• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]

  więcej...
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2619

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Internet of Things Security: Architectures and Security Measures Wu, Chuan-Kun 9789811613746 Springer Nature Singapore
Internet of Things Security: Architectures and Security Measures

ISBN: 9789811613746 / Angielski / Miękka

ISBN: 9789811613746/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chuan-Kun Wu

This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference between IoT security and traditional system and data security. 



It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control.  However, in practical IoT system...

This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, ...

cena: 724,58

 Proceedings of International Conference on Network Security and Blockchain Technology: Icnsbt 2021 Giri, Debasis 9789811931819 Springer Nature Singapore
Proceedings of International Conference on Network Security and Blockchain Technology: Icnsbt 2021

ISBN: 9789811931819 / Angielski / Miękka

ISBN: 9789811931819/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the...

The book is a collection of best selected research papers presented at International Conference on Network Security a...

cena: 925,87

 Cybersecurity and Identity Access Management Alexender Peter 9789811926570 Springer Verlag, Singapore
Cybersecurity and Identity Access Management

ISBN: 9789811926570 / Angielski / Twarda / 236 str.

ISBN: 9789811926570/Angielski/Twarda/236 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexender Peter
cena: 442,79

 The Auditor's Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance Aghili, Shaun 9781032078250 Taylor & Francis Ltd
The Auditor's Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

ISBN: 9781032078250 / Angielski / Miękka / 312 str.

ISBN: 9781032078250/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Canada) Aghili Shaun (Concordia University of Edmonton
cena: 186,06

 What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century Brathwaite, Shimon 9781032206080 Taylor & Francis Ltd
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century

ISBN: 9781032206080 / Angielski / Miękka / 176 str.

ISBN: 9781032206080/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shimon Brathwaite
cena: 205,65

 What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century Brathwaite, Shimon 9781032206073 Taylor & Francis Ltd
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century

ISBN: 9781032206073 / Angielski / Twarda / 176 str.

ISBN: 9781032206073/Angielski/Twarda/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shimon Brathwaite
cena: 372,18

 Cybersecurity for Artificial Intelligence Mark Stamp Corrado Aaron Visaggio Francesco Mercaldo 9783030970864 Springer Nature Switzerland AG
Cybersecurity for Artificial Intelligence

ISBN: 9783030970864 / Angielski / Twarda / 380 str.

ISBN: 9783030970864/Angielski/Twarda/380 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Stamp;Corrado Aaron Visaggio;Francesco Mercaldo
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a...
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in ...
cena: 644,07

 Intelligent Communication Technologies and Virtual Mobile Networks: Proceedings of ICICV 2022 Rajakumar, G. 9789811918438 Springer Nature Singapore
Intelligent Communication Technologies and Virtual Mobile Networks: Proceedings of ICICV 2022

ISBN: 9789811918438 / Angielski / Miękka

ISBN: 9789811918438/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10–11, 2022. The book shares knowledge and results in theory, methodology and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data...
The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held...
cena: 1006,38

 Information Centric Networks (Icn): Architecture & Current Trends Dutta, Nitul 9783030467388 Springer International Publishing
Information Centric Networks (Icn): Architecture & Current Trends

ISBN: 9783030467388 / Angielski / Miękka

ISBN: 9783030467388/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nitul Dutta; Hiren Kumar Deva Sarma; Rajendrasinh Jadeja

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover,...

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm...

cena: 684,33

 6g Security and Privacy: A Comprehensive Guide Porambage, Pawani 9781119875406 John Wiley & Sons Inc
6g Security and Privacy: A Comprehensive Guide

ISBN: 9781119875406 / Angielski / Twarda / 350 str.

ISBN: 9781119875406/Angielski/Twarda/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Porambage
cena: 525,86

 The Cybersecurity Body of Knowledge: The Acm/Ieee/Ais/Ifip Recommendations for a Complete Curriculum in Cybersecurity Shoemaker, Daniel 9781032400211 CRC Press
The Cybersecurity Body of Knowledge: The Acm/Ieee/Ais/Ifip Recommendations for a Complete Curriculum in Cybersecurity

ISBN: 9781032400211 / Angielski / Miękka / 614 str.

ISBN: 9781032400211/Angielski/Miękka/614 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Shoemaker;Anne Kohnke;Ken Sigler

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field.

This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every...

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the disc...

cena: 205,65

 Multi-Fractal Traffic and Anomaly Detection in Computer Communications Ming Li 9781032408460 Taylor & Francis Ltd
Multi-Fractal Traffic and Anomaly Detection in Computer Communications

ISBN: 9781032408460 / Angielski / Twarda / 232 str.

ISBN: 9781032408460/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ming Li
cena: 376,30

 Cognitive Risk Jessie H (Better Future Strategies, LLC) Lee 9781032039091 Taylor & Francis Ltd
Cognitive Risk

ISBN: 9781032039091 / Angielski / Twarda / 288 str.

ISBN: 9781032039091/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
LLC) Lee Jessie H (Better Future Strategies
cena: 563,24

 Cognitive Risk Jessie H (Better Future Strategies, LLC) Lee 9781032039114 Taylor & Francis Ltd
Cognitive Risk

ISBN: 9781032039114 / Angielski / Miękka / 288 str.

ISBN: 9781032039114/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
LLC) Lee Jessie H (Better Future Strategies
cena: 176,27

 Cybersecurity Analytics David J. (Naval Surface Warfare Center, Dahlgren, Virginia, USA) Marchette 9781032401003 Taylor & Francis Ltd
Cybersecurity Analytics

ISBN: 9781032401003 / Angielski / Miękka / 340 str.

ISBN: 9781032401003/Angielski/Miękka/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Virginia Dahlgren David J. (Naval Surface Warfare Center
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email detector, or just interested in finding patterns in your datasets? This book can let you do it on your own. Numerous examples and datasets links are included so that the reader can "learn by doing." Anyone with a basic college-level calculus course and some probability knowledge...
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecuri...
cena: 244,84

 Learn Wireshark - Second Edition: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark Bock, Lisa 9781803231679 Packt Publishing Limited
Learn Wireshark - Second Edition: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark

ISBN: 9781803231679 / Angielski / Miękka / 606 str.

ISBN: 9781803231679/Angielski/Miękka/606 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lisa Bock
Learn Wireshark provides an overview of protocol analysis. You'll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export, and share captures, create graphs, and become more proficient in troubleshooting latency issues.
Learn Wireshark provides an overview of protocol analysis. You'll become more confident in navigating the interface while examining protocols such as ...
cena: 202,81

 Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr Dunkerley, Mark 9781803236544 Packt Publishing Limited
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr

ISBN: 9781803236544 / Angielski / Miękka / 816 str.

ISBN: 9781803236544/Angielski/Miękka/816 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Tumbarello
With this edition, you'll be able to secure your company's data and users in today's threat landscape. This book will help you to holistically approach the method of securing your Windows environment, with best practice recommendations, real-world scenarios, and by guiding you through implementing a zero-trust multi-layered approach.
With this edition, you'll be able to secure your company's data and users in today's threat landscape. This book will help you to holistically approac...
cena: 237,33

 Deep Dive: Exploring the Real-world Value of Open Source Intelligence Baker, Rae L. 9781119933243 John Wiley & Sons Inc
Deep Dive: Exploring the Real-world Value of Open Source Intelligence

ISBN: 9781119933243 / Angielski / Miękka

ISBN: 9781119933243/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rae L. Baker
cena: 176,09

 Machine Learning for Cybersecurity: Innovative Deep Learning Solutions Marwan Omar   9783031158926 Springer International Publishing AG
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions

ISBN: 9783031158926 / Angielski / Miękka / 48 str.

ISBN: 9783031158926/Angielski/Miękka/48 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marwan Omar
This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry. By implementing innovative deep learning solutions, cybersecurity researchers, students and practitioners can analyze patterns and learn how to prevent cyber-attacks and respond to changing malware behavior. The knowledge and tools introduced in this brief can also assist cybersecurity teams to become more proactive in preventing threats and responding to active attacks in real time....
This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and s...
cena: 221,37

 Artificial Intelligence and National Security Reza Montasari   9783031067082 Springer International Publishing AG
Artificial Intelligence and National Security

ISBN: 9783031067082 / Angielski / Twarda / 230 str.

ISBN: 9783031067082/Angielski/Twarda/230 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Reza Montasari
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses...
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties...
cena: 442,79

Pierwsza Podprzednia  91  92  93  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia