![]() |
Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II
ISBN: 9789819562084 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
499,01 |
![]() |
CISO: Evolution of a Vocation: Confessions of a Recovering CISO
ISBN: 9781041095460 / Angielski / 06-05-2026 Książka dostępna od: 06-05-2026 |
|
Termin ukazania się książki: 06-05-2026
Książkę można już zamówić z rabatem 5% |
|
654,40 |
![]() |
CISO: Evolution of a Vocation: Confessions of a Recovering CISO
ISBN: 9781041095477 / Angielski / 06-05-2026 Książka dostępna od: 06-05-2026 |
|
Termin ukazania się książki: 06-05-2026
Książkę można już zamówić z rabatem 5% |
|
267,66 |
![]() |
Mastering Modern Security: A Smarter Approach to Resilient Building Security Systems and Staying Ahead of Threats
ISBN: 9781966372004 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
107,90 |
![]() |
Cybercrime and Digital Security: Understanding threats, attacks, and defenses in the connected world (English Edition)
ISBN: 9789365895827 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
161,65 |
![]() |
Undetected: Cloud Exit Nodes for Remote Work: Cloud Exit Nodes for Remote Work: Deploying, Hardening & Optimizing Your Cloud Infrastructure: Cloud Exi
ISBN: 9781971277028 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
86,28 |
![]() |
Cybersecurity and Ethics: Understand cybersecurity through an ethical lens-identify threats, defend systems, and navigate the law (English Edition)
ISBN: 9789365893151 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
161,65 |
![]() |
CLARITY Intelligence: Wie Unternehmen KI sinnvoll einsetzen - Denkweise, Architektur und reale L?sungen aus der Praxis
ISBN: 9783982769981 / Niemiecki Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
74,41 |
![]() |
AAA and Network Security for Mobile Access: Radius, Diameter, Eap, Pki and IP Mobility
ISBN: 9780470011942 / Angielski / Twarda / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.
AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations. AAA and Network Security for... AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, a...
|
cena:
525,60 |
![]() |
802.11 Security
ISBN: 9780596002909 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your... Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for go... |
cena:
134,83 |
![]() |
Programming .Net Security: Writing Secure Applications Using C# or Visual Basic .Net
ISBN: 9780596004422 / Angielski / Miękka / 718 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to... With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthou... |
cena:
192,63 |
![]() |
Introduction to Communication Electronic Warfare Systems
ISBN: 9781580533447 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This comprehensive engineering-level resource provides you with an excellent introduction to electronic warfare (EW) for communication systems. Extensively referenced with over 600 equations, it details the components, systems, and operations of electronic warfare systems dedicated to protecting and attacking military communications networks.
This comprehensive engineering-level resource provides you with an excellent introduction to electronic warfare (EW) for communication systems. Extens...
|
cena:
816,25 |
![]() |
Hacking Voip
ISBN: 9781593271633 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and...
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet a...
|
cena:
230,38 |
![]() |
inside delphi 2006 (w/cd)
ISBN: 9781598220032 / Angielski / Miękka / 742 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Companion CD Included With The Code And Compiled Executables For Every Example In The Book Now In Its 10Th Version, Delphi Provides Users With Four Programming Languages: C++ And Delphi For Win32 For Building Windows Applications, And C# And Delphi For .NET For Building Applications That Target The .NET Platform. Inside Delphi 2006 Demonstrates How To Use All Of These Languages. Topics Include The Foundations Of Delphi, VCL Framework Programming, And .NET Programming. Learn How To Create Applications Using Delphi, C++, And C#; Design User Interfaces Using Actions And Other VCL Components;...
Companion CD Included With The Code And Compiled Executables For Every Example In The Book Now In Its 10Th Version, Delphi Provides Users With Four P...
|
cena:
205,71 |
![]() |
maya 8.0 character modeling
ISBN: 9781598220209 / Angielski / Miękka / 491 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Maya 8 Character Modeling takes a unique approach to modeling as it breaks down character creation using an easy-to-follow formula that makes the learning process less daunting. The author presents an overview of modeling basics and then shows how to block out the body, shape body parts, add details, and create joints and controls using Maya 8. By the time youve finished the book, youll have created a figure that is textured, rigged, and ready to be animated.
Maya 8 Character Modeling takes a unique approach to modeling as it breaks down character creation using an easy-to-follow formula that makes the lear...
|
cena:
186,11 |
![]() |
Advanced JavaScript
ISBN: 9781598220339 / Angielski / Miękka / 591 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Providing an in-depth examination of the most important features of JavaScript, this guide begins with an overview and quickly moves into more advanced features needed for complex yet robust scripts, such as objects, arrays, and date and time functions.
Providing an in-depth examination of the most important features of JavaScript, this guide begins with an overview and quickly moves into more advance...
|
cena:
337,94 |
![]() |
Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures
ISBN: 9783540289555 / Angielski / Miękka / 286 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The "Int- national School on Foundations of Security Analysis and Design" (FOSAD, see http: //www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea, especially for young researchers approaching the ?eld and graduate...
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing numb...
|
cena:
180,96 |
![]() |
On the Move to Meaningful Internet Systems 2005: Coopis, Doa, and Odbase: Otm Confederated International Conferences, Coopis, Doa, and Odbase 2005, Ag
ISBN: 9783540297369 / Angielski / Miękka / 917 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. Weweregladto seethatin 2005undertheinspiredleadershipofDr. Pilar Herrero, several of earlier successful workshops re-emerged with a second or even third edition (notably WOSE, MIOS-INTEROP and GADA), and that 5 new workshops could be hosted and successfully organized by their respective proposers: AWeSOMe, SWWS, CAMS, ORM and SeBGIS. We know that as before, their audiences will mutually productively mingle with those of the main conferences, as is already visible from the overlap in authors A special...
such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. Weweregladto seethatin 2005undertheinspiredleadershipofDr...
|
cena:
402,53 |
![]() |
Protocols for Authentication and Key Establishment
ISBN: 9783540431077 / Angielski / Twarda / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can be remarkably subtle. Here is a comprehensive and integrated treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. As well as a clear and uniform presentation of the... Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is... |
cena:
402,53 |
![]() |
On the Move to Meaningful Internet Systems 2006: Coopis, Doa, Gada, and Odbase: Otm Confederated International Conferences, Coopis, Doa, Gada, and Odb
ISBN: 9783540482741 / Angielski / Miękka / 750 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more archival nature of the main conferences with research results in a number of selected and more avant garde areas related to the general topic of distributed computing. For instance, the so-called Semantic Web has given rise to several novel research areas combining linguistics, information systems technology, and arti?cial int- ligence, such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. We were glad to see that several...
Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more archival nature o...
|
cena:
402,53 |