• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Building an Intelligence-Led Security Program Allan Liska 9780128021453 SYNGRESS MEDIA
Building an Intelligence-Led Security Program

ISBN: 9780128021453 / Angielski / Miękka / 200 str.

ISBN: 9780128021453/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Allan Liska

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.

Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network....

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the...

cena: 235,04

 Security Controls Evaluation, Testing, and Assessment Handbook Johnson, Leighton 9780128023242 SYNGRESS MEDIA
Security Controls Evaluation, Testing, and Assessment Handbook

ISBN: 9780128023242 / Angielski / Miękka / 678 str.

ISBN: 9780128023242/Angielski/Miękka/678 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Leighton Johnson

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of...

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testi...

cena: 288,92

 Wireshark Essentials James H Baxter   9781783554638 Packt Publishing
Wireshark Essentials

ISBN: 9781783554638 / Angielski / Miękka / 194 str.

ISBN: 9781783554638/Angielski/Miękka/194 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James H Baxter
cena: 116,49

 Untangle Network Security Abd El-Monem a El-Bawab   9781849517720 Packt Publishing
Untangle Network Security

ISBN: 9781849517720 / Angielski / Miękka / 368 str.

ISBN: 9781849517720/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abd El-Monem a El-Bawab
cena: 211,44

 Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices Amiri   9780128022221 Syngress Publishing
Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices

ISBN: 9780128022221 / Angielski / Miękka / 72 str.

ISBN: 9780128022221/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Amiri

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with...

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technolo...

cena: 235,04

 Model-Driven Risk Analysis: The Coras Approach Lund, Mass Soldal 9783642447013 Springer
Model-Driven Risk Analysis: The Coras Approach

ISBN: 9783642447013 / Angielski / Miękka / 460 str.

ISBN: 9783642447013/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mass Soldal Lund;Bjornar Solhaug;Ketil Stolen
The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a...
The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security ri...
cena: 201,24

 Computational Methods for Counterterrorism Shlomo Argamon Newton Howard  9783642426131 Springer
Computational Methods for Counterterrorism

ISBN: 9783642426131 / Angielski / Miękka / 306 str.

ISBN: 9783642426131/Angielski/Miękka/306 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shlomo Argamon;Newton Howard

Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical structures, religious and ideological motivations, and predominantly non-territorial objectives. Governments and militaries are crafting new policies and doctrines to combat terror, but they desperately need new technologies to make these efforts effective.

This book collects a wide range of the most current computational research that addresses critical issues for countering terrorism, including:...

Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radi...

cena: 402,53

 Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice Jiang Bian Remzi Seker Kenji Yoshigoe 9788793237216 River Publishers
Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice

ISBN: 9788793237216 / Angielski / Miękka / 134 str.

ISBN: 9788793237216/Angielski/Miękka/134 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jiang Bian;Remzi Seker;Kenji Yoshigoe
We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and diverse datasets. Big Data presents not only a world of new opportunities but also new challenges. With threats multiplying exponentially, the ability to gather and analyze massive information will be a decisive factor in the battle against malicious software and adversaries. It is natural to consider a cloud-computing environment to address the computational requirements for big data analytic applications. However, it is equally important to...
We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and dive...
cena: 222,10

 Cybersecurity for Everyone: Securing Your Home or Small Business Network Terence L. Sadler 9781940145365 Signalman Publishing
Cybersecurity for Everyone: Securing Your Home or Small Business Network

ISBN: 9781940145365 / Angielski / Miękka / 138 str.

ISBN: 9781940145365/Angielski/Miękka/138 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Terence L. Sadler
Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business. -Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident. There were eight mega breaches in 2013, compared with only one in 2012. - Viruses and Malware. Some security experts estimate there are more than 250,000 new malware variants...
Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make us...
cena: 81,77

 Don't Fall Victim to Identity Theft: How to Protect Your Name from Being Used Without Your Consent Brian Lewis 9781635014310 Speedy Publishing LLC
Don't Fall Victim to Identity Theft: How to Protect Your Name from Being Used Without Your Consent

ISBN: 9781635014310 / Angielski / Miękka / 60 str.

ISBN: 9781635014310/Angielski/Miękka/60 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brian Lewis
Reading a book about identity theft and how to protect yourself could help you be able to keep your identity private and yours. The book can help by explaining exactly what identity theft is, how it occurs, what information the thieves would be after, how to protect your private information from anyone looking for it, and even how to help you if you are already a victim of identity theft.
Reading a book about identity theft and how to protect yourself could help you be able to keep your identity private and yours. The book can help by e...
cena: 50,05

 Advanced Malware Analysis Christopher Elisan 9780071819749 McGraw-Hill/Osborne Media
Advanced Malware Analysis

ISBN: 9780071819749 / Angielski / Miękka / 544 str.

ISBN: 9780071819749/Angielski/Miękka/544 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Elisan
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings

Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.

After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then,...

A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings

Advanced Malware Analy...

cena: 308,28

 Transactions on Data Hiding and Multimedia Security X Shi                                      Yun Q. Shi 9783662467381 Springer
Transactions on Data Hiding and Multimedia Security X

ISBN: 9783662467381 / Angielski / Miękka / 107 str.

ISBN: 9783662467381/Angielski/Miękka/107 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shi; Yun Q. Shi
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
cena: 161,03

 Zabbix Cookbook Patrik Uytterhoeven   9781784397586 Packt Publishing
Zabbix Cookbook

ISBN: 9781784397586 / Angielski / Miękka / 260 str.

ISBN: 9781784397586/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrik Uytterhoeven
cena: 211,44

 Elastix Unified Communications Server Cookbook Gerardo Baraja 9781849519342 Packt Publishing
Elastix Unified Communications Server Cookbook

ISBN: 9781849519342 / Angielski / Miękka / 348 str.

ISBN: 9781849519342/Angielski/Miękka/348 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerardo Barajas Puente
cena: 237,33

 Android Programming Concepts Trish Cornez Richard Cornez Patricia Cornez 9781284070705 Jones & Bartlett Publishers
Android Programming Concepts

ISBN: 9781284070705 / Angielski / Twarda / 834 str.

ISBN: 9781284070705/Angielski/Twarda/834 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Trish Cornez; Richard Cornez; Patricia Cornez
Each New Print Copy Includes Navigate 2 Advantage Access That Unlocks A Complete Ebook, Study Center, Homework And Assessment Center, And A Dashboard That Reports Actionable Data. Using A Hands-On, Student-Friendly Approach, Android Programming Concepts Provides A Comprehensive Foundation For The Development Of Mobile Applications For Devices And Tablets Powered By Android. This Text Offers In-Depth Coverage Of The Topics Outlined By The Official Android Developer API Guides, Leading A Programmer With Object Oriented Programming Skills Through The App Development Process. Each Chapter...
Each New Print Copy Includes Navigate 2 Advantage Access That Unlocks A Complete Ebook, Study Center, Homework And Assessment Center, And A Dashboard ...
cena: 509,37

 A Guide to Enterprise Networking Technology: Volume 1 Manju Devaraj 9781491762639 iUniverse
A Guide to Enterprise Networking Technology: Volume 1

ISBN: 9781491762639 / Angielski / Miękka / 432 str.

ISBN: 9781491762639/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manju Devaraj

If you've ever wondered why books on information technology seem so complicated, then you're not alone.

Manju Devaraj, an Expert in enterprise networks, routing and switching technology, takes you on a wonderful exploration into the world of computers in this easy-to-follow guidebook written for both beginning and advanced engineers.

He provides a framework so you can easily understand network connections and network devices, switching technology intelligence and types, and the foundations of Network Architecture.

There's also a fascinating section on how to build highly available...

If you've ever wondered why books on information technology seem so complicated, then you're not alone.

Manju Devaraj, an Expert in enterprise n...

cena: 153,95

 Nmap Essentials David Shaw 9781783554065 Packt Publishing
Nmap Essentials

ISBN: 9781783554065 / Angielski / Miękka / 118 str.

ISBN: 9781783554065/Angielski/Miękka/118 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Shaw
cena: 116,49

 Cloud Foundry: The Definitive Guide: Develop, Deploy, and Scale Winn, Duncan 9781491932438 John Wiley & Sons
Cloud Foundry: The Definitive Guide: Develop, Deploy, and Scale

ISBN: 9781491932438 / Angielski / Miękka / 322 str.

ISBN: 9781491932438/Angielski/Miękka/322 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

How can Cloud Foundry help you develop and deploy business-critical applications and tasks with velocity? This practical guide demonstrates how this open source, cloud-native application platform not only significantly reduces the develop-to-deploy cycle time, but also raises the value line for application operators by changing the way applications and supporting services are deployed and run. Learn how Cloud Foundry can help you improve your product velocity by handling many of essential tasks required to run applications in production.

Author Duncan Winn shows DevOps and operations...

How can Cloud Foundry help you develop and deploy business-critical applications and tasks with velocity? This practical guide demonstrates how thi...

cena: 206,17

 America is Under Cyber Attack: Why Urgent Action is Needed Subcommittee on Oversight, Investigation 9781484826157 Createspace
America is Under Cyber Attack: Why Urgent Action is Needed

ISBN: 9781484826157 / Angielski / Miękka / 64 str.

ISBN: 9781484826157/Angielski/Miękka/64 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Investigation Subcommittee on Oversight
cena: 68,59

 Security in Wireless Sensor Networks George S. Oreku Tamara Pazynyuk 9783319212685 Springer
Security in Wireless Sensor Networks

ISBN: 9783319212685 / Angielski / Twarda / 87 str.

ISBN: 9783319212685/Angielski/Twarda/87 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George S. Oreku; Tamara Pazynyuk
Security in Wireless Sensor Networks
Security in Wireless Sensor Networks
cena: 402,53

Pierwsza Podprzednia  76  77  78  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia