• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2688

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 
Your System's Sweetspots: CEO's Advice on Basic Cyber Security

ISBN: 9798215595107 / Angielski

ISBN: 9798215595107/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Warren H Lau
cena: 103,54

 Intelligence-Driven Incident Response: Outwitting the Adversary Scott J Roberts 9781098120689 O'Reilly Media
Intelligence-Driven Incident Response: Outwitting the Adversary

ISBN: 9781098120689 / Angielski / Miękka / 325 str.

ISBN: 9781098120689/Angielski/Miękka/325 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Scott J Roberts
cena: 254,29

 Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations Dinesh C. Dobhal Sachin Sharma Kamlesh C. Purohit 9781668466469 IGI Global
Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations

ISBN: 9781668466469 / Angielski

ISBN: 9781668466469/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dinesh C. Dobhal;Sachin Sharma;Kamlesh C. Purohit
In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination with efficient, intelligent, and accurate machines to provide resource-efficient and user-preferred solutions. With the improvements in social networks, cloud, and the internet of things (IoT)-based technologies, the requirement for a strong cyber security system, particularly in the healthcare sector, is increasing. Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations provides a...
In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in ...
cena: 1608,52

 Zero Trust and Third-Party Risk: Reduce the Blast Radius Gregory C. (ISC2 Third-Party Risk Task Force) Rasner 9781394203147 John Wiley & Sons Inc
Zero Trust and Third-Party Risk: Reduce the Blast Radius

ISBN: 9781394203147 / Angielski / Twarda

ISBN: 9781394203147/Angielski/Twarda

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory C. (ISC2 Third-Party Risk Task Force) Rasner
cena: 125,76

 Defensive Security Handbook: Best Practices for Securing Infrastructure William F. Reyor III 9781098127244 O'Reilly Media
Defensive Security Handbook: Best Practices for Securing Infrastructure

ISBN: 9781098127244 / Angielski / Miękka / 285 str.

ISBN: 9781098127244/Angielski/Miękka/285 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
William F. Reyor III
cena: 254,29

 Practical Cloud Security: A Guide for Secure Design and Deployment Chris Dotson 9781098148171 O'Reilly Media
Practical Cloud Security: A Guide for Secure Design and Deployment

ISBN: 9781098148171 / Angielski / Miękka / 250 str.

ISBN: 9781098148171/Angielski/Miękka/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Dotson
cena: 192,63

 AI Tools for Protecting and Preventing Sophisticated Cyber Attacks Eduard Babulak   9781668471104 IGI Global
AI Tools for Protecting and Preventing Sophisticated Cyber Attacks

ISBN: 9781668471104 / Angielski

ISBN: 9781668471104/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eduard Babulak
The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provision of proper and effective cyber security is critical for any organization across the world. AI Tools for Protecting and Preventing Sophisticated Cyber Attacks illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber infrastructure...
The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technica...
cena: 1278,56

 
AI Tools for Protecting and Preventing Sophisticated Cyber Attacks

ISBN: 9781668471111 / Angielski

ISBN: 9781668471111/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eduard Babulak
The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provision of proper and effective cyber security is critical for any organization across the world. AI Tools for Protecting and Preventing Sophisticated Cyber Attacks illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber infrastructure...
The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technica...
cena: 969,23

 
Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server

ISBN: 9798987508916 / Angielski

ISBN: 9798987508916/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lin Song
cena: 86,28

 
Comprehensive Guide to Personal Cybersecurity: Personal Cybersecurity Practices for a Safer Digital Life

ISBN: 9798223990499 / Angielski

ISBN: 9798223990499/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rick Spair
cena: 73,33

 
Cloud Security 101: Best Practices for Securing Cloud Environments

ISBN: 9798397813853 / Angielski

ISBN: 9798397813853/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Henry Williams
cena: 153,71

 
Anatomy of Cyber Attacks: Exploitation of the Weakest Link

ISBN: 9798822911147 / Angielski

ISBN: 9798822911147/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jamaine Mungo
cena: 56,06

 Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies Thangavel M Nirmala E  9781668481455 IGI Global
Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies

ISBN: 9781668481455 / Angielski

ISBN: 9781668481455/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thangavel M;Nirmala E
Disruptive innovations are now propelling Industry 4.0 (I4.0) and presenting new opportunities for value generation in all major industry segments. I4.0 technologies' innovations in cybersecurity and data science provide smart apps and services with accurate real-time monitoring and control. Through enhanced access to real-time information, it also aims to increase overall effectiveness, lower costs, and increase the efficiency of people, processes, and technology. Applications of Data Science and Cybersecurity Innovations in Industry 4.0 Technologies discusses the technological...
Disruptive innovations are now propelling Industry 4.0 (I4.0) and presenting new opportunities for value generation in all major industry segments. I4...
cena: 1665,68

 Perspectives on Ethical Hacking and Penetration Testing Keshav Kaushik Akashdeep Bhardwaj  9781668482186 IGI Global
Perspectives on Ethical Hacking and Penetration Testing

ISBN: 9781668482186 / Angielski

ISBN: 9781668482186/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keshav Kaushik;Akashdeep Bhardwaj
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools...
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopho...
cena: 1149,68

 
Perspectives on Ethical Hacking and Penetration Testing

ISBN: 9781668482193 / Angielski

ISBN: 9781668482193/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keshav Kaushik;Akashdeep Bhardwaj
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools...
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopho...
cena: 871,28

 Artificial Intelligence & Blockchain in Cyber Physical Systems  9781032040363 Taylor & Francis Ltd
Artificial Intelligence & Blockchain in Cyber Physical Systems

ISBN: 9781032040363 / Twarda / 288 str.

ISBN: 9781032040363/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
cena: 636,71

 Technologies and African Societies in Pandemic Times  9781786304520 ISTE Ltd and John Wiley & Sons Inc
Technologies and African Societies in Pandemic Times

ISBN: 9781786304520 / Twarda / 208 str.

ISBN: 9781786304520/Twarda/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
cena: 646,50

 Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware Cassie Crossley 9781098133702 O'Reilly Media
Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware

ISBN: 9781098133702 / Angielski / Miękka / 200 str.

ISBN: 9781098133702/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cassie Crossley
cena: 215,75

 AI, Blockchain and Self-Sovereign Identity in Higher Education Hamid Jahankhani Arshad Jamal Guy Brown 9783031336263 Springer International Publishing AG
AI, Blockchain and Self-Sovereign Identity in Higher Education

ISBN: 9783031336263 / Angielski

ISBN: 9783031336263/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Jahankhani;Arshad Jamal;Guy Brown
This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning? The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated...
This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strate...
cena: 885,61

 Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust Peter Conrad 9781098131890 O'Reilly Media
Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust

ISBN: 9781098131890 / Angielski / Miękka / 225 str.

ISBN: 9781098131890/Angielski/Miękka/225 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Conrad
cena: 177,22

Pierwsza Podprzednia  43  44  45  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia