• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Computer, Network, Soft & Hard Schneidewind, Norman F. 9781118037454 IEEE Computer Society Press
Computer, Network, Soft & Hard

ISBN: 9781118037454 / Angielski / Twarda / 608 str.

ISBN: 9781118037454/Angielski/Twarda/608 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Norman Shneidewind; Norman F. Schneidewind
There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on software engineering typically portray software as if it exists in a vacuum with no relationship to the wider system. This is wrong because a system is more than software. It is comprised of people, organizations, processes, hardware, and software. All of these components must be considered in...
There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is impor...
cena: 695,73

 (Re)Inventing the Internet : Critical Case Studies Andrew Feenberg Norm Friesen  9789460917325 Sense Publishers
(Re)Inventing the Internet : Critical Case Studies

ISBN: 9789460917325 / Angielski / Miękka / 146 str.

ISBN: 9789460917325/Angielski/Miękka/146 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Feenberg;Norm Friesen
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, education, and entertainment are all still openly disputed and debated. The issues include censorship and network control, privacy and surveillance, the political impact of activist blogging, peer to peer file sharing, the effects of video games on children, and many others. Media conglomerates, governments and users all contribute to shaping the forms and functions of the Internet as the limits and potentialities of the technologies are tested and...
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, educatio...
cena: 93,48

 (Re)Inventing the Internet : Critical Case Studies Andrew Feenberg Norm Friesen  9789460917332 Sense Publishers
(Re)Inventing the Internet : Critical Case Studies

ISBN: 9789460917332 / Angielski / Twarda / 146 str.

ISBN: 9789460917332/Angielski/Twarda/146 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Feenberg;Norm Friesen
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, education, and entertainment are all still openly disputed and debated. The issues include censorship and network control, privacy and surveillance, the political impact of activist blogging, peer to peer file sharing, the effects of video games on children, and many others. Media conglomerates, governments and users all contribute to shaping the forms and functions of the Internet as the limits and potentialities of the technologies are tested and...
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, educatio...
cena: 441,93

 Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Kevin Mitnick William L. Simon Steve Wozniak 9780316037723 Back Bay Books
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

ISBN: 9780316037723 / Angielski / Miękka / 448 str.

ISBN: 9780316037723/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin Mitnick; William L. Simon; Steve Wozniak
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish...

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and howev...
cena: 88,59

 Journal of Cyber Security and Mobility Ashutosh Dutta Ruby Lee Neeli R. Prasad 9788792329752 River Publishers
Journal of Cyber Security and Mobility

ISBN: 9788792329752 / Angielski / Miękka / 156 str.

ISBN: 9788792329752/Angielski/Miękka/156 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ashutosh Dutta; Ruby Lee; Neeli R. Prasad
Aim: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects. Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT)...
Aim: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects. Covering topics that are equally valuable...
cena: 222,10

 Role Mining in Business: Taming Role-Based Access Control Administration Di Pietro, Roberto 9789814374002 World Scientific Publishing Company
Role Mining in Business: Taming Role-Based Access Control Administration

ISBN: 9789814374002 / Angielski / Twarda / 296 str.

ISBN: 9789814374002/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Colantonio; Roberto Di Pietro; Alberto Ocello
Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role design approaches proposed in the literature. It provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.
Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role desig...
cena: 431,00

 Mastering Microsoft Forefront Uag 2010 Customization Ben-Ari, Erez 9781849685382 PACKT PUBLISHING
Mastering Microsoft Forefront Uag 2010 Customization

ISBN: 9781849685382 / Angielski / Miękka / 186 str.

ISBN: 9781849685382/Angielski/Miękka/186 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Erez Ben-Ari; Rainier Amara
While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs.



With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error.



Written by some of the leading experts on UAG, “Mastering Microsoft Forefront UAG 2010 Customization” covers the most complex and challenging options for customizing UAG in a way...
While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customiz...
cena: 237,33

 Security in Embedded Devices Gebotys, Catherine H. 9781461425199 Springer, Berlin
Security in Embedded Devices

ISBN: 9781461425199 / Angielski / Miękka / 297 str.

ISBN: 9781461425199/Angielski/Miękka/297 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catherine H. Gebotys

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of...

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespr...

cena: 442,79

 IT Security Governance Innovations: Theory and Research Mellado, Daniel 9781466620834 Information Science Reference
IT Security Governance Innovations: Theory and Research

ISBN: 9781466620834 / Angielski / Twarda / 372 str.

ISBN: 9781466620834/Angielski/Twarda/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
E. Fernandez-Medina; D. Mellado; M. Piattini
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best...
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a techni...
cena: 999,40

 Security Engineering for Cloud Computing: Approaches and Tools Rosado, David G. 9781466621251 Information Science Reference
Security Engineering for Cloud Computing: Approaches and Tools

ISBN: 9781466621251 / Angielski / Twarda / 258 str.

ISBN: 9781466621251/Angielski/Twarda/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David G. Rosado; Mario Piattini; D. Mellado
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tool...
cena: 999,40

 Transactions on Data Hiding and Multimedia Security VIII Yun Q. Shi 9783642319709 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security VIII

ISBN: 9783642319709 / Angielski / Miękka / 103 str.

ISBN: 9783642319709/Angielski/Miękka/103 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
cena: 201,24

 Secure Integrated Circuits and Systems Ingrid M. R. Verbauwhede 9781461425663 Springer
Secure Integrated Circuits and Systems

ISBN: 9781461425663 / Angielski / Miękka / 246 str.

ISBN: 9781461425663/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ingrid M. R. Verbauwhede

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed,...

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the ...

cena: 402,53

 Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings Fischer-Hübner, Simone 9783642322860 Springer
Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings

ISBN: 9783642322860 / Angielski / Miękka / 242 str.

ISBN: 9783642322860/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-H Bner; Sokratis Katsikas; Gerald Quirchmayr
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vi...
cena: 185,18

 Lte Security Forsberg, Dan 9781118355589 John Wiley & Sons
Lte Security

ISBN: 9781118355589 / Angielski / Twarda / 368 str.

ISBN: 9781118355589/Angielski/Twarda/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gunther Horn

A concise, updated guide to the 3GPP LTE Security Standardization specifications

A welcome Revised Edition of the successful LTE Security addressing the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies...

A concise, updated guide to the 3GPP LTE Security Standardization specifications

A welcome Revised Edition of the successful LTE S...

cena: 484,35

 Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure Derrick Rountree 9781597499583 Syngress; Elsevier
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

ISBN: 9781597499583 / Angielski / Miękka / 239 str.

ISBN: 9781597499583/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Derrick Rountree

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including:

  • Secure remote access
  • Network vulnerabilities and mitigations
  • DHCP installations configuration
  • MAC filtering
  • DNS server security
  • WINS installation configuration
  • Securing wired and wireless connections
  • Windows personal firewall...

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills...

cena: 171,37

 Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers Frederik Armknecht, Stefan Lucks 9783642341588 Springer-Verlag Berlin and Heidelberg GmbH &
Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers

ISBN: 9783642341588 / Angielski / Miękka / 151 str.

ISBN: 9783642341588/Angielski/Miękka/151 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frederik Armknecht;Stefan Lucks
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code...
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in...
cena: 185,18

 Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing Bogdan Patrut 9781466628540 Business Science Reference
Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing

ISBN: 9781466628540 / Angielski / Twarda / 454 str.

ISBN: 9781466628540/Angielski/Twarda/454 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bogdan Patrut
Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant concerns that need to be taken into account. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing aims to present insight into Cloud principles, examine associated methods and technologies,...
Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific...
cena: 948,15

 Quantum Age of It (The) It Governance 9781849283755 It Governance Ltd
Quantum Age of It (The)

ISBN: 9781849283755 / Angielski / Miękka / 324 str.

ISBN: 9781849283755/Angielski/Miękka/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
It Governance; Charlie Araujo
'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing perceptions of how technology should work and newfound, but very real, competition, IT organizations are struggling to evolve - but into what? In The Quantum Age of IT, Charles Araujo examines what has led us to this point and what it means to the future of IT organizations. With a broad perspective on the fundamental changes affecting the industry, he offers practical guidance that every IT professional needs to compete in this new era of IT. Whether...
'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing percepti...
cena: 202,27

 The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic Shimonski, Robert 9780124104136 Not Avail
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

ISBN: 9780124104136 / Angielski / Miękka / 128 str.

ISBN: 9780124104136/Angielski/Miękka/128 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features.

The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill...

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively b...

cena: 127,29

 Encryption for Digital Content Aggelos Kiayias Serdar Pehlivanoglu 9781461427216 Springer
Encryption for Digital Content

ISBN: 9781461427216 / Angielski / Miękka / 209 str.

ISBN: 9781461427216/Angielski/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias; Serdar Pehlivanoglu

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

Encryption for Digital Content...

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth...

cena: 402,53

Pierwsza Podprzednia  73  74  75  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia