![]() |
Computer, Network, Soft & Hard
ISBN: 9781118037454 / Angielski / Twarda / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on software engineering typically portray software as if it exists in a vacuum with no relationship to the wider system. This is wrong because a system is more than software. It is comprised of people, organizations, processes, hardware, and software. All of these components must be considered in...
There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is impor...
|
cena:
695,73 |
![]() |
(Re)Inventing the Internet : Critical Case Studies
ISBN: 9789460917325 / Angielski / Miękka / 146 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, education, and entertainment are all still openly disputed and debated. The issues include censorship and network control, privacy and surveillance, the political impact of activist blogging, peer to peer file sharing, the effects of video games on children, and many others. Media conglomerates, governments and users all contribute to shaping the forms and functions of the Internet as the limits and potentialities of the technologies are tested and...
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, educatio...
|
cena:
93,48 |
![]() |
(Re)Inventing the Internet : Critical Case Studies
ISBN: 9789460917332 / Angielski / Twarda / 146 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, education, and entertainment are all still openly disputed and debated. The issues include censorship and network control, privacy and surveillance, the political impact of activist blogging, peer to peer file sharing, the effects of video games on children, and many others. Media conglomerates, governments and users all contribute to shaping the forms and functions of the Internet as the limits and potentialities of the technologies are tested and...
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, educatio...
|
cena:
441,93 |
![]() |
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
ISBN: 9780316037723 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish...
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and howev...
|
cena:
88,59 |
![]() |
Journal of Cyber Security and Mobility
ISBN: 9788792329752 / Angielski / Miękka / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Aim: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects. Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT)...
Aim: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects. Covering topics that are equally valuable...
|
cena:
222,10 |
![]() |
Role Mining in Business: Taming Role-Based Access Control Administration
ISBN: 9789814374002 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role design approaches proposed in the literature. It provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.
Suitable for all academics, IT and business professionals, this book explores role mining algorithms and offers insights into the automated role desig...
|
cena:
431,00 |
![]() |
Mastering Microsoft Forefront Uag 2010 Customization
ISBN: 9781849685382 / Angielski / Miękka / 186 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs.
With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error. Written by some of the leading experts on UAG, Mastering Microsoft Forefront UAG 2010 Customization covers the most complex and challenging options for customizing UAG in a way... While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customiz...
|
cena:
237,33 |
![]() |
Security in Embedded Devices
ISBN: 9781461425199 / Angielski / Miękka / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of... Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespr... |
cena:
442,79 |
![]() |
IT Security Governance Innovations: Theory and Research
ISBN: 9781466620834 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best...
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a techni...
|
cena:
999,40 |
![]() |
Security Engineering for Cloud Computing: Approaches and Tools
ISBN: 9781466621251 / Angielski / Twarda / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tool...
|
cena:
999,40 |
![]() |
Transactions on Data Hiding and Multimedia Security VIII
ISBN: 9783642319709 / Angielski / Miękka / 103 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
|
cena:
201,24 |
![]() |
Secure Integrated Circuits and Systems
ISBN: 9781461425663 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed,... On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the ... |
cena:
402,53 |
![]() |
Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings
ISBN: 9783642322860 / Angielski / Miękka / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vi...
|
cena:
185,18 |
![]() |
Lte Security
ISBN: 9781118355589 / Angielski / Twarda / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies... A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE S... |
cena:
484,35 |
![]() |
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
ISBN: 9781597499583 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including:
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills... |
cena:
171,37 |
![]() |
Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers
ISBN: 9783642341588 / Angielski / Miękka / 151 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code...
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in...
|
cena:
185,18 |
![]() |
Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing
ISBN: 9781466628540 / Angielski / Twarda / 454 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant concerns that need to be taken into account. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing aims to present insight into Cloud principles, examine associated methods and technologies,...
Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific...
|
cena:
948,15 |
![]() |
Quantum Age of It (The)
ISBN: 9781849283755 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. 'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing perceptions of how technology should work and newfound, but very real, competition, IT organizations are struggling to evolve - but into what? In The Quantum Age of IT, Charles Araujo examines what has led us to this point and what it means to the future of IT organizations. With a broad perspective on the fundamental changes affecting the industry, he offers practical guidance that every IT professional needs to compete in this new era of IT. Whether...
'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing percepti...
|
cena:
202,27 |
![]() |
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic
ISBN: 9780124104136 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill... The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively b... |
cena:
127,29 |
![]() |
Encryption for Digital Content
ISBN: 9781461427216 / Angielski / Miękka / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content... Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth... |
cena:
402,53 |