![]() |
Building an Intelligence-Led Security Program
ISBN: 9780128021453 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network.... As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the... |
cena:
235,04 |
![]() |
Security Controls Evaluation, Testing, and Assessment Handbook
ISBN: 9780128023242 / Angielski / Miękka / 678 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of... Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testi... |
cena:
288,92 |
![]() |
Wireshark Essentials
ISBN: 9781783554638 / Angielski / Miękka / 194 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
116,49 |
![]() |
Untangle Network Security
ISBN: 9781849517720 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
211,44 |
![]() |
Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices
ISBN: 9780128022221 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with... In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technolo... |
cena:
235,04 |
![]() |
Model-Driven Risk Analysis: The Coras Approach
ISBN: 9783642447013 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a...
The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security ri...
|
cena:
201,24 |
![]() |
Computational Methods for Counterterrorism
ISBN: 9783642426131 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical structures, religious and ideological motivations, and predominantly non-territorial objectives. Governments and militaries are crafting new policies and doctrines to combat terror, but they desperately need new technologies to make these efforts effective. This book collects a wide range of the most current computational research that addresses critical issues for countering terrorism, including:... Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radi... |
cena:
402,53 |
![]() |
Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice
ISBN: 9788793237216 / Angielski / Miękka / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and diverse datasets. Big Data presents not only a world of new opportunities but also new challenges. With threats multiplying exponentially, the ability to gather and analyze massive information will be a decisive factor in the battle against malicious software and adversaries. It is natural to consider a cloud-computing environment to address the computational requirements for big data analytic applications. However, it is equally important to...
We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and dive...
|
cena:
222,10 |
![]() |
Cybersecurity for Everyone: Securing Your Home or Small Business Network
ISBN: 9781940145365 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business. -Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident. There were eight mega breaches in 2013, compared with only one in 2012. - Viruses and Malware. Some security experts estimate there are more than 250,000 new malware variants...
Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make us...
|
cena:
81,77 |
![]() |
Don't Fall Victim to Identity Theft: How to Protect Your Name from Being Used Without Your Consent
ISBN: 9781635014310 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reading a book about identity theft and how to protect yourself could help you be able to keep your identity private and yours. The book can help by explaining exactly what identity theft is, how it occurs, what information the thieves would be after, how to protect your private information from anyone looking for it, and even how to help you if you are already a victim of identity theft.
Reading a book about identity theft and how to protect yourself could help you be able to keep your identity private and yours. The book can help by e...
|
cena:
50,05 |
![]() |
Advanced Malware Analysis
ISBN: 9780071819749 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then,... A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analy... |
cena:
308,28 |
![]() |
Transactions on Data Hiding and Multimedia Security X
ISBN: 9783662467381 / Angielski / Miękka / 107 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
|
cena:
161,03 |
![]() |
Zabbix Cookbook
ISBN: 9781784397586 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
211,44 |
![]() |
Elastix Unified Communications Server Cookbook
ISBN: 9781849519342 / Angielski / Miękka / 348 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Android Programming Concepts
ISBN: 9781284070705 / Angielski / Twarda / 834 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Each New Print Copy Includes Navigate 2 Advantage Access That Unlocks A Complete Ebook, Study Center, Homework And Assessment Center, And A Dashboard That Reports Actionable Data. Using A Hands-On, Student-Friendly Approach, Android Programming Concepts Provides A Comprehensive Foundation For The Development Of Mobile Applications For Devices And Tablets Powered By Android. This Text Offers In-Depth Coverage Of The Topics Outlined By The Official Android Developer API Guides, Leading A Programmer With Object Oriented Programming Skills Through The App Development Process. Each Chapter...
Each New Print Copy Includes Navigate 2 Advantage Access That Unlocks A Complete Ebook, Study Center, Homework And Assessment Center, And A Dashboard ...
|
cena:
509,37 |
![]() |
A Guide to Enterprise Networking Technology: Volume 1
ISBN: 9781491762639 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you've ever wondered why books on information technology seem so complicated, then you're not alone. Manju Devaraj, an Expert in enterprise networks, routing and switching technology, takes you on a wonderful exploration into the world of computers in this easy-to-follow guidebook written for both beginning and advanced engineers. He provides a framework so you can easily understand network connections and network devices, switching technology intelligence and types, and the foundations of Network Architecture. There's also a fascinating section on how to build highly available... If you've ever wondered why books on information technology seem so complicated, then you're not alone. Manju Devaraj, an Expert in enterprise n... |
cena:
153,95 |
![]() |
Nmap Essentials
ISBN: 9781783554065 / Angielski / Miękka / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
116,49 |
![]() |
Cloud Foundry: The Definitive Guide: Develop, Deploy, and Scale
ISBN: 9781491932438 / Angielski / Miękka / 322 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How can Cloud Foundry help you develop and deploy business-critical applications and tasks with velocity? This practical guide demonstrates how this open source, cloud-native application platform not only significantly reduces the develop-to-deploy cycle time, but also raises the value line for application operators by changing the way applications and supporting services are deployed and run. Learn how Cloud Foundry can help you improve your product velocity by handling many of essential tasks required to run applications in production. Author Duncan Winn shows DevOps and operations... How can Cloud Foundry help you develop and deploy business-critical applications and tasks with velocity? This practical guide demonstrates how thi... |
cena:
206,17 |
![]() |
America is Under Cyber Attack: Why Urgent Action is Needed
ISBN: 9781484826157 / Angielski / Miękka / 64 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
68,59 |
![]() |
Security in Wireless Sensor Networks
ISBN: 9783319212685 / Angielski / Twarda / 87 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security in Wireless Sensor Networks
Security in Wireless Sensor Networks
|
cena:
402,53 |