![]() |
Internet of Things Security: Fundamentals, Techniques and Applications
ISBN: 9788793609532 / Angielski / Twarda / 250 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Provides a comprehensive overview of the overall scenario of IoT security whilst highlighting recent research and applications in the field. Technical topics discussed include: Machine-to-Machine Communications; IoT Architecture; Identity of Things; Block Chain; Parametric Cryptosystem; and Software and Cloud Components.
Provides a comprehensive overview of the overall scenario of IoT security whilst highlighting recent research and applications in the field. Technical...
|
cena:
426,05 |
![]() |
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
ISBN: 9781260118179 / Angielski / Miękka / 592 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
281,31 |
![]() |
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys
ISBN: 9781642350029 / Angielski / Miękka / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
115,56 |
![]() |
GNU SASL 1.8 Reference Manual
ISBN: 9781680921786 / Angielski / Miękka / 122 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
60,55 |
![]() |
Metasploit Penetration Testing Cookbook - Third Edition
ISBN: 9781788623179 / Angielski / Miękka / 426 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with ...
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasp...
|
cena:
211,44 |
![]() |
Handbook of Research on Network Forensics and Analysis Techniques
ISBN: 9781522541004 / Angielski / Twarda / 455 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Examines the advances and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring coverage on a broad range of topics including cryptocurrency, hand-based biometrics, and cyberterrorism, this publication is aimed at professionals, computer forensics practitioners, engineers, researchers, and academics seeking relevant research.
Examines the advances and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring cove...
|
cena:
1711,63 |
![]() |
Kali Linux Network Scanning Cookbook
ISBN: 9781787287907 / Angielski / Miękka / 634 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning About This Book * Learn the fundamentals behind commonly used scanning techniques * Deploy powerful scanning tools that are integrated into the Kali Linux testing platform * The practical recipes will help you automate menial tasks and build your own script library Who This Book Is For This book is for information security professionals and casual security enthusiasts alike. It provides foundational principles if you're a novice, but will...
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning About Th...
|
cena:
237,33 |
![]() |
The Secure CIO: How to Hire and Retain Great Cyber Security Talent to Protect Your Organisation
ISBN: 9780648204794 / Angielski / Miękka / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
77,65 |
![]() |
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
ISBN: 9781642350227 / Angielski / Twarda / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
154,10 |
![]() |
Python Programming
ISBN: 9781449614942 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
979,55 |
![]() |
Network Analysis Using Wireshark 2 Cookbook - Second Edition: Practical recipes to analyze and secure your network using Wireshark 2
ISBN: 9781786461674 / Angielski / Miękka / 626 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. By the end of this book, you'll know how to analyze the traffic, find patterns of various offending ...
This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which h...
|
cena:
237,33 |
![]() |
Mastering Wireshark 2
ISBN: 9781788626521 / Angielski / Miękka / 326 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you ...
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various p...
|
cena:
189,86 |
![]() |
Python Penetration Testing Essentials
ISBN: 9781789138962 / Angielski / Miękka / 230 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for...
|
cena:
142,38 |
![]() |
CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
ISBN: 9781787128873 / Angielski / Miękka / 518 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and m...
|
cena:
189,86 |
![]() |
Glossary of Cyber Warfare, Cyber Crime and Cyber Security
ISBN: 9781911218876 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
131,09 |
![]() |
Mastering Your Introduction to Cyber Security
ISBN: 9781634914185 / Angielski / Miękka / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
60,21 |
![]() |
Hands-On Cryptography with Python
ISBN: 9781789534443 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt...
|
cena:
142,38 |
![]() |
Practical Lte Based Security Forces Pmr Networks
ISBN: 9788793609792 / Angielski / Twarda / 250 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based...
Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services...
|
cena:
450,54 |
![]() |
Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries
ISBN: 9781788832687 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world. Key Features Gain practical insight into security concepts in the Industrial Internet of Things (IIoT) architecture Demystify complex topics such as cryptography and blockchain Comprehensive references to industry standards and security frameworks when developing IIoT blueprints Book DescriptionSecuring connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike...
Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business...
|
cena:
189,86 |
![]() |
Kennzahlensystem für das IT-Controlling
ISBN: 9783668787490 / Niemiecki / Miękka / 24 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
147,68 |