• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3090713]
• Literatura piękna
 [1812092]

  więcej...
• Turystyka
 [52353]
• Informatyka
 [156406]
• Komiksy
 [36497]
• Encyklopedie
 [23076]
• Dziecięca
 [611051]
• Hobby
 [103270]
• AudioBooki
 [1744]
• Literatura faktu
 [194823]
• Muzyka CD
 [382]
• Słowniki
 [2994]
• Inne
 [446649]
• Kalendarze
 [242]
• Podręczniki
 [166396]
• Poradniki
 [420635]
• Religia
 [508575]
• Czasopisma
 [545]
• Sport
 [61132]
• Sztuka
 [249371]
• CD, DVD, Video
 [3442]
• Technologie
 [230899]
• Zdrowie
 [98302]
• Książkowe Klimaty
 [126]
• Zabawki
 [2532]
• Puzzle, gry
 [4027]
• Literatura w języku ukraińskim
 [273]
• Art. papiernicze i szkolne
 [8376]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2876

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Invitation to Cryptology Thomas H. Barr 9780130889768 Prentice Hall
Invitation to Cryptology

ISBN: 9780130889768 / Angielski / Twarda / 408 str.

ISBN: 9780130889768/Angielski/Twarda/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas H. Barr

This book introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. The new and old are organized around a historical framework. A variety of mathematical topics that are germane to cryptology (e.g., modular arithmetic, Boolean functions, complexity theory, etc.) are developed, but they do not overshadow the main focus of the book. Chapter topics cover origins, examples, and ideas in cryptology; classical cryptographic techniques; symmetric computer-based cryptology; public-key cryptography; and present practice,...

This book introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. The new an...

cena: 948,99

Wireless Network Security Yang Xiao Xuemin Shen Ding-Zhu Du 9780387280400 Springer
Wireless Network Security

ISBN: 9780387280400 / Angielski / Twarda / 432 str.

ISBN: 9780387280400/Angielski/Twarda/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yang Xiao; Xuemin Shen; Ding-Zhu Du

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.


This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireles...

cena: 608,07

Botnet Detection: Countering the Largest Security Threat Lee, Wenke 9780387687667 Springer
Botnet Detection: Countering the Largest Security Threat

ISBN: 9780387687667 / Angielski / Twarda / 168 str.

ISBN: 9780387687667/Angielski/Twarda/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wenke Lee; Cliff Wang; David Dagon

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help ...

cena: 405,36

Critical Information Infrastructures: Resilience and Protection Hyslop, Maitland 9780387718613 Springer
Critical Information Infrastructures: Resilience and Protection

ISBN: 9780387718613 / Angielski / Twarda / 278 str.

ISBN: 9780387718613/Angielski/Twarda/278 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maitland Hyslop
Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It is crucial in the area of Critical Information Infrastructure. This is because, since the year 2000, man has been dependent on information and telecommunications systems for survival, particularly in the Organization for Economic Cooperation and Development (OECD) countries, and because all other Critical Inf- structures depend upon, to a greater or lesser extent, Critical Information 1,2 Infrastructure. Until, probably, the late 1980s it would...
Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It...
cena: 405,36

New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen Venter, Hein 9780387723662 Springer
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen

ISBN: 9780387723662 / Angielski / Twarda / 498 str.

ISBN: 9780387723662/Angielski/Twarda/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Les Labuschagne; Rossouw Von Solms; Mariki Eloff
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Security, Privacy and Trust in Complex Environments" held in Sandton, South Africa from 14 to 16 May 2007. The IFIP/SEC conferences are the flagship events of TC-11. In May 1995 South Africa for the first time hosted an IFIP/SEC conference in Cape Town. Now, twelve years later, we are very pleased to have succeeded in our bid to once again present the IFIP/SEC conference in South Africa. The current IT environment deals with novel, complex approaches...
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Securit...
cena: 405,36

Security for Telecommunications Networks Patrick McDaniel Thomas L 9780387724416 Springer
Security for Telecommunications Networks

ISBN: 9780387724416 / Angielski / Twarda / 192 str.

ISBN: 9780387724416/Angielski/Twarda/192 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrick McDaniel; Thomas La Porta

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in...

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunicati...

cena: 486,44

Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac Futcher, Lynn 9780387732688 Springer
Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac

ISBN: 9780387732688 / Angielski / Twarda / 148 str.

ISBN: 9780387732688/Angielski/Twarda/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ronald Dodge

International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings...

International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of inform...

cena: 202,66

Vulnerability Analysis and Defense for the Internet  9780387743899 Springer
Vulnerability Analysis and Defense for the Internet

ISBN: 9780387743899 / Angielski / Twarda / 254 str.

ISBN: 9780387743899/Angielski/Twarda/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in...
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerabilit...
cena: 405,36

Network Security Fundamentals Krutz, Ronald L. 9780470101926 John Wiley & Sons
Network Security Fundamentals

ISBN: 9780470101926 / Angielski / Miękka / 560 str.

ISBN: 9780470101926/Angielski/Miękka/560 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Cole; Ronald L. Krutz; James Conley
You can get there

Whether you're already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn network security techniques at your own pace; it helps you master the core competencies and skills you need to succeed.

With this book, you will be able to:
* Understand basic terminology and concepts related to security
* Utilize cryptography, authentication,...
You can get there

Whether you're already working and looking to expand your skills in the computer networking and security field or setti...
cena: 459,88

Professional Pen Testing for Web Applications Andres Andreu 9780471789666 Wrox Press
Professional Pen Testing for Web Applications

ISBN: 9780471789666 / Angielski / Miękka / 552 str.

ISBN: 9780471789666/Angielski/Miękka/552 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andres Andreu
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.

After a review of the basics of web applications, you'll be...
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing crea...
cena: 213,68

Network Security with Openssl: Cryptography for Secure Communications Viega, John 9780596002701 O'Reilly Media
Network Security with Openssl: Cryptography for Secure Communications

ISBN: 9780596002701 / Angielski / Miękka / 386 str.

ISBN: 9780596002701/Angielski/Miękka/386 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Viega; Matt Messier; Pravir Chandra

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it...

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats...

cena: 155,21

Secure Programming Cookbook for C & C++ John Viega 9780596003944 O'Reilly Media
Secure Programming Cookbook for C & C++

ISBN: 9780596003944 / Angielski / Miękka / 792 str.

ISBN: 9780596003944/Angielski/Miękka/792 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Viega

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult.

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to...

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks....

cena: 296,80

Security Power Tools Bryan Burns Jennifer Stisa Granick Steve Manzuik 9780596009632 O'Reilly Media
Security Power Tools

ISBN: 9780596009632 / Angielski / Miękka / 860 str.

ISBN: 9780596009632/Angielski/Miękka/860 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bryan Burns; Jennifer Stisa Granick; Steve Manzuik

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.

Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that...

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Sec...

cena: 233,06

Internet Security: Hacking, Counterhacking, and Society: Hacking, Counterhacking, and Society Himma, Kenneth Einar 9780763735364 Jones & Bartlett Publishers
Internet Security: Hacking, Counterhacking, and Society: Hacking, Counterhacking, and Society

ISBN: 9780763735364 / Angielski / Miękka / 304 str.

ISBN: 9780763735364/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth Einar Himma
The Frequency Of Digital Attacks And Intrusions Has Steadily Increased Over The Years As The Number Of People With The Appropriate Motivation And Technical Ability Continues To Grow. Internet Security: Hacking, Counterhacking, And Society Is A Modern Survey Of The Recent Ethical Policy Issues Arising In Connection With Internet And Network Security. This Exciting Collection Of Papers, Articles, And Monographs Discusses A Number Of Important Ethical Questions Arising In Many Distinct Areas Of Internet And Network Security, Including: Are Hacker Attacks And Hacktivism Morally Justified? Is...
The Frequency Of Digital Attacks And Intrusions Has Steadily Increased Over The Years As The Number Of People With The Appropriate Motivation And Tech...
cena: 608,56

Information Security: Contemporary Cases: Contemporary Cases Wright, Marie A. 9780763738198 Jones & Bartlett Publishers
Information Security: Contemporary Cases: Contemporary Cases

ISBN: 9780763738198 / Angielski / Miękka / 214 str.

ISBN: 9780763738198/Angielski/Miękka/214 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marie A. Wright; John S. Kakalik
Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And...
Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive C...
cena: 305,17

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Young, Susan 9780849308888 Auerbach Publications
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

ISBN: 9780849308888 / Angielski / Twarda / 896 str.

ISBN: 9780849308888/Angielski/Twarda/896 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J. Burke Hansen; Susan Young
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing ...
cena: 667,93

Securing Windows Nt/2000: From Policies to Firewalls Simonyi, Michael A. 9780849312618 Auerbach Publications
Securing Windows Nt/2000: From Policies to Firewalls

ISBN: 9780849312618 / Angielski / Miękka / 272 str.

ISBN: 9780849312618/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael A. Simonyi
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The...
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large cor...
cena: 519,50

The Ethical Hack: A Framework for Business Value Penetration Testing Tiller, James S. 9780849316098 Auerbach Publications
The Ethical Hack: A Framework for Business Value Penetration Testing

ISBN: 9780849316098 / Angielski / Twarda / 356 str.

ISBN: 9780849316098/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James S. Tiller; Tiller S. Tiller
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.The Ethical Hack: A Framework for Business Value...
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered f...
cena: 667,93

Network Perimeter Security: Building Defense In-Depth Riggs, Cliff 9780849316289 Auerbach Publications
Network Perimeter Security: Building Defense In-Depth

ISBN: 9780849316289 / Angielski / Twarda / 420 str.

ISBN: 9780849316289/Angielski/Twarda/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cliff Riggs
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time...
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-t...
cena: 667,93

Surviving Security: How to Integrate People, Process, and Technology Andress, Amanda 9780849320422 Auerbach Publications
Surviving Security: How to Integrate People, Process, and Technology

ISBN: 9780849320422 / Angielski / Twarda / 528 str.

ISBN: 9780849320422/Angielski/Twarda/528 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andress Andress; Amanda Andress; Amanda Andress
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security...
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be t...
cena: 667,93

 1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia