• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Internet of Things Security: Fundamentals, Techniques and Applications Shishir K. Shandilya Soon Ae Chun Smita Shandilya 9788793609532 River Publishers
Internet of Things Security: Fundamentals, Techniques and Applications

ISBN: 9788793609532 / Angielski / Twarda / 250 str.

ISBN: 9788793609532/Angielski/Twarda/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shishir K. Shandilya; Soon Ae Chun; Smita Shandilya
Provides a comprehensive overview of the overall scenario of IoT security whilst highlighting recent research and applications in the field. Technical topics discussed include: Machine-to-Machine Communications; IoT Architecture; Identity of Things; Block Chain; Parametric Cryptosystem; and Software and Cloud Components.
Provides a comprehensive overview of the overall scenario of IoT security whilst highlighting recent research and applications in the field. Technical...
cena: 426,05

 Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time O. Sami Saydjari 9781260118179 McGraw-Hill Education
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

ISBN: 9781260118179 / Angielski / Miękka / 592 str.

ISBN: 9781260118179/Angielski/Miękka/592 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
O. Sami Saydjari
cena: 281,31

 SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys Lucas, Michael W. 9781642350029 Tilted Windmill Press
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys

ISBN: 9781642350029 / Angielski / Miękka / 242 str.

ISBN: 9781642350029/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael W. Lucas
cena: 115,56

 GNU SASL 1.8 Reference Manual Josefsson, Simon 9781680921786 12th Media Services
GNU SASL 1.8 Reference Manual

ISBN: 9781680921786 / Angielski / Miękka / 122 str.

ISBN: 9781680921786/Angielski/Miękka/122 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simon Josefsson
cena: 60,55

 Metasploit Penetration Testing Cookbook - Third Edition Daniel Teixeira Abhinav Singh Monika Agarwal 9781788623179 Packt Publishing
Metasploit Penetration Testing Cookbook - Third Edition

ISBN: 9781788623179 / Angielski / Miękka / 426 str.

ISBN: 9781788623179/Angielski/Miękka/426 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Teixeira; Abhinav Singh; Monika Agarwal
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with ...
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasp...
cena: 211,44

 Handbook of Research on Network Forensics and Analysis Techniques Gulshan Shrivastava Prabhat Kumar B. B. Gupta 9781522541004 Information Science Reference
Handbook of Research on Network Forensics and Analysis Techniques

ISBN: 9781522541004 / Angielski / Twarda / 455 str.

ISBN: 9781522541004/Angielski/Twarda/455 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gulshan Shrivastava; Prabhat Kumar; B. B. Gupta
Examines the advances and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring coverage on a broad range of topics including cryptocurrency, hand-based biometrics, and cyberterrorism, this publication is aimed at professionals, computer forensics practitioners, engineers, researchers, and academics seeking relevant research.
Examines the advances and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring cove...
cena: 1711,63

 Kali Linux Network Scanning Cookbook Justin Hutchens   9781787287907 Packt Publishing Limited
Kali Linux Network Scanning Cookbook

ISBN: 9781787287907 / Angielski / Miękka / 634 str.

ISBN: 9781787287907/Angielski/Miękka/634 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Justin Hutchens
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning About This Book * Learn the fundamentals behind commonly used scanning techniques * Deploy powerful scanning tools that are integrated into the Kali Linux testing platform * The practical recipes will help you automate menial tasks and build your own script library Who This Book Is For This book is for information security professionals and casual security enthusiasts alike. It provides foundational principles if you're a novice, but will...
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning About Th...
cena: 237,33

 The Secure CIO: How to Hire and Retain Great Cyber Security Talent to Protect Your Organisation Claire Pales 9780648204794 Longueville Media
The Secure CIO: How to Hire and Retain Great Cyber Security Talent to Protect Your Organisation

ISBN: 9780648204794 / Angielski / Miękka / 130 str.

ISBN: 9780648204794/Angielski/Miękka/130 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claire Pales
cena: 77,65

 SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys Michael W Lucas 9781642350227 Tilted Windmill Press
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys

ISBN: 9781642350227 / Angielski / Twarda / 242 str.

ISBN: 9781642350227/Angielski/Twarda/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael W Lucas
cena: 154,10

 
Python Programming

ISBN: 9781449614942 / Angielski / Twarda / 512 str.

ISBN: 9781449614942/Angielski/Twarda/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
William Gunnells
cena: 979,55

 Network Analysis Using Wireshark 2 Cookbook - Second Edition: Practical recipes to analyze and secure your network using Wireshark 2 Nainar, Nagendra Kumar 9781786461674 Packt Publishing
Network Analysis Using Wireshark 2 Cookbook - Second Edition: Practical recipes to analyze and secure your network using Wireshark 2

ISBN: 9781786461674 / Angielski / Miękka / 626 str.

ISBN: 9781786461674/Angielski/Miękka/626 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nagendra Kumar Nainar; Yogesh Ramdoss; Yoram Orzach
This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. By the end of this book, you'll know how to analyze the traffic, find patterns of various offending ...
This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which h...
cena: 237,33

 Mastering Wireshark 2 Andrew Crouthamel 9781788626521 Packt Publishing
Mastering Wireshark 2

ISBN: 9781788626521 / Angielski / Miękka / 326 str.

ISBN: 9781788626521/Angielski/Miękka/326 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Crouthamel
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you ...
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various p...
cena: 189,86

 Python Penetration Testing Essentials Mohit Raj 9781789138962 Packt Publishing
Python Penetration Testing Essentials

ISBN: 9781789138962 / Angielski / Miękka / 230 str.

ISBN: 9781789138962/Angielski/Miękka/230 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mohit Raj
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for...
cena: 142,38

 CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) Vinod, Michael 9781787128873 Packt Publishing
CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)

ISBN: 9781787128873 / Angielski / Miękka / 518 str.

ISBN: 9781787128873/Angielski/Miękka/518 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Vinod G.; Vijay Anandh; Glen D. Singh
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and m...
cena: 189,86

 Glossary of Cyber Warfare, Cyber Crime and Cyber Security Dan Remenyi, Richard L Wilson 9781911218876 Acpil
Glossary of Cyber Warfare, Cyber Crime and Cyber Security

ISBN: 9781911218876 / Angielski / Miękka / 164 str.

ISBN: 9781911218876/Angielski/Miękka/164 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dan Remenyi;Richard L Wilson
cena: 131,09

 Mastering Your Introduction to Cyber Security Dr Michael C. Redmon 9781634914185 Booklocker.com
Mastering Your Introduction to Cyber Security

ISBN: 9781634914185 / Angielski / Miękka / 92 str.

ISBN: 9781634914185/Angielski/Miękka/92 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dr Michael C. Redmond Phd
cena: 60,21

 Hands-On Cryptography with Python Samuel Bowne 9781789534443 Packt Publishing
Hands-On Cryptography with Python

ISBN: 9781789534443 / Angielski / Miękka / 100 str.

ISBN: 9781789534443/Angielski/Miękka/100 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Samuel Bowne
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt...
cena: 142,38

 Practical Lte Based Security Forces Pmr Networks Arnaud Henry-Labordere (Ecole Nationale    9788793609792 River Publishers
Practical Lte Based Security Forces Pmr Networks

ISBN: 9788793609792 / Angielski / Twarda / 250 str.

ISBN: 9788793609792/Angielski/Twarda/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arnaud Henry-Labordere (Ecole Nationale
Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based...
Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services...
cena: 450,54

 Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries Sravani Bhattacharjee 9781788832687 Packt Publishing Limited
Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries

ISBN: 9781788832687 / Angielski / Miękka / 324 str.

ISBN: 9781788832687/Angielski/Miękka/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sravani Bhattacharjee
Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world. Key Features Gain practical insight into security concepts in the Industrial Internet of Things (IIoT) architecture Demystify complex topics such as cryptography and blockchain Comprehensive references to industry standards and security frameworks when developing IIoT blueprints Book DescriptionSecuring connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike...
Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business...
cena: 189,86

 Kennzahlensystem für das IT-Controlling Nickel, Jasmina 9783668787490 GRIN Verlag
Kennzahlensystem für das IT-Controlling

ISBN: 9783668787490 / Niemiecki / Miękka / 24 str.

ISBN: 9783668787490/Niemiecki/Miękka/24 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jasmina Nickel
cena: 147,68

Pierwsza Podprzednia  79  80  81  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia