Information Security: Principles and New Concepts (Volume IV)
ISBN: 9781632403094 / Angielski / Twarda / 210 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be sec...
|
|
cena:
650,25 zł |
Wireless Ad-Hoc Networks
ISBN: 9781632405241 / Angielski / Twarda / 174 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book discusses the topic of wireless ad-hoc networks with the help of state-of-the-art information. A wireless ad-hoc network can be defined as a wireless network set up without any infrastructure. These types of networks include mobile ad-hoc networks, vehicular ad-hoc networks, and wireless mesh networks. This book highlights the basic-most aspects of these networks. It consists of information related to the analysis of routing protocols for better efficiency, the design of the link layer for enhanced performance, and practical issues in application. These topics are critical for...
This book discusses the topic of wireless ad-hoc networks with the help of state-of-the-art information. A wireless ad-hoc network can be defined as a...
|
|
cena:
411,75 zł |
Cyber-Physical Attacks: A Growing Invisible Threat
ISBN: 9780128012901 / Angielski / Miękka / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political,... Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable camer... |
|
cena:
191,87 zł |
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se
ISBN: 9783319170152 / Angielski / Miękka / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 9th International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1...
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Worksh...
|
|
cena:
191,40 zł |
Hacking Wireless Networks - The ultimate hands-on guide
ISBN: 9781508476344 / Angielski / Miękka / 430 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup your own hacking lab and learn through practice? If yes, then this is the book for you Hacking Wireless Networks - The ultimate hands-on guide, is a book written for people who seek to practice the techniques of assessing the security of wireless infrastructures.Through 30 real life scenarios and more than 300 figures the book examines in details the following areas: - Discovery and Profiling of wireless networks - Denial of Service attacks -...
Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup yo...
|
|
cena:
78,59 zł |
Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide
ISBN: 9780983660750 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cisco ASA for Accidental Administrators is a major update to the previous Accidental Administrator ASA book. This new edition is packed with 48 easy-to-follow hands-on exercises to help you build a working firewall configuration from scratch. Based on software version 9.x, it continues as the most straight-forward approach to learning how to configure the Cisco ASA Security Appliance, filled with practical tips and secrets learned from years of teaching and consulting on the ASA. There is no time wasted on boring theory. The essentials are covered in chapters on installing, backups and...
Cisco ASA for Accidental Administrators is a major update to the previous Accidental Administrator ASA book. This new edition is packed with 48 easy-t...
|
|
cena:
195,14 zł |
Learning Puppet Security
ISBN: 9781784397753 / Angielski / Miękka / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
213,65 zł |
Handbook of Research on Threat Detection and Countermeasures in Network Security
ISBN: 9781466665835 / Angielski / Twarda / 452 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats.
As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online communit...
|
|
cena:
1874,45 zł |
DNS Security: Defending the Domain Name System
ISBN: 9780128033067 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers... DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common D... |
|
cena:
191,87 zł |
Linux Hardening in Hostile Networks: Server Security from TLS to Tor
ISBN: 9780134173269 / Angielski / Mixed media product / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. In Linux(R) Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time. Rankin provides clear, concise guidance on modern workstation,...
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly...
|
|
cena:
170,89 zł |
VMware vSphere Essentials
ISBN: 9781784398750 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
237,94 zł |
Journal of Cyber Security and Mobility 3-4
ISBN: 9788793237650 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT)...
Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable...
|
|
cena:
249,14 zł |
Secure Your Node.Js Web Application: Keep Attackers Out and Users Happy
ISBN: 9781680500851 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users. Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to ste... |
|
cena:
158,29 zł |
The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology
ISBN: 9781514331361 / Angielski / Miękka / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings you a complete and up-to-date overview of the key issues related to the adoption and use of information technology, communications and healthcare, with detailed practical information to support students, professionals and other stakeholders in the field of healthcare. Health Informatics, an evolving specialization, strives to improve the quality and safety of patient care. This book addresses the concepts, tasks and skills that professionals...
The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings...
|
|
cena:
68,07 zł |
Juniper MX Series: A Comprehensive Guide to Trio Technologies on the MX
ISBN: 9781491932728 / Angielski / Miękka / 1140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Discover why routers in the Juniper MX Series--with their advanced feature sets and record-breaking scale--are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features. This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX... Discover why routers in the Juniper MX Series--with their advanced feature sets and record-breaking scale--are so popular among enterprises and net... |
|
cena:
297,57 zł |
Cyber Nation: How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.
ISBN: 9781514863220 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the next World War - an epic battle against states, governments, companies and individuals? Venture capital and cybersecurity expert, Ross Blankenship (http: //angelkings.com/invest), shows you who's on the most wanted cyber criminal list, what methods cyber hackers are using to attack networks, where these cyber attacks have taken place (Anthem, Target, Sony, and the United States' Office of Personnel Management), when these attacks...
"The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the ...
|
|
cena:
90,84 zł |
Hacking: The Ultimate Hacking Guide for Beginner's
ISBN: 9781514893128 / Angielski / Miękka / 46 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains proven steps and strategies on how to hack computer systems and devices in order to promote better security and ethical computing practices. This book is all about learning security and preventing malicious networking and physical practices that are designed to steal information or invade privacy. Contrary to popular belief, hacking is not created to promote illegal activities such as these - hacking is actually an ingenious way to thwart these malicious activities. This book will teach you how to effectively outsmart crackers and script kiddies who are out there to steal...
This book contains proven steps and strategies on how to hack computer systems and devices in order to promote better security and ethical computing p...
|
|
cena:
45,49 zł |
Journal of Cyber Security and Mobility 4-1: Resilient and Trustworthy IoT Systems
ISBN: 9788793237667 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that the IoT systems we design, develop, and deploy are resilient and trustworthy. Almost universal availability is expected, yet individual devices will routinely fail and/or be compromised. Despite this, the services should be resilient and trustworthy. The environments where the devices will be deployed will range from protected and controlled environments to potentially very hostile environments where the exposure is extreme.
The cyber security... The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that th...
|
|
cena:
218,56 zł |
Learning Puppet for Windows Server
ISBN: 9781785281877 / Angielski / Miękka / 234 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
237,94 zł |
Learning Python Penetration Testing
ISBN: 9781785282324 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
267,08 zł |