![]() |
Android Application Security Essentials
ISBN: 9781849515603 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
211,44 |
![]() |
Microsoft Windows Server 2008: The Complete Reference
ISBN: 9780072263657 / Angielski / Miękka / 826 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Your Definitive Resource on Microsoft Windows Server 2008 "Build your network the right way with expert advice This book provides real-world help in implementing Windows Server 2008 with attention to the use of virtualization solutions covering all you need to know in one well-written guide to success." --Bob Kelly, AppDeploy.com and Technical Reviewer Plan, set up, and administer a powerful, scalable Microsoft Windows Server 2008 environment. Featuring detailed explanations, best practices, pragmatic checklists, and real-world implementation examples, this... Your Definitive Resource on Microsoft Windows Server 2008 "Build your network the right way with expert advice This book pr... |
cena:
262,04 |
![]() |
Communication System Security
ISBN: 9781439840368 / Angielski / Twarda / 750 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. ...Helping current and future system designers take a more productive approach in the field, Communication System Security shows how ... |
cena:
979,55 |
![]() |
Handbook of Graph Theory
ISBN: 9781439880180 / Angielski / Twarda / 1630 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the ten years since the publication of the best-selling first edition, more than 1,000 graph theory papers have been published each year. Reflecting these advances, Handbook of Graph Theory, Second Edition provides comprehensive coverage of the main topics in pure and applied graph theory. This second edition over 400 pages longer than its predecessor incorporates 14 new sections. Each chapter includes lists of essential definitions and facts, accompanied by examples, tables, remarks, and, in some cases, conjectures and open problems. A... In the ten years since the publication of the best-selling first edition, more than 1,000 graph theory papers have been published each year |
cena:
1126,48 |
![]() |
Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services
ISBN: 9781447124153 / Angielski / Twarda / 730 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As a growing range of applications shift to the cloud, developers face the task of creating reliable, fault-tolerant and secure distributed computing systems and networks. This Guide to Reliable Distributed Systems describes the key concepts, principles and implementation options for creating high-assurance cloud computing solutions. In combination with Birman's Isis2 software platform, an open-source library available for free download from Cornell, the text offers a practical path to success in this vital emerging area. The guide starts with a broad technical... As a growing range of applications shift to the cloud, developers face the task of creating reliable, fault-tolerant and secure distributed computi... |
cena:
322,01 |
![]() |
Discrete Structures and Their Interactions
ISBN: 9781466579415 / Angielski / Twarda / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Discover the Connections between Different Structures and Fields Discrete Structures and Their Interactions highlights the connections among various discrete structures, including graphs, directed graphs, hypergraphs, partial orders, finite topologies, and simplicial complexes. It also explores their relationships to classical areas of mathematics, such as linear and multilinear algebra, analysis, probability, logic, and topology. The text introduces a number of discrete structures, such as hypergraphs, finite topologies, preorders,... Discover the Connections between Different Structures and Fields Discrete Structures and Their Interactions highli... |
cena:
881,59 |
![]() |
the real mcts/mcitp exam 70-649 upgrading your mcse on windows server 2003 to windows server 2008 prep kit
ISBN: 9781597492348 / Angielski / Miękka / 1062 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing...
This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application P...
|
cena:
215,45 |
![]() |
Microsoft Forefront Security Administration Guide
ISBN: 9781597492447 / Angielski / Miękka / 579 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides...
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Compute...
|
cena:
190,96 |
![]() |
Check Point NGX R65 Security Administration
ISBN: 9781597492454 / Angielski / Miękka / 414 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity of security management and ensure that their security systems can be easily extended to adapt to new and emerging threats. This title is a continuation of Syngress' best-selling references on Check Point's market leading Firewall and VPN products....
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Poin...
|
cena:
215,45 |
![]() |
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
ISBN: 9781597494700 / Angielski / Miękka / 574 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all... Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics... |
cena:
257,95 |
![]() |
Eleventh Hour Linux+: Exam XK0-003 Study Guide
ISBN: 9781597494977 / Angielski / Miękka / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam.
The book begins with a review of important concepts that are needed for successful operating system installation. These include computer hardware, environment settings, partitions, and network settings. The book presents the strategies for creating filesystems; different types of filesystems; the tools used to create filesystems; and the tools used to administer filesystems. It explains the Linux boot process; how to configure system and user profiles as well as... Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam.
The book begins wit... |
cena:
140,90 |
![]() |
Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7
ISBN: 9781597495615 / Angielski / Miękka / 640 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and manage the operating system.
The book is divided into 10 chapters. Chapter 1 introduces the Windows 7 and the rationale of releasing this operating system. The next chapter discusses how an administrator can install and upgrade the old operating system from Windows Vista to Windows 7. The deployment of Windows 7 in an organization or other environment is then explained. It also... Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation an...
|
cena:
146,88 |
![]() |
The Hacker's Guide to OS X
ISBN: 9781597499507 / Angielski / Miękka / 235 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.... Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Includi... |
cena:
171,37 |
![]() |
Windows Server 2012 Hyper-V Cookbook
ISBN: 9781849684422 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Virtualization has proved that it can help organizations to reduce costs, and the Private Cloud has created a revolution in the way we manage and control our servers with centralization and elasticity. The new Windows Server 2012 Hyper-V release from Microsoft comes with a myriad of improvements in areas such as mobility, high availability and elasticity, bringing everything you need to create, manage and build the core components of a Microsoft Private Cloud for virtualized workloads. "Windows Server 2012 Hyper-V Cookbook" is the perfect accompaniment for Hyper-V administrators looking to...
Virtualization has proved that it can help organizations to reduce costs, and the Private Cloud has created a revolution in the way we manage and cont...
|
cena:
237,33 |
![]() |
Advances in Cryptology - Crypto 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 14-18, 2005, Proceedings
ISBN: 9783540281146 / Angielski / Miękka / 572 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held in Santa Barbara, California, USA in August 2005. These papers are organized in topical sections on hash functions, theory, cryptanalysis, zero knowledge, anonymity, broadcast encryption, human-oriented cryptography, and more.
Constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held in Santa Barbara, California, USA in Au...
|
cena:
201,24 |
![]() |
Introduction to Reliable and Secure Distributed Programming
ISBN: 9783642152597 / Angielski / Twarda / 367 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The scope of this second edition of the introduction to fundamental distributed programming abstractions has been extended to cover 'Byzantine fault tolerance'. It includes algorithms to implement these abstractions in vulnerable distributed systems.
The scope of this second edition of the introduction to fundamental distributed programming abstractions has been extended to cover 'Byzantine faul... |
cena:
342,14 |
![]() |
Organized Activity and Its Support by Computer
ISBN: 9789401063579 / Angielski / Miękka / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Organized Human Activity and Its Support by Computer proposes an answer to the question: what are computers for?
With technical expertise, Anatol Holt analyzes human activity and its relevance to computer use. Holt interleaves a theory about the universal aspect of social life with a vision of how to harness computer power. This book is a culmination of a life of work that exemplifies two characteristics of the author: intellectual passion, and a concern for what matters to people. In the past thirty years, Holt has been a participant in the computing... Organized Human Activity and Its Support by Computer proposes an answer to the question: what are computers for?
With technical experti... |
cena:
201,24 |
![]() |
Trusted Systems: 5th International Conference, Intrust 2013, Graz, Austria, December 4-5, 2013, Proceedings
ISBN: 9783319034904 / Angielski / Miękka / 103 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Gra...
|
cena:
201,24 |
![]() |
Analysis of Cache Performance for Operating Systems and Multiprogramming
ISBN: 9781461288978 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As we continue to build faster and fast. er computers, their performance is be coming increasingly dependent on the memory hierarchy. Both the clock speed of the machine and its throughput per clock depend heavily on the memory hierarchy. The time to complet. e a cache acce88 is oft. en the factor that det. er mines the cycle time. The effectiveness of the hierarchy in keeping the average cost of a reference down has a major impact on how close the sustained per formance is to the peak performance. Small changes in the performance of the memory hierarchy cause large changes in overall system...
As we continue to build faster and fast. er computers, their performance is be coming increasingly dependent on the memory hierarchy. Both the clock s...
|
cena:
402,53 |
![]() |
Mikrocomputer, Aufbau Und Anwendungen: Arbeitsbuch Zum µP 6800
ISBN: 9783528041663 / Niemiecki / Miękka / 187 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Seit der Erfindung des Transistors hat der Mikroprozessor die wesentlichste Umstellung in der Elektrotechnik und auf den ihr benachbarten Gebieten gebracht. Der Mikroprozessor ist das Ergebnis einer stetigen Entwicklung zu immer hoherer Integrationsdichte. Wenige, aber sehr komplexe Bausteine bilden ein Mikroprozessorsystem, mit dessen Hilfe heute Aufgaben gelost werden, fur die fruher eine Vielzahl verschiedener Bausteine notig war. Mit der Verringerung des schaltungstechnischen Aufwandes ging eine Zunahme der Programmieraufgaben einher. Mit den entsprechenden Fachwortern ausgedruckt: Die...
Seit der Erfindung des Transistors hat der Mikroprozessor die wesentlichste Umstellung in der Elektrotechnik und auf den ihr benachbarten Gebieten geb...
|
cena:
206,88 |