• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]

  więcej...
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2619

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Connecting the Internet of Things: IoT Connectivity Standards and Solutions Anil Kumar Jafer Hussain Anthony Chun 9781484288962 Apress
Connecting the Internet of Things: IoT Connectivity Standards and Solutions

ISBN: 9781484288962 / Angielski / Miękka / 387 str.

ISBN: 9781484288962/Angielski/Miękka/387 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anil Kumar; Jafer Hussain; Anthony Chun
Navigating the fragmented IoT connectivity ecosystem of standards, protocols, and architectures can be a challenge. Not to mention scaling a solution to a viable product. This book guides you through this fractured landscape with real world examples and projects that can be leverage for an IoT product.Backed by an overview of IoT use cases and key connectivity elements of IoT solutions, you'll gain an understanding of the breadth of the IoT landscape and the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies. You'll also...
Navigating the fragmented IoT connectivity ecosystem of standards, protocols, and architectures can be a challenge. Not to mention scaling a solution ...
cena: 241,50

 Black Hat GraphQL: Attacking Next Generation APIs Farhi, Dolev 9781718502840 No Starch Press,US
Black Hat GraphQL: Attacking Next Generation APIs

ISBN: 9781718502840 / Angielski / Miękka / 320 str.

ISBN: 9781718502840/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dolev Farhi
cena: 286,79

 Software Transparency: Supply Chain Security in an Era of a Software-Driven Society Hughes, Chris 9781394158485 John Wiley & Sons Inc
Software Transparency: Supply Chain Security in an Era of a Software-Driven Society

ISBN: 9781394158485 / Angielski / Miękka

ISBN: 9781394158485/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
C Hughes
cena: 139,15

 Stream Ciphers in Modern Real-time IT Systems: Analysis, Design and Comparative Studies Alexandr Alexandrovich Kuznetsov Oleksandr Volodymyrovych Potii Nikolay Alexandrovich Poluyanenko 9783030797720 Springer
Stream Ciphers in Modern Real-time IT Systems: Analysis, Design and Comparative Studies

ISBN: 9783030797720 / Angielski / Miękka / 585 str.

ISBN: 9783030797720/Angielski/Miękka/585 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexandr Alexandrovich Kuznetsov; Oleksandr Volodymyrovych Potii; Nikolay Alexandrovich Poluyanenko
This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers. Stream ciphers provide an encryption in almost real-time regardless of the volume and stream bit depth of converted data, which makes them the most popular in modern real-time IT systems.In particular, we analyze the criteria and performance indicators of algorithms, as well as the principles and methods of designing stream ciphers. Nonlinear-feedback shift registers, which are one...
This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption...
cena: 684,33

 Privacy-Preserving in Mobile Crowdsensing Chuan Zhang Tong Wu Youqi Li 9789811983146 Springer
Privacy-Preserving in Mobile Crowdsensing

ISBN: 9789811983146 / Angielski / Twarda / 682 str.

ISBN: 9789811983146/Angielski/Twarda/682 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chuan Zhang; Tong Wu; Youqi Li
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices. Commonly, individuals are incentivized to collect data to fulfill a crowdsensing task released by a data requester. This “sensing as a service” elaborates our knowledge of the physical world by opening up a new door of data collection and analysis. However, with the expansion of mobile crowdsensing, privacy issues urgently need to be solved.In this book, we discuss the research...
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using th...
cena: 644,07

 Java Illuminated Herve J. Franceschi 9781284250480 Jones and Bartlett Publishers, Inc
Java Illuminated

ISBN: 9781284250480 / Angielski / Miękka / 1200 str.

ISBN: 9781284250480/Angielski/Miękka/1200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Herve J. Franceschi
cena: 577,93

 Security and Organization within IoT and Smart Cities Kayhan Ghafoor Kevin Curran Linghe Kong 9780367673222 CRC Press
Security and Organization within IoT and Smart Cities

ISBN: 9780367673222 / Angielski / Miękka / 276 str.

ISBN: 9780367673222/Angielski/Miękka/276 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kayhan Ghafoor; Kevin Curran; Linghe Kong
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems.
cena: 231,95

 Password  Logbook (Hip Floral): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location Editors of Rock Point 9781631069567 Quarto Publishing Group USA Inc
Password Logbook (Hip Floral): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location

ISBN: 9781631069567 / Angielski / Twarda / 128 str.

ISBN: 9781631069567/Angielski/Twarda/128 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Editors of Rock Point
cena: 42,35

 AI, Machine Learning and Deep Learning: A Security Perspective Fei Hu Xiali Hei 9781032034041 CRC Press
AI, Machine Learning and Deep Learning: A Security Perspective

ISBN: 9781032034041 / Angielski / Twarda / 336 str.

ISBN: 9781032034041/Angielski/Twarda/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fei Hu; Xiali Hei
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks.
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provide a complete picture on the ch...
cena: 587,73

 CompTIA Network] N10-008 Certification Guide - Second Edition: The ultimate guide to passing the N10-008 exam Glen D. Singh 9781803236063 Packt Publishing
CompTIA Network] N10-008 Certification Guide - Second Edition: The ultimate guide to passing the N10-008 exam

ISBN: 9781803236063 / Angielski / Miękka / 692 str.

ISBN: 9781803236063/Angielski/Miękka/692 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Glen D. Singh
Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide. Purchase of the print or Kindle book includes a free eBook in the PDF format. Key Features A step-by-step guide to gaining a clear understanding of the Network+ certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-008 exam with the help of 200+ practice test questions and answers Book DescriptionThis book helps you...
Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTI...
cena: 254,59

 Cybersecurity Teaching in Higher Education Leslie F. Sikos Paul Haskell-Dowland 9783031242151 Springer
Cybersecurity Teaching in Higher Education

ISBN: 9783031242151 / Angielski

ISBN: 9783031242151/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Leslie F. Sikos; Paul Haskell-Dowland
This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the increasing number and impact of cyberattacks, there is a growing demand for cybersecurity courses in higher education. More and more educational institutions offer cybersecurity courses, which come with unique and constantly evolving challenges not known in other...
This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity ...
cena: 603,81

 Azure Cloud Computing Az-900 Exam Study Guide: 4 In 1 Microsoft Azure Cloud Deployment, Security, Privacy & Pricing Concepts Richie Miller 9781839381522 Pastor Publishing Ltd
Azure Cloud Computing Az-900 Exam Study Guide: 4 In 1 Microsoft Azure Cloud Deployment, Security, Privacy & Pricing Concepts

ISBN: 9781839381522 / Angielski

ISBN: 9781839381522/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richie Miller
cena: 135,43

 Computer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals Richie Miller 9781839381638 Pastor Publishing Ltd
Computer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals

ISBN: 9781839381638 / Angielski

ISBN: 9781839381638/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richie Miller
cena: 135,43

 Wireless Penetration Testing: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Security, and Break WEP, WPA, and WPA2 Protocols Ahmed Hashem El Fiky 9789355512741 Bpb Publications
Wireless Penetration Testing: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Security, and Break WEP, WPA, and WPA2 Protocols

ISBN: 9789355512741 / Angielski

ISBN: 9789355512741/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ahmed Hashem El Fiky
cena: 162,77

 Ceh V12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions Ric Messier 9781394186921 John Wiley & Sons Inc
Ceh V12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions

ISBN: 9781394186921 / Angielski / Miękka / 704 str.

ISBN: 9781394186921/Angielski/Miękka/704 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ric Messier
cena: 219,11

 Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud Sreekanth Iyer 9781803233581 Packt Publishing
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

ISBN: 9781803233581 / Angielski

ISBN: 9781803233581/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sreekanth Iyer
Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture management, and zero trust for your hybrid cloud deployments Key Features Secure cloud infrastructure, applications, data, and shift left security to create DevSecOps Explore patterns for continuous security, automated threat detection and accelerated incident response Leverage hybrid cloud security patterns for protecting critical data using a zero trust model Purchase of the print or Kindle book includes a free eBook in the PDF format Book...
Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture ma...
cena: 202,81

 Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans Shinesa Cambric Michael Ratemo 9781803243771 Packt Publishing
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans

ISBN: 9781803243771 / Angielski

ISBN: 9781803243771/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shinesa Cambric; Michael Ratemo
Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks Key Features Leverage best practices and emerging technologies to effectively audit a cloud environment Get better at auditing and unlock career opportunities in cloud audits and compliance Explore multiple assessments of various features in a cloud environment to see how it's done Book DescriptionAs more and more companies are moving to cloud and multi-cloud environments, being able to assess the compliance of these environments properly is becoming more important....
Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks Key Features Leverage be...
cena: 194,18

 Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks Ikram Ali Yong Chen Mohammad Faisal 9789811685880 Springer
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

ISBN: 9789811685880 / Angielski / Miękka / 230 str.

ISBN: 9789811685880/Angielski/Miękka/230 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ikram Ali; Yong Chen; Mohammad Faisal
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a...
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such...
cena: 603,81

 Computational Intelligence for Cybersecurity Management and Applications  9781032335032 Taylor & Francis Ltd
Computational Intelligence for Cybersecurity Management and Applications

ISBN: 9781032335032 / Angielski / Twarda / 240 str.

ISBN: 9781032335032/Angielski/Twarda/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
cena: 587,73

 Machine Learning for Cyber Agents: Attack and Defence Stanislav Abaimov Maurizio Martellini 9783030915872 Springer
Machine Learning for Cyber Agents: Attack and Defence

ISBN: 9783030915872 / Angielski / Miękka / 227 str.

ISBN: 9783030915872/Angielski/Miękka/227 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stanislav Abaimov; Maurizio Martellini
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have...
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, an...
cena: 362,27

Pierwsza Podprzednia  91  92  93  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia