• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2632

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Computer Security and Penetration Testing PhD, CISSP, CISA, Mary (Capella University) Brown 9780840020932 Cengage Learning, Inc
Computer Security and Penetration Testing

ISBN: 9780840020932 / Angielski / Miękka / 512 str.

ISBN: 9780840020932/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mary (Capella University) Brown CISA CISSP PhD
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new...
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience level...
cena: 293,21 zł

 Elements of Computer Security David Salomon 9780857290052 0
Elements of Computer Security

ISBN: 9780857290052 / Angielski / Miękka / 396 str.

ISBN: 9780857290052/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Salomon

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors.

Topics and features: examines the physical...

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing compute...

cena: 141,03 zł

 Guide to Network Security, International Edition Michael Whitman 9781133279075 DELMAR
Guide to Network Security, International Edition

ISBN: 9781133279075 / Angielski / Miękka / 512 str.

ISBN: 9781133279075/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Whitman
This wide-ranging text provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions.
This wide-ranging text provides a detailed review of the network security field, including essential terminology, the history of the discipline, and p...
cena: 324,08 zł

 The Lure : The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals Stephen Schroeder 9781435457126 0
The Lure : The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals

ISBN: 9781435457126 / Angielski / Miękka / 448 str.

ISBN: 9781435457126/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Schroeder
A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers and academics who wish to learn how to protect systems from abuse, and who wish to respond to network incidents.
A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that c...
cena: 169,73 zł

 Secure Software Design  Richardson 9781449626327 0
Secure Software Design

ISBN: 9781449626327 / Angielski / Miękka / 412 str.

ISBN: 9781449626327/Angielski/Miękka/412 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richardson
With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state and many have predicted that it will remain so for the foreseeable future. This book seeks to change that opinion by presenting a practical guide to proactive software security. Secure Software Design is written for the student, the developer, and management to bring a new way of thinking to secure software design. The focus of this book is on analyzing risks, understanding likely points of attack, and pre-deciding how your software will deal...
With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state an...
cena: 791,82 zł

 The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System Blunden, Bill 9781449626365 0
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System

ISBN: 9781449626365 / Angielski / Miękka / 784 str.

ISBN: 9781449626365/Angielski/Miękka/784 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Blunden
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The...
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It ...
cena: 532,77 zł

 The Practice of Network Security Monitoring Richard Bejtlich 9781593275099 No Starch Press,US
The Practice of Network Security Monitoring

ISBN: 9781593275099 / Angielski / Miękka / 341 str.

ISBN: 9781593275099/Angielski/Miękka/341 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard Bejtlich
Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy,...

Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most ...
cena: 272,33 zł

 Nessus Network Auditing J Beale 9781597492089 0
Nessus Network Auditing

ISBN: 9781597492089 / Angielski / Miękka / 433 str.

ISBN: 9781597492089/Angielski/Miękka/433 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J Beale
The Updated Version of the Bestselling Nessus Book.

This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.

* Perform a Vulnerability Assessment
Use...

The Updated Version of the Bestselling Nessus Book.

This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its begin...

cena: 229,68 zł

 Fisma and the Risk Management Framework: The New Practice of Federal Cyber Security Gantz, Stephen D. 9781597496414 0
Fisma and the Risk Management Framework: The New Practice of Federal Cyber Security

ISBN: 9781597496414 / Angielski / Miękka / 562 str.

ISBN: 9781597496414/Angielski/Miękka/562 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Philpott
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies.
Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA)...
cena: 268,78 zł

 Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers O'Connor, TJ 9781597499576 Syngress Media,U.S.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

ISBN: 9781597499576 / Angielski / Miękka / 288 str.

ISBN: 9781597499576/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
TJ O'Connor

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to...

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead...

cena: 195,46 zł

 Robust Control System Networks: How to Achieve Reliable Control After Stuxnet  Langner 9781606503003 Momentum Press
Robust Control System Networks: How to Achieve Reliable Control After Stuxnet

ISBN: 9781606503003 / Angielski / Twarda / 222 str.

ISBN: 9781606503003/Angielski/Twarda/222 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Langner
From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes a new, radical approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves to be "robust." Other security experts advocate risk management, implementing more firewalls and carefully managing passwords and access. Not so this book: those measures, while necessary, can still be circumvented. Instead, this book shows in clear, concise detail how a system that has been set up with an eye toward...
From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes...
cena: 385,35 zł

 Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Lee Allen 9781849517744 0
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide

ISBN: 9781849517744 / Angielski / Miękka / 414 str.

ISBN: 9781849517744/Angielski/Miękka/414 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lee Allen
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration...
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and ...
cena: 284,81 zł

 Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide Chappell, Laura 9781893939943 0
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide

ISBN: 9781893939943 / Angielski / Miękka / 986 str.

ISBN: 9781893939943/Angielski/Miękka/986 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Laura Chappell
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark. Learn to customize Wireshark for faster and more accurate analysis of your network traffic. Build graphs to identify and expose issues such as packet loss, receiver congestion, slow server response, network queuing...
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
cena: 545,52 zł

 Information and Communications Security: 15th International Conference, Icics 2013, Beijing, China, November 20-22, 2013, Proceedings Qing, Sihan 9783319027258 Springer
Information and Communications Security: 15th International Conference, Icics 2013, Beijing, China, November 20-22, 2013, Proceedings

ISBN: 9783319027258 / Angielski / Miękka / 414 str.

ISBN: 9783319027258/Angielski/Miękka/414 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sihan Qing; Jianying Zhou; Dongmei Liu
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering...
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Be...
cena: 201,72 zł

 Kali Linux Cookbook Willie Pritchett 9781783289592 Packt Publishing
Kali Linux Cookbook

ISBN: 9781783289592 / Angielski / Miękka / 260 str.

ISBN: 9781783289592/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willie Pritchett
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. This book outlines a variety of popular tools of penetration testing, and thus serves as a source of information for the security professional and novice alike.
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular ...
cena: 366,81 zł

 Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? Subcommittee on Crime and Terrorism of T 9781532792007 Createspace Independent Publishing Platform
Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?

ISBN: 9781532792007 / Angielski / Miękka / 112 str.

ISBN: 9781532792007/Angielski/Miękka/112 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Subcommittee on Crime and Terrorism of T.
cena: 72,63 zł

 Open Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers Camenisch, Jan 9783319390277 Springer
Open Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers

ISBN: 9783319390277 / Angielski / Miękka / 127 str.

ISBN: 9783319390277/Angielski/Miękka/127 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch; Dogan Kesdogan; Do an Kesdo an

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security.
The 9 revised full papers presented in this volume were carefully reviewed and selected from 13 submissions. They were organized in topical sections named: network security; intrusion...

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Se...

cena: 201,72 zł

 Architectures and Protocols for Secure Information Technology Infrastructures Ruiz-Martinez 9781466645141 Information Science Reference
Architectures and Protocols for Secure Information Technology Infrastructures

ISBN: 9781466645141 / Angielski / Twarda / 427 str.

ISBN: 9781466645141/Angielski/Twarda/427 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ruiz-Martinez
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making th...
cena: 999,40 zł

 Network Security Technologies: Design and Applications Abdelmalek Amine 9781466647893 Information Science Reference
Network Security Technologies: Design and Applications

ISBN: 9781466647893 / Angielski / Twarda / 330 str.

ISBN: 9781466647893/Angielski/Twarda/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelmalek Amine
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested...
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologie...
cena: 999,40 zł

 Analyzing Security, Trust, and Crime in the Digital World Hamid R. Nemati 9781466648562 Information Science Reference
Analyzing Security, Trust, and Crime in the Digital World

ISBN: 9781466648562 / Angielski / Twarda / 281 str.

ISBN: 9781466648562/Angielski/Twarda/281 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid R. Nemati
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizatio...
cena: 999,40 zł

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia