• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Theory and Practice of Cryptography Solutions for Secure Information Systems Atilla Eli Josef Pieprzyk Alexander G. Chefranov 9781466640306 Information Science Reference
Theory and Practice of Cryptography Solutions for Secure Information Systems

ISBN: 9781466640306 / Angielski / Twarda / 612 str.

ISBN: 9781466640306/Angielski/Twarda/612 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Atilla Eli; Josef Pieprzyk; Alexander G. Chefranov
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of...
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business...
cena: 999,40

 Computer Networks: 20th International Conference, Cn 2013, Lwowek Slaski, Poland, June 17-21, 2013. Proceedings Kwiecien, Andrzej 9783642388644 Springer
Computer Networks: 20th International Conference, Cn 2013, Lwowek Slaski, Poland, June 17-21, 2013. Proceedings

ISBN: 9783642388644 / Angielski / Miękka / 594 str.

ISBN: 9783642388644/Angielski/Miękka/594 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrzej Kwiecien; Piotr Gaj; Piotr Stera
This book constitutes the refereed proceedings of the 20th International Conference on Computer Networks, CN 2013, held in Lwowek Slaski, Poland, in June 2013. The 58 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, network architectural issues, Internet and wireless solutions, teleinformatics and communications, new technologies, queueing theory and queueing networks, innovative applications, networking in e-business, security aspects of hardware and software,...
This book constitutes the refereed proceedings of the 20th International Conference on Computer Networks, CN 2013, held in Lwowek Slaski, Poland, in J...
cena: 201,24

 Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems Ovidiu Vermesan Peter Friess 9788792982735 River Publishers
Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems

ISBN: 9788792982735 / Angielski / Twarda / 364 str.

ISBN: 9788792982735/Angielski/Twarda/364 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ovidiu Vermesan; Peter Friess
Today, we see the integration of Industrial, Business, and Consumer Internet. This integration is bringing together the Internet of People, Internet of Things, Internet of Energy, Internet of Vehicles, and Internet of Media, Services, and Enterprises. In this way, it forms the backbone of the digital economy and digital society and the foundation for the future knowledge and innovation-based economy in supporting solutions for the emerging challenges of public health, aging population, environmental protection and climate change, the conservation of energy and scarce materials, enhancements...
Today, we see the integration of Industrial, Business, and Consumer Internet. This integration is bringing together the Internet of People, Internet o...
cena: 587,73

 Securing the Clicks: Network Security in the Age of Social Media Bahadur, Gary 9780071769051 McGraw-Hill Osborne
Securing the Clicks: Network Security in the Age of Social Media

ISBN: 9780071769051 / Angielski / Miękka / 368 str.

ISBN: 9780071769051/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gary Bahadur
Defend against corporate espionage launched from social networks

Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive...

Defend against corporate espionage launched from social networks

Protect your organization from devastating social media attacks with instruction f...

cena: 154,14

 Reverse Deception: Organized Cyber Threat Counter-Exploitation Sean Bodmer 9780071772495 0
Reverse Deception: Organized Cyber Threat Counter-Exploitation

ISBN: 9780071772495 / Angielski / Miękka / 464 str.

ISBN: 9780071772495/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Bodmer

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and...

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in t...

cena: 200,38

 Web Application Security Sullivan, Bryan 9780071776165 0
Web Application Security

ISBN: 9780071776165 / Angielski / Miękka / 352 str.

ISBN: 9780071776165/Angielski/Miękka/352 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bryan Sullivan
Security Smarts for the Self-Guided IT Professional

"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc.

Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious...

Security Smarts for the Self-Guided IT Professional

"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess...

cena: 200,38

 Hacking Exposed 7 George Kurtz 9780071780285 McGraw-Hill Education - Europe
Hacking Exposed 7

ISBN: 9780071780285 / Angielski / Miękka / 768 str.

ISBN: 9780071780285/Angielski/Miękka/768 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Kurtz

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment

"Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the...

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s...

cena: 235,06

 Malware, Rootkits & Botnets Elisan, Christopher 9780071792066 0
Malware, Rootkits & Botnets

ISBN: 9780071792066 / Angielski / Miękka / 432 str.

ISBN: 9780071792066/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Elisan
Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for...

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the m...

cena: 200,38

 Incident Response & Computer Forensics, Third Edition Kevin Mandia 9780071798686 McGraw-Hill Education - Europe
Incident Response & Computer Forensics, Third Edition

ISBN: 9780071798686 / Angielski / Miękka / 624 str.

ISBN: 9780071798686/Angielski/Miękka/624 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin Mandia
The definitive guide to incident response--updated for the first time in a decade

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks.

...
The definitive guide to incident response--updated for the first time in a decade

Thoroughly revised to cover the latest and most effective tools ...

cena: 251,57

 Anti-Hacker Tool Kit, Fourth Edition Mike Shema 9780071800143 0
Anti-Hacker Tool Kit, Fourth Edition

ISBN: 9780071800143 / Angielski / Miękka / 624 str.

ISBN: 9780071800143/Angielski/Miękka/624 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Shema
Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,...

cena: 211,94

 Computer Forensics and Digital Investigation with EnCase Forensic v7 Suzanne Widup 9780071807913 0
Computer Forensics and Digital Investigation with EnCase Forensic v7

ISBN: 9780071807913 / Angielski / Miękka / 448 str.

ISBN: 9780071807913/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Suzanne Widup
Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample...

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital inve...

cena: 235,06

 Hacking Exposed Mobile: Security Secrets & Solutions Bergman, Neil 9780071817011 0
Hacking Exposed Mobile: Security Secrets & Solutions

ISBN: 9780071817011 / Angielski / Miękka / 320 str.

ISBN: 9780071817011/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joel Scambray
Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior...

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The autho...

cena: 235,06

 Practical Anonymity: Hiding in Plain Sight Online Pete Loshin 9780124104044 0
Practical Anonymity: Hiding in Plain Sight Online

ISBN: 9780124104044 / Angielski / Miękka / 130 str.

ISBN: 9780124104044/Angielski/Miękka/130 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pete Loshin

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be...

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activis...

cena: 102,81

 Protecting Industrial Control Systems from Electronic Threat  Weiss 9781606501979 0
Protecting Industrial Control Systems from Electronic Threat

ISBN: 9781606501979 / Angielski / Twarda / 338 str.

ISBN: 9781606501979/Angielski/Twarda/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Weiss
Suitable for both the novice and expert in IT security and industrial control systems (ICS), this book helps readers gain a better understanding of protecting ICSs from electronic threats. It features include: how to better understand the convergence between Industrial Control Systems (ICS) and general IT systems; and more.
Suitable for both the novice and expert in IT security and industrial control systems (ICS), this book helps readers gain a better understanding of pr...
cena: 445,69

 Backtrack - Testing Wireless Network Security Cardwell, Kevin 9781782164067 0
Backtrack - Testing Wireless Network Security

ISBN: 9781782164067 / Angielski / Miękka / 108 str.

ISBN: 9781782164067/Angielski/Miękka/108 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin Cardwell
Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In the majority of cases, the default settings for your networks are not enough to protect you. With your data being transferred over the air, it can be easily plucked and used by anyone who knows how. Don't let it happen to you. BackTrack - Testing Wireless Network Security will help you secure your wireless networks and keep your personal data safe. With this book, you will learn how to configure your hardware for optimum security, find network...
Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In th...
cena: 142,38

 Microsoft System Center 2012 Endpoint Protection Cookbook A Plue 9781849683906 0
Microsoft System Center 2012 Endpoint Protection Cookbook

ISBN: 9781849683906 / Angielski / Miękka / 208 str.

ISBN: 9781849683906/Angielski/Miękka/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A Plue
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems against threats with leading malware detection technologies. Built on Configuration Manager, it provides a unified infrastructure for client security and compliance management and "Microsoft System Center 2012 Endpoint Protection Cookbook" will help you get to grips with vital tasks for implementing this security tool. With the release of System Center 2012 Endpoint Protection, Microsoft is continuing its commitment to offering a cutting edge,...
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems...
cena: 211,44

 Microsoft Forefront Identity Manager 2010 R2 Handbook Kent Nordstrom 9781849685368 0
Microsoft Forefront Identity Manager 2010 R2 Handbook

ISBN: 9781849685368 / Angielski / Miękka / 446 str.

ISBN: 9781849685368/Angielski/Miękka/446 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kent Nordstrom
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems. The "Microsoft Forefront Identity Manager 2010 R2 Handbook" is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting. Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for...
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastru...
cena: 263,22

 Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications Rawat                                    Danda B. Rawat Bhed B. Bista 9781466646919 Information Science Reference
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

ISBN: 9781466646919 / Angielski / Twarda / 577 str.

ISBN: 9781466646919/Angielski/Twarda/577 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rawat; Danda B. Rawat; Bhed B. Bista
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current...
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
cena: 999,40

 Selinux Policy Administration Vermeulen, Sven 9781783283170 Packt Publishing
Selinux Policy Administration

ISBN: 9781783283170 / Angielski / Miękka / 120 str.

ISBN: 9781783283170/Angielski/Miękka/120 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sven Vermeulen
NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security measure. SELinux System Administration covers the majority of SELinux features through a mix of real-life scenarios, descriptions, and examples. Everything an administrator needs to further tune SELinux to suit their needs are present in this book. This book...
NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access ...
cena: 159,64

 Journal of Cyber Security and Mobility 1-2/3 Ashutosh Dutta Ruby Lee Neeli R. Prasad 9788792982117 River Publishers
Journal of Cyber Security and Mobility 1-2/3

ISBN: 9788792982117 / Angielski / Miękka / 154 str.

ISBN: 9788792982117/Angielski/Miękka/154 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ashutosh Dutta; Ruby Lee; Neeli R. Prasad
cena: 222,10

Pierwsza Podprzednia  73  74  75  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia