski/Miękka/298 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Prakhar Prasad
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does About This Book This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications Penetrate and secure your web application using various techniques Get this comprehensive reference guide that provides advanced tricks and tools of the trade for seasoned penetration testers Who This Book Is For This book is for security professionals and penetration testers...
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does About This Book This book cover...
cena: 211,44

 Kali Linux 2 - Assuring Security by Penetration Testing, Third Edition: Achieve the gold standard in penetration testing with Kali using this masterpi Johansen, Gerard 9781785888427 Packt Publishing
Kali Linux 2 - Assuring Security by Penetration Testing, Third Edition: Achieve the gold standard in penetration testing with Kali using this masterpi

ISBN: 9781785888427 / Angielski / Miękka / 572 str.

ISBN: 9781785888427/Angielski/Miękka/572 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerard Johansen
cena: 211,44

 Mastering Metasploit, Second Edition Nipun Jaswal 9781786463166 Packt Publishing
Mastering Metasploit, Second Edition

ISBN: 9781786463166 / Angielski / Miękka / 440 str.

ISBN: 9781786463166/Angielski/Miękka/440 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nipun Jaswal
cena: 237,33

 Instant Citrix Security How-to Jacob, Carmel 9781849686723 Packt Publishing
Instant Citrix Security How-to

ISBN: 9781849686723 / Angielski / Miękka / 74 str.

ISBN: 9781849686723/Angielski/Miękka/74 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carmel Jacob
cena: 116,49

 Instant Java Password and Authentication Security Fernando Mayoral 9781849697767 Packt Publishing
Instant Java Password and Authentication Security

ISBN: 9781849697767 / Angielski / Miękka / 38 str.

ISBN: 9781849697767/Angielski/Miękka/38 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fernando Mayoral
cena: 129,43

 Cybersecurity and Privacy - Bridging the Gap Samant Khajuria                          Lene Sorensen                            Knud Erik Skouby 9788793519664 River Publishers
Cybersecurity and Privacy - Bridging the Gap

ISBN: 9788793519664 / Angielski / Twarda / 238 str.

ISBN: 9788793519664/Angielski/Twarda/238 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Samant Khajuria;Lene Sorensen;Knud Erik Skouby
The huge potential in future connected services hinges on the precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is appearing increasingly on the agenda at both the company and individual level.

Cybersecurity and Privacy - Bridging the Gap addresses two very complex fields of the digital world: cybersecurity and privacy. These multifaceted and multidisciplinary issues are usually understood and valued differently by different individuals, data holders, and legal bodies, but a change in one field immediately...
The huge potential in future connected services hinges on the precondition that privacy and security needs are dealt with in order for new services to...
cena: 352,59

 Computer and Information Security Handbook John R. Vacca 9780128038437 Morgan Kaufmann Publishers
Computer and Information Security Handbook

ISBN: 9780128038437 / Angielski / Twarda / 1280 str.

ISBN: 9780128038437/Angielski/Twarda/1280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John R. Vacca

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.

With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their...

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available ...

cena: 499,57

 Security Solutions for AWS: Understanding Network Security and Performance Monitoring for Amazon Web Services University, Argent 9780947480554 Argent University Press
Security Solutions for AWS: Understanding Network Security and Performance Monitoring for Amazon Web Services

ISBN: 9780947480554 / Angielski / Miękka / 52 str.

ISBN: 9780947480554/Angielski/Miękka/52 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Argent University
cena: 40,26

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia