Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 Revised Selected Papers
ISBN: 9783642322976 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects,...
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Be...
|
|
cena:
191,40 zł |
Federal Information Security: Select Protection & Control Efforts
ISBN: 9781619427716 / Angielski / Twarda / 145 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
736,50 zł |
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
ISBN: 9781466626591 / Angielski / Twarda / 452 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these...
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environme...
|
|
cena:
1124,68 zł |
Guide to Network Defense and Countermeasures
ISBN: 9781133727941 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
368,47 zł |
802.11 Wireless Networks: Security and Analysis
ISBN: 9781447125754 / Angielski / Miękka / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is about wireless local area networks (WLANs) based upon the IEEE 802.11 standards. It has three primary objectives: To introduce the principles of 802.11 wireless networks and show how to con- ure equipment in order to implement various network solutions. To provide an understandingof the security implicationsof wireless networks and demonstrate how vulnerabilities can be mitigated. To introduce the underlying 802.11 protocols and build mathematical models in order to analyse performance in a WLAN environment. The book is aimed at industry professionals as well as undergraduate and...
This book is about wireless local area networks (WLANs) based upon the IEEE 802.11 standards. It has three primary objectives: To introduce the princi...
|
|
cena:
382,84 zł |
Effective Monitoring and Alerting: For Web Operations
ISBN: 9781449333522 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability and deliver a high quality of service. Learn methods for measuring state changes and data flow in your system, and set up alerts to help you recover quickly from problems when they do arise. If you're a system operator waging the... With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on ... |
|
cena:
95,55 zł |
It Security Management: It Securiteers - Setting Up an It Security Function
ISBN: 9789400732629 / Angielski / Miękka / 247 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their... IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international ... |
|
cena:
382,84 zł |
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
ISBN: 9781447125792 / Angielski / Miękka / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth's population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information age stopped being an empty buzzword. But small is not necessarily beautiful. We now live in a global village and, alas, some (often very powerful) voices state that we ought not expect any more privacy in it. Should this be true, we would have created our own...
As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became ...
|
|
cena:
574,29 zł |
Spyware and Adware
ISBN: 9781461426837 / Angielski / Miękka / 146 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry. Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. ... |
|
cena:
382,84 zł |
Insider Threats in Cyber Security
ISBN: 9781461426387 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider... Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a... |
|
cena:
382,84 zł |
Security, Design, and Architecture for Broadband and Wireless Network Technologies
ISBN: 9781466639027 / Angielski / Twarda / 386 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there still remains to be a comprehensive understanding of its various dimensions and environments. Security, Design, and Architecture for Broadband and Wireless Network Technologies provides a discussion on the latest research achievements in wireless networks and broadband technology. Highlighting new trends, applications, developments, and standards, this book is essential for next generation researchers and practitioners in the ICT field.
While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there s...
|
|
cena:
1095,83 zł |
Social Network Engineering for Secure Web Data and Services
ISBN: 9781466639263 / Angielski / Twarda / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the internet; these platforms are not only used for content sharing purposes. They are also used to support and develop new services and applications. Social Network Engineering for Secure Web Data and Services provides empirical research on the engineering of social network infrastructures, the development of novel applications, and the impact of social network- based services over the internet. This comprehensive collection highlights issues and...
While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the intern...
|
|
cena:
1124,68 zł |
E-Discovery: Introduction to Digital Evidence (Book Only)
ISBN: 9781285427423 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Essential for anyone who works with technology in the field, E-DISCOVERY is a "hands-on, how-to" training guide that provides students with comprehensive coverage of the technology used in e-discovery in civil and criminal cases. From discovery identification to collection, processing, review, production, and trial presentation, this practical text covers everything your students need to know about e-discovery, including the Federal Rules of Civil Procedure, Federal Rules of Criminal Procedure, and Federal Rules of Evidence. Throughout the text, students will have the opportunity to work with...
Essential for anyone who works with technology in the field, E-DISCOVERY is a "hands-on, how-to" training guide that provides students with comprehens...
|
|
cena:
461,12 zł |
Preserving Privacy in Data Outsourcing
ISBN: 9781461426998 / Angielski / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Foreword by Pierangela Samarati Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are... Foreword by Pierangela Samarati Privacy requirements have an increasing impact on the realization of modern applications. Commercial and leg... |
|
cena:
382,84 zł |
Electronic Healthcare Information Security
ISBN: 9781461427469 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency. However, ICT adoption for healthcare information management has brought far-reaching effects and implications on the spirit of the Hippocratic Oath, patient privacy and confidentiality. A wave of security breaches have led to pressing calls for opt-in and opt-out provisions where patients are free to choose to or not have their healthcare information collected and recorded within healthcare information systems. Such provisions have...
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and eff...
|
|
cena:
459,42 zł |
Ceh Certified Ethical Hacker All-In-One Exam Guide, Third Edition [With Access Code]
ISBN: 9781259836558 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations. An integrated study system based on... Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objec... |
|
cena:
185,64 zł |
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers
ISBN: 9783642372995 / Angielski / Miękka / 243 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).
This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Asse...
|
|
cena:
176,13 zł |
Bluetooth & Wireless Local Area Networks: Security Guides
ISBN: 9781624172595 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
440,84 zł |
The Browser Hacker's Handbook
ISBN: 9781118662090 / Angielski / Miękka / 648 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer -program- in the world. As the gateway to the Internet, it is part of the storefront to any business... Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding ... |
|
cena:
245,70 zł |
Applied Network Security Monitoring: Collection, Detection, and Analysis
ISBN: 9780124172081 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident... Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental appr... |
|
cena:
207,43 zł |