![]() |
Learning Python Network Programming: Utilize Python 3 to get network applications up and running quickly and easily
ISBN: 9781784396008 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, Icgs3 2015, London, Uk, September
ISBN: 9783319232751 / Angielski / Miękka / 361 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in...
|
cena:
201,24 |
![]() |
Kali Linux Wireless Penetration Testing Essentials
ISBN: 9781785280856 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
168,27 |
![]() |
Cyber Frauds, Scams and their Victims
ISBN: 9781138931206 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include:
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be pe... |
cena:
220,35 |
![]() |
Trust, Privacy and Security in Digital Business: 12th International Conference, Trustbus 2015, Valencia, Spain, September 1-2, 2015, Proceedings
ISBN: 9783319229058 / Angielski / Miękka / 235 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. trust and privacy issues in mobile environments; and privacy requirements and privacy audit.
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015,...
|
cena:
193,23 |
![]() |
Learning Puppet
ISBN: 9781784399832 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
211,44 |
![]() |
OpenStack Networking Cookbook
ISBN: 9781785286100 / Angielski / Miękka / 282 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Implementing NetScaler VPX(TM) Second Edition
ISBN: 9781785288982 / Angielski / Miękka / 202 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
189,86 |
![]() |
Leading Issues in Cyber Warfare and Security
ISBN: 9781910810644 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence of such stories reveals an overwhelming weakness in the security of the systems we increasingly rely on for everything: shopping, banking, health services, education, and even voting. That these problems persist even as the world rushes headlong into the Internet-of-Things and cloud based everything underscores the importance of understanding the current and potential aspects of information warfare, also known as cyberwarfare. Having passed...
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence...
|
cena:
135,95 |
![]() |
Information Technology: OCC's Network and Systems Security Controls Were Deficient
ISBN: 9781522943044 / Angielski / Miękka / 30 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
52,40 |
![]() |
Mastering Wireshark
ISBN: 9781783989522 / Angielski / Miękka / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Learning Network Forensics
ISBN: 9781782174905 / Angielski / Miękka / 274 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Object-Oriented Data Structures Using Java
ISBN: 9781284089097 / Angielski / Miękka / 694 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Updated And Revised Object-Oriented Data Structures Using Java, Fourth Edition Is An Essential Resource For Students Learning Data Structures Using The Java Programming Language. It Presents Both The Traditional And Modern Data Structure Topics With An Emphasis On Problem-Solving And Object-Oriented Software Design. Beginning Early And Continuing Throughout The Text, It Introduces And Expands Upon The Use Of Many Java Features Such As Classes, Objects, Generics, Polymorphism, Packages, Interfaces, Library Classes, Inheritance, Exceptions, And Threads.
The Updated And Revised Object-Oriented Data Structures Using Java, Fourth Edition Is An Essential Resource For Students Learning Data Structures Usin...
|
cena:
742,39 |
![]() |
C++ Plus Data Structures
ISBN: 9781284089189 / Angielski / Miękka / 838 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. C++ Plus Data Structures, Sixth Edition Explores The Specifications, Applications, And Implementations Of Abstract Data Types With Unmatched Accessibility. Topics Such As Modularization, Data Encapsulation, Information Hiding, Object-Oriented Decomposition, Algorithm Analysis, Life-Cycle Software Verification Models, And Data Abstraction Are Carefully Presented To Foster Solid Software Engineering Techniques. NEW & KEY FEATURES OF THE SIXTH EDITION: •UPDATED – Updated With New C++11 Features Including Range-Based For Loops And Threads •NEW – Includes A New Chapter...
C++ Plus Data Structures, Sixth Edition Explores The Specifications, Applications, And Implementations Of Abstract Data Types With Unmatched Accessibi...
|
cena:
803,23 |
![]() |
Mastering Kali Linux Wireless Pentesting
ISBN: 9781785285561 / Angielski / Miękka / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Effective Python Penetration Testing
ISBN: 9781785280696 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
189,86 |
| |
Kali Linux 2: Windows Penetration Testing: Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working ha
ISBN: 9781782168492 / Angielski / Miękka / 422 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Cloud Foundry: The Cloud-Native Platform
ISBN: 9781491965788 / Angielski / Miękka / 70 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What exactly is a cloud-native platform? It's certainly a hot topic in IT, as enterprises today assess this option for developing and delivering software quickly and repeatedly. This O'Reilly report explains the capabilities of cloud-native platforms and examines the fundamental changes enterprises need to make in process, organization, and culture if they're to take real advantage of this approach. Author Duncan Winn focuses on the open source platform Cloud Foundry, one of the more prominent cloud-native providers. You'll learn how cloud-native applications are designed to be... What exactly is a cloud-native platform? It's certainly a hot topic in IT, as enterprises today assess this option for developing and delivering so... |
cena:
61,81 |
![]() |
Cisco ASA Security Appliance Hands-On Training for Accidental Administrators: Student Exercise Manual
ISBN: 9780983660781 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the Cisco ASA Security Appliance student lab manual designed for use in an instructor-led classroom setting. It is the companion to the book Cisco ASA for Accidental Administrators. Includes 72 hands-on exercises including: password recovery, building a configuration from scratch, previewing commands, using ASDM to build a configuration, analyzing the base configuration, backing up and restoring configurations and software images, remote logging options, how to configure Telnet and SSH, setting up login banners, remote authentication using RADIUS, Kerberos, and LDAP, site-to-site...
This is the Cisco ASA Security Appliance student lab manual designed for use in an instructor-led classroom setting. It is the companion to the book C...
|
cena:
96,34 |
![]() |
Security in Wireless Sensor Networks
ISBN: 9783319373140 / Angielski / Miękka / 87 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This monograph covers different aspects of sensor network security including new emerging technologies. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.
This monograph covers different aspects of sensor network security including new emerging technologies. The target audience primarily comprises expert...
|
cena:
475,83 |