• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2632

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Critical Information Infrastructures: Resilience and Protection Hyslop, Maitland 9781441944191 Springer
Critical Information Infrastructures: Resilience and Protection

ISBN: 9781441944191 / Angielski / Miękka / 278 str.

ISBN: 9781441944191/Angielski/Miękka/278 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maitland Hyslop
Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It is crucial in the area of Critical Information Infrastructure. This is because, since the year 2000, man has been dependent on information and telecommunications systems for survival, particularly in the Organization for Economic Cooperation and Development (OECD) countries, and because all other Critical Inf- structures depend upon, to a greater or lesser extent, Critical Information 1,2 Infrastructure. Until, probably, the late 1980s it would...
Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It...
cena: 403,47 zł

 Handbook of Database Security: Applications and Trends Gertz, Michael 9781441943057 Springer
Handbook of Database Security: Applications and Trends

ISBN: 9781441943057 / Angielski / Miękka / 577 str.

ISBN: 9781441943057/Angielski/Miękka/577 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Gertz; Sushil Jajodia
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today s often missi- critical databases no longer contain only data used for day-to-day processing by...
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increas...
cena: 443,82 zł

 Power Analysis Attacks: Revealing the Secrets of Smart Cards Mangard, Stefan 9781441940391 Springer
Power Analysis Attacks: Revealing the Secrets of Smart Cards

ISBN: 9781441940391 / Angielski / Miękka / 338 str.

ISBN: 9781441940391/Angielski/Miękka/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Mangard; Elisabeth Oswald; Thomas Popp

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how...

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mo...

cena: 726,29 zł

 Grid Computing Security Anirban Chakrabarti 9783642079436 Springer
Grid Computing Security

ISBN: 9783642079436 / Angielski / Miękka / 331 str.

ISBN: 9783642079436/Angielski/Miękka/331 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anirban Chakrabarti
Grid computing is widely regarded as a technology of immense potential. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area.
Grid computing is widely regarded as a technology of immense potential. Together with a brief introduction into grid computing in general and underlyi...
cena: 201,72 zł

 Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings Xie, Bing 9783642165757 Springer
Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings

ISBN: 9783642165757 / Angielski / Miękka / 328 str.

ISBN: 9783642165757/Angielski/Miękka/328 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guirong XIE; Juergen Branke; S. Masoud Sadjadi
Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible...
Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have bec...
cena: 201,72 zł

 Open Research Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Pape Camenisch, Jan 9783642192272 Not Avail
Open Research Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Pape

ISBN: 9783642192272 / Angielski / Miękka / 171 str.

ISBN: 9783642192272/Angielski/Miękka/171 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch; Valentin Kisimov; Maria Dubovitskaya
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in M...
cena: 201,72 zł

 Information Security Practice and Experience Kwak, Jin 9783642128264 Springer
Information Security Practice and Experience

ISBN: 9783642128264 / Angielski / Miękka / 397 str.

ISBN: 9783642128264/Angielski/Miękka/397 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jin Kwak; Robert H. Deng; Yoojae Won
The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12 13, 2010. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems invariousverticalsectors.Inpreviousyears, ISPEChastakenplaceinSingapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008), andXi an, China (2009).For all sessions, as this one, the conferencep-...
The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12 13, 2010. The ISPEC con...
cena: 201,72 zł

 Information Security Applications Chung, Yongwha 9783642179549 Not Avail
Information Security Applications

ISBN: 9783642179549 / Angielski / Miękka / 352 str.

ISBN: 9783642179549/Angielski/Miękka/352 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yongwha Chung; Moti Yung
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island...
cena: 201,72 zł

 Data Privacy Management and Autonomous Spontaneous Security: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010 Athens, G Garcia-Alfaro, Joaquin 9783642193477 Not Avail
Data Privacy Management and Autonomous Spontaneous Security: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010 Athens, G

ISBN: 9783642193477 / Angielski / Miękka / 259 str.

ISBN: 9783642193477/Angielski/Miękka/259 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquin Garcia-Alfaro; Guillermo Navarro-Arribas; Ana Cavalli
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to...
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Ma...
cena: 201,72 zł

 Public Key Cryptography: PKC 2011 Catalano, Dario 9783642193781 Not Avail
Public Key Cryptography: PKC 2011

ISBN: 9783642193781 / Angielski / Miękka / 495 str.

ISBN: 9783642193781/Angielski/Miękka/495 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dario Catalano; Nelly Fazio; Rosario Gennaro
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011. The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC ...
cena: 201,72 zł

 Formal Aspects of Security and Trust Degano, Pierpaolo 9783642197505 Not Avail
Formal Aspects of Security and Trust

ISBN: 9783642197505 / Angielski / Miękka / 239 str.

ISBN: 9783642197505/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pierpaolo Degano; Sandro Etalle; Joshua Guttman
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust,...
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, h...
cena: 201,72 zł

 Pfsense 2 Cookbook Williamson, Matt 9781849514866 Packt Publishing
Pfsense 2 Cookbook

ISBN: 9781849514866 / Angielski / Miękka / 252 str.

ISBN: 9781849514866/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Williamson
pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important, compared to other offerings. Through this book you will see that pfSense offers numerous alternatives to fit any environment's security needs. pfSense 2.0 Cookbook is the first and only book to explore all the features of pfSense, including those released in the latest 2.0 version. With...
pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versa...
cena: 210,86 zł

 Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Wrightson, Tyler 9780071828369 McGraw-Hill/Osborne Media
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

ISBN: 9780071828369 / Angielski / Miękka / 464 str.

ISBN: 9780071828369/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tyler Wrightson
Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples...

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills,...

cena: 234,42 zł

 Security, Privacy, and Trust in Modern Data Management Milan Petkovic Willem Jonker 9783642089268 Not Avail
Security, Privacy, and Trust in Modern Data Management

ISBN: 9783642089268 / Angielski / Miękka / 472 str.

ISBN: 9783642089268/Angielski/Miękka/472 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Milan Petkovic; Willem Jonker
Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf-...
Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these ...
cena: 464,01 zł

 Backtrack 4: Assuring Security by Penetration Testing Ali, Shakeel 9781849513944 Packt Publishing
Backtrack 4: Assuring Security by Penetration Testing

ISBN: 9781849513944 / Angielski / Miękka / 392 str.

ISBN: 9781849513944/Angielski/Miękka/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shakeel Ali; Heriyanto Tedi
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network. BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step...
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered i...
cena: 236,69 zł

 Privacy-Respecting Intrusion Detection Ulrich Flegel 9781441941756 Springer
Privacy-Respecting Intrusion Detection

ISBN: 9781441941756 / Angielski / Miękka / 307 str.

ISBN: 9781441941756/Angielski/Miękka/307 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ulrich Flegel
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept,...
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for...
cena: 585,06 zł

 Privacy-Preserving Data Mining: Models and Algorithms Aggarwal, Charu C. 9781441943712 Springer
Privacy-Preserving Data Mining: Models and Algorithms

ISBN: 9781441943712 / Angielski / Miękka / 514 str.

ISBN: 9781441943712/Angielski/Miękka/514 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charu C. Aggarwal; Philip S. Yu

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and...

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns t...

cena: 887,69 zł

 New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen Venter, Hein 9781441944337 Springer
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen

ISBN: 9781441944337 / Angielski / Miękka / 498 str.

ISBN: 9781441944337/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hein Venter; Mariki Eloff; Les Labuschagne
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Security, Privacy and Trust in Complex Environments" held in Sandton, South Africa from 14 to 16 May 2007. The IFIP/SEC conferences are the flagship events of TC-11. In May 1995 South Africa for the first time hosted an IFIP/SEC conference in Cape Town. Now, twelve years later, we are very pleased to have succeeded in our bid to once again present the IFIP/SEC conference in South Africa. The current IT environment deals with novel, complex approaches...
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Securit...
cena: 403,47 zł

 Security for Telecommunications Networks Patrick Traynor Patrick McDaniel Thomas L 9781441944382 Springer
Security for Telecommunications Networks

ISBN: 9781441944382 / Angielski / Miękka / 182 str.

ISBN: 9781441944382/Angielski/Miękka/182 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrick Traynor; Patrick McDaniel; Thomas La Porta
Creating a starting place for new researchers in the field of secure telecommunications networks, this volume not only discusses emerging threats, along with system vulnerability, but also presents the open questions posited by network evolution and defence mechanisms.
Creating a starting place for new researchers in the field of secure telecommunications networks, this volume not only discusses emerging threats, alo...
cena: 342,95 zł

 Trust Management: Proceedings of Ifiptm 2007: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, July 30-August Etalle, Sandro 9781441944658 Not Avail
Trust Management: Proceedings of Ifiptm 2007: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, July 30-August

ISBN: 9781441944658 / Angielski / Miękka / 414 str.

ISBN: 9781441944658/Angielski/Miękka/414 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sandro Etalle; Stephen Marsh
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- ton, New Brunswick, Canada from July 29th to August 2nd, 2007. The annual iTrust international conference looks at trust from multidis- plinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology, is built on the work of the iTrust working group (http: //www.itrust.uoc.gr), and has had four highly successful conferences in Europe to date. The annual PST conference has quickly established itself as a...
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- t...
cena: 403,47 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia