• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Practical Packet Analysis, 3rd Edition Chris Sanders 9781593278021 No Starch Press,US
Practical Packet Analysis, 3rd Edition

ISBN: 9781593278021 / Angielski / Miękka / 368 str.

ISBN: 9781593278021/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Sanders
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You'll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a...

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those ...
cena: 241,50

 Cyber Frauds, Scams and Their Victims Mark Button Cassandra Cross 9781138931190 Routledge
Cyber Frauds, Scams and Their Victims

ISBN: 9781138931190 / Angielski / Twarda / 232 str.

ISBN: 9781138931190/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Button; Cassandra Cross

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment.

This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include:

  • An in-depth breakdown of the most common types of cyber fraud and scams.
  • The victim selection techniques and perpetration...

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be pe...

cena: 710,17

 Introduction to Computer Security Michael Goodrich Roberto Tamassia 9780321512949 Addison Wesley Longman
Introduction to Computer Security

ISBN: 9780321512949 / Angielski / Twarda / 556 str.

ISBN: 9780321512949/Angielski/Twarda/556 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Goodrich; Roberto Tamassia
Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2).

Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the...
Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-securi...
cena: 1157,14

 Business Analytics and Cyber Security Management in Organizations Rajagopal                                Ramesh Behl 9781522509028 Business Science Reference
Business Analytics and Cyber Security Management in Organizations

ISBN: 9781522509028 / Angielski / Twarda / 372 str.

ISBN: 9781522509028/Angielski/Twarda/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rajagopal; Ramesh Behl
"This book compiles innovative research from international professionals discussing the opportunities and challenges of the new era of online business and outlining updated discourse for business analytics techniques, strategies for data storage, and encryption in emerging markets"--
"This book compiles innovative research from international professionals discussing the opportunities and challenges of the new era of online business...
cena: 1098,12

 Security Solutions and Applied Cryptography in Smart Grid Communications Mohamed Amine Ferrag Ahmed Ahmim 9781522518297 Information Science Reference
Security Solutions and Applied Cryptography in Smart Grid Communications

ISBN: 9781522518297 / Angielski / Twarda / 492 str.

ISBN: 9781522518297/Angielski/Twarda/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mohamed Amine Ferrag; Ahmed Ahmim
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is designed for academics, researchers, engineers and students.
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a rang...
cena: 1101,91

 Cybersecurity Exposed: The Cyber House Rules Raef Meeuwisse 9781911452096 Cyber Simplicity Ltd
Cybersecurity Exposed: The Cyber House Rules

ISBN: 9781911452096 / Angielski / Miękka / 176 str.

ISBN: 9781911452096/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raef Meeuwisse

Mind the gap...between the actual level of cybersecurity and the amount required to protect you.
Ever wondered what exactly is going so badly wrong in society that the fastest booming industry in the world is cybercrime?
Psychology meets technology as this book explores how the rapid progression of technology is luring us all forwards at a pace that outstrips the human comfort zone.
This book exposes the reasons that many organizations decide it is cheaper, easier and less painful in the short term to leave their security broken.
Is security fixable? Or are we...

Mind the gap...between the actual level of cybersecurity and the amount required to protect you.
Ever wondered what exactly is going so badly...

cena: 56,06

 Instant Traffic Analysis with Tshark How-to Merino, Borja 9781782165385 Packt Publishing
Instant Traffic Analysis with Tshark How-to

ISBN: 9781782165385 / Angielski / Miękka / 68 str.

ISBN: 9781782165385/Angielski/Miękka/68 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borja Merino
cena: 116,49

 Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition Kevin Cardwell 9781785883491 Packt Publishing
Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition

ISBN: 9781785883491 / Angielski / Miękka / 524 str.

ISBN: 9781785883491/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin Cardwell
cena: 284,81

 Penetration Testing with Raspberry Pi - Second Edition: A portable hacking station for effective pentesting McPhee, Michael 9781787126138 Packt Publishing
Penetration Testing with Raspberry Pi - Second Edition: A portable hacking station for effective pentesting

ISBN: 9781787126138 / Angielski / Miękka / 316 str.

ISBN: 9781787126138/Angielski/Miękka/316 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael McPhee; Jason Beltrame
cena: 189,86

 Instant Windows PowerShell Menon, Vinith 9781849688741 Packt Publishing
Instant Windows PowerShell

ISBN: 9781849688741 / Angielski / Miękka / 54 str.

ISBN: 9781849688741/Angielski/Miękka/54 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vinith Menon
cena: 129,43

 Wireshark 101: Essential Skills for Network Analysis Laura Chappell Gerald Combs 9781893939752 Laura Chappell University
Wireshark 101: Essential Skills for Network Analysis

ISBN: 9781893939752 / Angielski / Miękka / 408 str.

ISBN: 9781893939752/Angielski/Miękka/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Laura Chappell; Gerald Combs

Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura Chappell is undoubtedly one of the best Wireshark instructors around.

In this updated book, Laura offers step-by-step instructions on the key functions and features of Wireshark, including:

  • Filter on addresses, protocols, fields or traffic characteristics
  • Create custom columns for more efficient analysis
  • Find the source of delays with filters and coloring rules
  • Perform unattended captures with...

Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura ...

cena: 275,77

 Windows Security Monitoring: Scenarios and Patterns Miroshnikov, Andrei 9781119390640 John Wiley & Sons Inc
Windows Security Monitoring: Scenarios and Patterns

ISBN: 9781119390640 / Angielski / Miękka / 648 str.

ISBN: 9781119390640/Angielski/Miękka/648 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Go deep into Windows security tools to implement more robust protocols and processes

Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security program manager, DEFCON organizer and CISSP, this book digs deep into the underused tools that help you keep Windows systems secure. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful native tools, while scenario-based...

Go deep into Windows security tools to implement more robust protocols and processes

Windows Security Monitoring goes beyond Windows ...

cena: 192,68

 Cybersecurity Exposed: The Cyber House Rules Raef Meeuwisse 9781911452195 Cyber Simplicity Ltd
Cybersecurity Exposed: The Cyber House Rules

ISBN: 9781911452195 / Angielski / Twarda / 176 str.

ISBN: 9781911452195/Angielski/Twarda/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raef Meeuwisse

Mind the gap...between the actual level of cybersecurity and the amount required to protect you.
Ever wondered what exactly is going so badly wrong in society that the fastest booming industry in the world is cybercrime?

Psychology meets technology as this book explores how the rapid progression of technology is luring us all forwards at a pace that outstrips the human comfort zone.
This book exposes the reasons that many organizations decide it is cheaper, easier and less painful in the short term to leave their security broken.

Is security fixable? Or are we...

Mind the gap...between the actual level of cybersecurity and the amount required to protect you.
Ever wondered what exactly is going so badly...

cena: 107,86

 Black Hat Go: Go Programming For Hackers and Pentesters Dan Kottman 9781593278656 No Starch Press,US
Black Hat Go: Go Programming For Hackers and Pentesters

ISBN: 9781593278656 / Angielski / Miękka / 368 str.

ISBN: 9781593278656/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dan Kottman
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.

In Black Hat Go, you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's...

Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection...
cena: 226,40

 Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents Johansen, Gerard 9781787288683 Packt Publishing
Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents

ISBN: 9781787288683 / Angielski / Miękka / 324 str.

ISBN: 9781787288683/Angielski/Miękka/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerard Johansen
Suitable for information security professionals, forensics practitioners, and students, this title guides them through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization.
Suitable for information security professionals, forensics practitioners, and students, this title guides them through the entire spectrum of tasks as...
cena: 211,44

 User-Centric Privacy and Security in Biometrics Claus Vielhauer 9781785612077 Institution of Engineering & Technology
User-Centric Privacy and Security in Biometrics

ISBN: 9781785612077 / Angielski / Twarda / 432 str.

ISBN: 9781785612077/Angielski/Twarda/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claus Vielhauer
This book covers the major and critical system security challenges, developments, techniques and applications for biometric systems (confidentiality, authenticity, integrity, privacy, reliability, convenience, usability).
This book covers the major and critical system security challenges, developments, techniques and applications for biometric systems (confidentiality, ...
cena: 681,67

 Kali Linux Cookbook - Second Edition: Effective penetration testing solutions P. Schultz, Corey 9781784390303 Packt Publishing
Kali Linux Cookbook - Second Edition: Effective penetration testing solutions

ISBN: 9781784390303 / Angielski / Miękka / 438 str.

ISBN: 9781784390303/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Corey P. Schultz; Bob Perciaccante
cena: 366,81

 Real-World Bug Hunting: A Field Guide to Web Hacking Peter Yaworski 9781593278618 No Starch Press,US
Real-World Bug Hunting: A Field Guide to Web Hacking

ISBN: 9781593278618 / Angielski / Miękka / 264 str.

ISBN: 9781593278618/Angielski/Miękka/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Yaworski
cena: 226,40

 Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali OccupyTheWeb 9781593278557 No Starch Press,US
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

ISBN: 9781593278557 / Angielski / Miękka / 248 str.

ISBN: 9781593278557/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
OccupyTheWeb
cena: 191,18

 Malware Data Science: Attack, Detection, and Attribution Hillary Sanders 9781593278595 No Starch Press,US
Malware Data Science: Attack, Detection, and Attribution

ISBN: 9781593278595 / Angielski / Miękka / 272 str.

ISBN: 9781593278595/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hillary Sanders
cena: 271,70

Pierwsza Podprzednia  76  77  78  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia