Journal of Cyber Security and Mobility 1-2/3
ISBN: 9788792982117 / Angielski / Miękka / 154 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
132,83 zł |
Journal of Cyber Security and Mobility 2-1
ISBN: 9788792982599 / Angielski / Miękka / 112 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
132,83 zł |
Femtocells: Secure Communication and Networking
ISBN: 9788792982858 / Angielski / Twarda / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With Femtocell popularities and deployments on the rise, a number of Femtocell security breaches have been reported. This is a result of pre-standards Femtocells versions that did not conform to or implement the published standards as a result of lack of understanding of basic security principles. A considerable amount of effort has been devoted, both in industry forums and standards developing organizations, toward creating technical specifications for the architecture, operation, and security of the Femtocells. Security remains on the minds of operators as the traditionally closed operator...
With Femtocell popularities and deployments on the rise, a number of Femtocell security breaches have been reported. This is a result of pre-standards...
|
|
cena:
504,68 zł |
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
ISBN: 9781118825099 / Angielski / Miękka / 912 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,... Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memo... |
|
cena:
276,28 zł |
Getting Started with Fortigate
ISBN: 9781782178200 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
|
|
cena:
157,90 zł |
Monitoring with Opsview
ISBN: 9781783284733 / Angielski / Miękka / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Leverage the power of Opsview to effectively monitor your physical, virtual, and private cloud infrastructure. Add plugins to Windows and Linux agents and set up vSphere monitoring successfully.
Leverage the power of Opsview to effectively monitor your physical, virtual, and private cloud infrastructure. Add plugins to Windows and Linux agents...
|
|
cena:
157,90 zł |
Penetration Testing with Backbox
ISBN: 9781783282975 / Angielski / Miękka / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
157,90 zł |
Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware
ISBN: 9780128006047 / Angielski / Miękka / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of... Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Ta... |
|
cena:
121,09 zł |
Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography
ISBN: 9783642550454 / Angielski / Miękka / 131 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
|
|
cena:
194,08 zł |
Social Engineering in IT Security: Tools, Tactics, and Techniques
ISBN: 9780071818469 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you...
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything you] need to know about the fundamentals of ...
|
|
cena:
188,03 zł |
Journal of Cyber Security and Mobility 2-3/4
ISBN: 9788793102927 / Angielski / Miękka / 170 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
132,83 zł |
Computer Networks: 21st International Conference, Cn 2014, Brunów, Poland, June 23-27, 2014. Proceedings
ISBN: 9783319079400 / Angielski / Miękka / 349 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Networks, CN 2014, held in Brunow, Poland, in June 2014. The 34 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, tele informatics and communications, new technologies, queueing theory, innovative applications and networked and IT-related aspects of e-business.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Networks, CN 2014, held in Brunow, Poland, ...
|
|
cena:
194,08 zł |
Network Topology in Command and Control: Organization, Operation, and Evolution
ISBN: 9781466660588 / Angielski / Twarda / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
1222,01 zł |
Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
ISBN: 9788793102965 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defense. Of special interest is the creation of better tools for the development of secure software as well as tools that help users find vulnerabilities and better understand the types of attacks that they will have to face. The papers in this issue are: "The Sad History of Random Bits" by George Markowsky applies the concept of a system accident to the analysis of the problems that have cropped up with pseudo-random number generators over the last...
Cyber security is a hotbed of activity and has become more vital than ever. As the stakes continue to rise more effort is being focused on cyber defen...
|
|
cena:
245,62 zł |
Managing Online Risk: Apps, Mobile, and Social Media Security
ISBN: 9780124200555 / Angielski / Miękka / 271 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as... In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ... |
|
cena:
141,28 zł |
Cyber Crime and Cyber Terrorism Investigator's Handbook
ISBN: 9780128007433 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook... Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and invest... |
|
cena:
201,84 zł |
Hacking and Penetration Testing with Low Power Devices
ISBN: 9780128007518 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author... Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are ... |
|
cena:
209,46 zł |
Cyber Reconnaissance, Surveillance and Defense
ISBN: 9780128013083 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks,... At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, C... |
|
cena:
237,17 zł |
Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security
ISBN: 9788793237056 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and...
The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanc...
|
|
cena:
245,62 zł |
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
ISBN: 9781627054775 / Angielski / Miękka / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. I argue that we can resolve the tension between security and features by leveraging the...
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections f...
|
|
cena:
322,81 zł |