• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Journal of Cyber Security and Mobility 2-1 Ashutosh Dutta Ruby Lee R. Neeli Prasad 9788792982599 River Publishers
Journal of Cyber Security and Mobility 2-1

ISBN: 9788792982599 / Angielski / Miękka / 112 str.

ISBN: 9788792982599/Angielski/Miękka/112 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ashutosh Dutta; Ruby Lee; R. Neeli Prasad
cena: 222,10

 Femtocells: Secure Communication and Networking Marcus Wong   9788792982858 River Publishers
Femtocells: Secure Communication and Networking

ISBN: 9788792982858 / Angielski / Twarda / 228 str.

ISBN: 9788792982858/Angielski/Twarda/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcus Wong
With Femtocell popularities and deployments on the rise, a number of Femtocell security breaches have been reported. This is a result of pre-standards Femtocells versions that did not conform to or implement the published standards as a result of lack of understanding of basic security principles. A considerable amount of effort has been devoted, both in industry forums and standards developing organizations, toward creating technical specifications for the architecture, operation, and security of the Femtocells. Security remains on the minds of operators as the traditionally closed operator...
With Femtocell popularities and deployments on the rise, a number of Femtocell security breaches have been reported. This is a result of pre-standards...
cena: 514,26

 The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory AAron Walters 9781118825099 John Wiley & Sons Inc
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

ISBN: 9781118825099 / Angielski / Miękka / 912 str.

ISBN: 9781118825099/Angielski/Miękka/912 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
AAron Walters
Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,...

Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memo...

cena: 268,09

 Getting Started with Fortigate Volpe, Fabrizio 9781782178200 Packt Publishing
Getting Started with Fortigate

ISBN: 9781782178200 / Angielski / Miękka / 126 str.

ISBN: 9781782178200/Angielski/Miękka/126 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fabrizio Volpe; Fabbri Rosato
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
cena: 142,38

 Monitoring with Opsview Alan Wijntje   9781783284733 Packt Publishing
Monitoring with Opsview

ISBN: 9781783284733 / Angielski / Miękka / 158 str.

ISBN: 9781783284733/Angielski/Miękka/158 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alan Wijntje
Leverage the power of Opsview to effectively monitor your physical, virtual, and private cloud infrastructure. Add plugins to Windows and Linux agents and set up vSphere monitoring successfully.
Leverage the power of Opsview to effectively monitor your physical, virtual, and private cloud infrastructure. Add plugins to Windows and Linux agents...
cena: 142,38

 Penetration Testing with Backbox Umit Uygur, Stefan 9781783282975 Packt Publishing
Penetration Testing with Backbox

ISBN: 9781783282975 / Angielski / Miękka / 130 str.

ISBN: 9781783282975/Angielski/Miękka/130 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Umit Uygur
cena: 142,38

 Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware Sood, Aditya 9780128006047 SYNGRESS MEDIA
Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware

ISBN: 9780128006047 / Angielski / Miękka / 158 str.

ISBN: 9780128006047/Angielski/Miękka/158 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aditya Sood

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.

Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of...

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Ta...

cena: 117,50

 Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography Yun Q. Shi, Feng Liu, Weiqi Yan 9783642550454 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography

ISBN: 9783642550454 / Angielski / Miękka / 131 str.

ISBN: 9783642550454/Angielski/Miękka/131 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi;Feng Liu;Weiqi Yan
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
cena: 201,24

 Social Engineering in IT Security: Tools, Tactics, and Techniques Sharon Conheady 9780071818469 MCGRAW-HILL Professional
Social Engineering in IT Security: Tools, Tactics, and Techniques

ISBN: 9780071818469 / Angielski / Miękka / 272 str.

ISBN: 9780071818469/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sharon Conheady
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything you] need to know about the fundamentals of the topic."--Slashdot

Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you...
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything you] need to know about the fundamentals of ...
cena: 188,82

 Journal of Cyber Security and Mobility 2-3/4 Ashutosh Dutta (Telcordia) Ruby Lee Neeli R Prasad 9788793102927 River Publishers
Journal of Cyber Security and Mobility 2-3/4

ISBN: 9788793102927 / Angielski / Miękka / 170 str.

ISBN: 9788793102927/Angielski/Miękka/170 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ashutosh Dutta (Telcordia);Ruby Lee;Neeli R Prasad
cena: 222,10

 Computer Networks: 21st International Conference, Cn 2014, Brunów, Poland, June 23-27, 2014. Proceedings Kwiecien, Andrzej 9783319079400 Springer
Computer Networks: 21st International Conference, Cn 2014, Brunów, Poland, June 23-27, 2014. Proceedings

ISBN: 9783319079400 / Angielski / Miękka / 349 str.

ISBN: 9783319079400/Angielski/Miękka/349 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrzej Kwiecien; Piotr Gaj; Piotr Stera
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Networks, CN 2014, held in Brunow, Poland, in June 2014. The 34 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, tele informatics and communications, new technologies, queueing theory, innovative applications and networked and IT-related aspects of e-business.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Networks, CN 2014, held in Brunow, Poland, ...
cena: 201,24

 Network Topology in Command and Control: Organization, Operation, and Evolution T. J. Grant R. H. P. Janssen H. Monsuur 9781466660588 Information Science Reference
Network Topology in Command and Control: Organization, Operation, and Evolution

ISBN: 9781466660588 / Angielski / Twarda / 352 str.

ISBN: 9781466660588/Angielski/Twarda/352 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
T. J. Grant; R. H. P. Janssen; H. Monsuur
cena: 1101,91

 Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications Igor Kotenko George Markowsky  9788793102965 River Publishers
Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications

ISBN: 9788793102965 / Angielski / Miękka / 96 str.

ISBN: 9788793102965/Angielski/Miękka/96 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Igor Kotenko;George Markowsky
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last...
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defen...
cena: 222,10

 Managing Online Risk: Apps, Mobile, and Social Media Security Gonzalez, Deborah 9780124200555 Butterworth-Heinemann
Managing Online Risk: Apps, Mobile, and Social Media Security

ISBN: 9780124200555 / Angielski / Miękka / 271 str.

ISBN: 9780124200555/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Deborah Gonzalez

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.

Managing Online Risk highlights security and risk management best practices that address concerns such as...

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ...

cena: 137,09

 Cyber Crime and Cyber Terrorism Investigator's Handbook Babak Akhgar Andrew Staniforth Francesca Bosco 9780128007433 Syngress Publishing
Cyber Crime and Cyber Terrorism Investigator's Handbook

ISBN: 9780128007433 / Angielski / Miękka / 306 str.

ISBN: 9780128007433/Angielski/Miękka/306 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Babak Akhgar; Andrew Staniforth; Francesca Bosco

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.

Cyber Crime and Cyber Terrorism Investigator's Handbook...

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and invest...

cena: 195,86

 Hacking and Penetration Testing with Low Power Devices Philip Polstra 9780128007518 Syngress Publishing
Hacking and Penetration Testing with Low Power Devices

ISBN: 9780128007518 / Angielski / Miękka / 260 str.

ISBN: 9780128007518/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philip Polstra

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more.

Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author...

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are ...

cena: 203,26

 Cyber Reconnaissance, Surveillance and Defense Robert Shimonski 9780128013083 Syngress Publishing
Cyber Reconnaissance, Surveillance and Defense

ISBN: 9780128013083 / Angielski / Miękka / 258 str.

ISBN: 9780128013083/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Shimonski

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.

Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks,...

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, C...

cena: 230,14

 Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security Roger Piqueras Jover   9788793237056 River Publishers
Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security

ISBN: 9788793237056 / Angielski / Miękka / 148 str.

ISBN: 9788793237056/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roger Piqueras Jover
The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and...
The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanc...
cena: 222,10

 Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Bryan Parno   9781627054775 ACM Books
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

ISBN: 9781627054775 / Angielski / Miękka / 207 str.

ISBN: 9781627054775/Angielski/Miękka/207 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bryan Parno
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. I argue that we can resolve the tension between security and features by leveraging the...
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections f...
cena: 254,68

 Smart Grid Security: Innovative Solutions for a Modernized Grid Skopik, Florian 9780128021224 Elsevier Science
Smart Grid Security: Innovative Solutions for a Modernized Grid

ISBN: 9780128021224 / Angielski / Miękka / 324 str.

ISBN: 9780128021224/Angielski/Miękka/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down...

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and ne...

cena: 406,51

Pierwsza Podprzednia  73  74  75  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia