• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The Active Defender: Immersion in the Offensive Security Mindset Catherine J. Ullman 9781119895213 John Wiley & Sons Inc
The Active Defender: Immersion in the Offensive Security Mindset

ISBN: 9781119895213 / Angielski / Miękka

ISBN: 9781119895213/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catherine J. Ullman
cena: 118,52

 Auditing IT Infrastructures for Compliance Robert Johnson Marty Weiss Michael G. Solomon 9781284236606 Jones & Bartlett Publishers
Auditing IT Infrastructures for Compliance

ISBN: 9781284236606 / Angielski / Miękka / 398 str.

ISBN: 9781284236606/Angielski/Miękka/398 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Johnson; Marty Weiss; Michael G. Solomon
cena: 406,51

 Asymmetric Cryptography: Primitives and Protocols David Pointcheval 9781789450965 Wiley-Iste
Asymmetric Cryptography: Primitives and Protocols

ISBN: 9781789450965 / Angielski / Twarda / 304 str.

ISBN: 9781789450965/Angielski/Twarda/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Pointcheval
cena: 644,44

 Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity Reza Montasari 9783031219191 Springer
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity

ISBN: 9783031219191 / Angielski / Twarda / 164 str.

ISBN: 9783031219191/Angielski/Twarda/164 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Reza Montasari
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service  practices. It explores the roles that these technologies play in the...
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the...
cena: 684,33

 Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers Wei Lu Yuqing Zhang Weiping Wen 9789811982842 Springer
Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers

ISBN: 9789811982842 / Angielski / Miękka / 239 str.

ISBN: 9789811982842/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wei Lu; Yuqing Zhang; Weiping Wen
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022.The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China,...
cena: 160,99

 Frontiers in Cyber Security: 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings Emmanuel Ahene Fagen Li 9789811984440 Springer
Frontiers in Cyber Security: 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings

ISBN: 9789811984440 / Angielski / Miękka / 430 str.

ISBN: 9789811984440/Angielski/Miękka/430 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Emmanuel Ahene; Fagen Li
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022.The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, du...
cena: 362,27

 Security Strategies in Linux Platforms and Applications Ric Messier Michael Jang 9781284255850 Jones & Bartlett Publishers
Security Strategies in Linux Platforms and Applications

ISBN: 9781284255850 / Angielski / Miękka / 500 str.

ISBN: 9781284255850/Angielski/Miękka/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ric Messier; Michael Jang
cena: 406,51

 Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies Parker, Carey 9781484290354 Apress
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies

ISBN: 9781484290354 / Angielski / Miękka / 570 str.

ISBN: 9781484290354/Angielski/Miękka/570 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carey Parker
Beginning-Intermediate user level
Beginning-Intermediate user level
cena: 152,93

 Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World Amit Kumar Tyagi 9781668452509 IGI Global
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World

ISBN: 9781668452509 / Angielski / Twarda / 508 str.

ISBN: 9781668452509/Angielski/Twarda/508 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Amit Kumar Tyagi
Discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. The book also explores methods and algorithms of learning for implementing better security methods in fields such as business and healthcare.
Discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks...
cena: 1660,07

 Cybersecurity Issues, Challenges, and Solutions in the Business World Suhasini Verma Vidhisha Vyas Keshav Kaushik 9781668458273 IGI Global
Cybersecurity Issues, Challenges, and Solutions in the Business World

ISBN: 9781668458273 / Angielski / Twarda / 312 str.

ISBN: 9781668458273/Angielski/Twarda/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Suhasini Verma; Vidhisha Vyas; Keshav Kaushik
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application...
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or...
cena: 1355,90

 Cybersecurity Issues, Challenges, and Solutions in the Business World Suhasini Verma Vidhisha Vyas Keshav Kaushik 9781668458280 IGI Global
Cybersecurity Issues, Challenges, and Solutions in the Business World

ISBN: 9781668458280 / Angielski / Miękka / 312 str.

ISBN: 9781668458280/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Suhasini Verma; Vidhisha Vyas; Keshav Kaushik
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application...
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or...
cena: 1020,79

 Mastering Malware Analysis - Second Edition: A malware analyst\'s practical guide to combating malicious software, APT, cybercrime, and IoT attacks Alexey Kleymenov Amr Thabet 9781803240244 Packt Publishing
Mastering Malware Analysis - Second Edition: A malware analyst\'s practical guide to combating malicious software, APT, cybercrime, and IoT attacks

ISBN: 9781803240244 / Angielski / Miękka / 572 str.

ISBN: 9781803240244/Angielski/Miękka/572 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexey Kleymenov; Amr Thabet
Learn effective malware analysis tactics to prevent your systems from getting infected Key Features Investigate cyberattacks and prevent malware-related incidents from occurring in the future Learn core concepts of static and dynamic malware analysis, memory forensics, decryption, and much more Get practical guidance in developing efficient solutions to handle malware incidents Book DescriptionNew and developing technologies inevitably bring new types of malware with them, creating a huge demand for IT professionals that can keep malware at bay. With the help of this updated second edition...
Learn effective malware analysis tactics to prevent your systems from getting infected Key Features Investigate cyberattacks and prevent malware-rel...
cena: 237,33

 Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating Yuri Diogenes Erdal Ozkaya 9781803248776 Packt Publishing
Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating

ISBN: 9781803248776 / Angielski / Miękka / 570 str.

ISBN: 9781803248776/Angielski/Miękka/570 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yuri Diogenes; Erdal Ozkaya
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape Key Features Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and more Explore the latest tools for ethical hacking, pentesting, and Red/Blue teaming Includes recent real-world examples to illustrate the best practices to improve security posture Book DescriptionCybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat...
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape Key Features Updated for r...
cena: 181,23

 Provable and Practical Security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11–12, 2022, Proceedings Chunpeng Ge Fuchun Guo 9783031209161 Springer
Provable and Practical Security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11–12, 2022, Proceedings

ISBN: 9783031209161 / Angielski / Miękka / 291 str.

ISBN: 9783031209161/Angielski/Miękka/291 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chunpeng Ge; Fuchun Guo
This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022.The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.
This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in Nov...
cena: 261,63

 Searchable Encryption: From Concepts to Systems Kui Ren Cong Wang 9783031213762 Springer
Searchable Encryption: From Concepts to Systems

ISBN: 9783031213762 / Angielski / Twarda / 170 str.

ISBN: 9783031213762/Angielski/Twarda/170 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kui Ren; Cong Wang
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from...
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality ...
cena: 563,56

 Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings Hans P. Reiser Marcel Kyas 9783031222948 Springer
Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings

ISBN: 9783031222948 / Angielski / Miękka / 388 str.

ISBN: 9783031222948/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hans P. Reiser; Marcel Kyas
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 – December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during No...
cena: 301,89

 Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I Eike Kiltz Vaikuntanathan Vinod 9783031223174 Springer
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I

ISBN: 9783031223174 / Angielski / Miękka / 743 str.

ISBN: 9783031223174/Angielski/Miękka/743 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eike Kiltz; Vaikuntanathan Vinod
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;...
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryp...
cena: 442,79

 Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part III Eike Kiltz Vaikuntanathan Vinod 9783031223679 Springer
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part III

ISBN: 9783031223679 / Angielski / Miękka / 245 str.

ISBN: 9783031223679/Angielski/Miękka/245 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eike Kiltz; Vaikuntanathan Vinod
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;...
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryp...
cena: 261,63

 Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings Willy Susilo Xiaofeng Chen Fuchun Guo 9783031223891 Springer
Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings

ISBN: 9783031223891 / Angielski / Miękka / 510 str.

ISBN: 9783031223891/Angielski/Miękka/510 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Xiaofeng Chen; Fuchun Guo
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in ...
cena: 322,01

 Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control R. Thandeeswaran Thinagaran Perumal Kun Ma 9780367647452 CRC Press
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control

ISBN: 9780367647452 / Angielski / Miękka / 186 str.

ISBN: 9780367647452/Angielski/Miękka/186 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
R. Thandeeswaran; Thinagaran Perumal; Kun Ma
This book sheds light upon the security threats, defenses, and remediation on various networking and data processing domains including wired networks, wireless networks, mobile ad hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.
This book sheds light upon the security threats, defenses, and remediation on various networking and data processing domains including wired networks,...
cena: 205,65

Pierwsza Podprzednia  40  41  42  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia