• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Privacy, Security And Forensics in The Internet of Things (IoT) Reza Montasari Fiona Carroll Ian Mitchell 9783030912208 Springer
Privacy, Security And Forensics in The Internet of Things (IoT)

ISBN: 9783030912208 / Angielski / Miękka / 210 str.

ISBN: 9783030912208/Angielski/Miękka/210 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Reza Montasari; Fiona Carroll; Ian Mitchell
This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This  book offers a wide range of theoretical and technical solutions to address these challenges. Topics covered in this book include; IoT, privacy, ethics and security, the use of machine learning algorithms in classifying malicious websites, investigation of cases involving cryptocurrency, the challenges police and law enforcement face in policing cyberspace, the use of the IoT in modern terrorism and violent extremism, the challenges of the IoT in view of industrial control...
This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This  book offers a wide range of theor...
cena: 724,58

 Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust? Ulf Mattsson 9781032185163 Taylor & Francis Ltd
Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust?

ISBN: 9781032185163 / Angielski

ISBN: 9781032185163/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ulf Mattsson
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger. This book will use practical lessons in Data Integrity, and Trust, and data's business utility.
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...
cena: 323,20

 Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust? Ulf Mattsson 9781032185187 Taylor & Francis Ltd
Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust?

ISBN: 9781032185187 / Angielski

ISBN: 9781032185187/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ulf Mattsson
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger. This book will use practical lessons in Data Integrity, and Trust, and data's business utility.
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...
cena: 220,35

 Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox Jim Seaman Michael Gioia 9781032263892 Taylor & Francis Ltd
Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox

ISBN: 9781032263892 / Angielski

ISBN: 9781032263892/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jim Seaman; Michael Gioia
In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box)...
cena: 249,73

 The Zero Trust Framework: Threat Hunting & Quantum Mechanics Ravindra Das 9781032492780 CRC Press
The Zero Trust Framework: Threat Hunting & Quantum Mechanics

ISBN: 9781032492780 / Angielski

ISBN: 9781032492780/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ravindra Das
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, incl...
cena: 274,23

 Secure Software Systems Erik Fretheim Marie Deschene 9781284261158 Jones & Bartlett Publishers
Secure Software Systems

ISBN: 9781284261158 / Angielski

ISBN: 9781284261158/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Erik Fretheim; Marie Deschene
cena: 406,51

 Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program Ryan Leirvik 9781484293188 Apress
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program

ISBN: 9781484293188 / Angielski

ISBN: 9781484293188/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ryan Leirvik
Intermediate user level
Intermediate user level
cena: 231,17

 Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs Ryan Soper Nestor N. Torres Ahmed Almoailu 9781801817332 Packt Publishing
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

ISBN: 9781801817332 / Angielski

ISBN: 9781801817332/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ryan Soper; Nestor N. Torres; Ahmed Almoailu
Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBook Key Features Master ZAP to protect your systems from different cyber attacks Learn cybersecurity best practices using this step-by-step guide packed with practical examples Implement advanced testing techniques, such as XXE attacks and Java deserialization, on web applications Book DescriptionMaintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book...
Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBo...
cena: 194,18

 Cybersecurity in the COVID-19 Pandemic Kenneth Okereafor 9780367721435 CRC Press
Cybersecurity in the COVID-19 Pandemic

ISBN: 9780367721435 / Angielski

ISBN: 9780367721435/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth Okereafor
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data.
 
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated comp...
cena: 102,81

 
Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment

ISBN: 9781839381805 / Angielski

ISBN: 9781839381805/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richie Miller
cena: 77,65

 
Cybersecurity Design Principles: Building Secure Resilient Architecture

ISBN: 9781839381829 / Angielski

ISBN: 9781839381829/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richie Miller
cena: 109,54

 
CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance

ISBN: 9781839381836 / Angielski

ISBN: 9781839381836/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richie Miller
cena: 135,43

 Space-Air-Ground Integrated Network Security Wei Zhang 9789819911240 Springer
Space-Air-Ground Integrated Network Security

ISBN: 9789819911240 / Angielski

ISBN: 9789819911240/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wei Zhang
This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are...
This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated n...
cena: 805,10

 Code-Based Cryptography: 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers Jean-Christophe Deneuville 9783031296888 Springer
Code-Based Cryptography: 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers

ISBN: 9783031296888 / Angielski

ISBN: 9783031296888/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jean-Christophe Deneuville
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2...
cena: 221,37

 Handbook of Research on Cybersecurity Risk in Contemporary Business Systems Festus Fatai Adedoyin Bryan Christiansen 9781668472071 IGI Global
Handbook of Research on Cybersecurity Risk in Contemporary Business Systems

ISBN: 9781668472071 / Angielski

ISBN: 9781668472071/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Festus Fatai Adedoyin; Bryan Christiansen
The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Global Perspectives on Cybersecurity Risk in Contemporary Business Systems examines current risks...
The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless n...
cena: 1505,41

 Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. Matt Hand 9781718503342 No Starch Press,US
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.

ISBN: 9781718503342 / Angielski

ISBN: 9781718503342/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Hand
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you'll learn that EDR is not a magical black box - it's just a complex software application built around a few easy-to-understand components. The author uses his years of experience as a red team operator to investigate each of the most common sensor components,...
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that d...
cena: 286,79

 Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I Carmit Hazay Martijn Stam 9783031305443 Springer
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I

ISBN: 9783031305443 / Angielski

ISBN: 9783031305443/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carmit Hazay; Martijn Stam
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42ndAnnual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric...
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42ndAnnual International Conference on Theory and Applications of...
cena: 442,79

 Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings Felix G?nther Julia Hesse 9783031307300 Springer
Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings

ISBN: 9783031307300 / Angielski

ISBN: 9783031307300/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Felix Günther; Julia Hesse
This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..
This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, Franc...
cena: 221,37

 
Blockchain Technology for Secure Social Media Computing

ISBN: 9781839535437 / Angielski

ISBN: 9781839535437/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robin Singh Bhadoria; Neetetsh Saxena; Bharti Nagpa
cena: 558,76

 Blockchains: A Handbook on Fundamentals, Platforms and Applications Sushmita Ruj Salil Kanhere Mauro Conti 9783031321450 Springer
Blockchains: A Handbook on Fundamentals, Platforms and Applications

ISBN: 9783031321450 / Angielski

ISBN: 9783031321450/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushmita Ruj; Salil Kanhere; Mauro Conti
cena: 1207,67

Pierwsza Podprzednia  43  44  45  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia