• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5402

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 How to Cheat at VoIP Security Thomas Porter, CISSP, CCNP, CCDA, CCS (Director of IT Security, FIFA 2006 World Cup), Michael Gough (Computer security c 9781597491693 Syngress Media,U.S.
How to Cheat at VoIP Security

ISBN: 9781597491693 / Angielski / Miękka / 432 str.

ISBN: 9781597491693/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
CCS (Director of IT Securi CCDA CCNP CISSP Thomas Porter; host and webmas Michael Gough (Computer security consultant
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.
* VoIP Isn't Just Another Data Protocol
IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different....
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect in...
cena: 302,75 zł

 How to Cheat at Configuring Open Source Security Tools Michael Gregg (President, Superior Solutions, Inc.), Eric S. Seagren (Eric Seagren, CISSP, CISA, ISSAP, JPMorganChase),  9781597491709 Syngress Media,U.S.
How to Cheat at Configuring Open Source Security Tools

ISBN: 9781597491709 / Angielski / Miękka / 528 str.

ISBN: 9781597491709/Angielski/Miękka/528 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Inc.) Superior Solutions Michael Gregg (President; JPMorganC ISSAP CISA CISSP Eric S. Seagren (Eric Seagren; D.C. Senior Scientist in the Ad Angela Orebaugh (Washington
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that...

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perf...
cena: 302,75 zł

 SonicWALL Secure Wireless Networks Integrated Solutions Guide Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Susan Weigand, Dave Parry 9781597491938 Syngress Media,U.S.
SonicWALL Secure Wireless Networks Integrated Solutions Guide

ISBN: 9781597491938 / Angielski / Miękka / 512 str.

ISBN: 9781597491938/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joe Levy;Khai Tran;Patrick Lydon
Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk.

Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying.

SonicWALL(R) Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design,...

Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless ...
cena: 367,49 zł

 How to Cheat at Securing SQL Server 2005 Mark Horninger (A+, Net+, Security+, MCSE+I, MCSD, MCAD, MCDBA, MCTS, MCITP, MCPD, President of Haverford Consultants, A 9781597491969 Syngress Media,U.S.
How to Cheat at Securing SQL Server 2005

ISBN: 9781597491969 / Angielski / Miękka / 412 str.

ISBN: 9781597491969/Angielski/Miękka/412 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
MCD MCAD MCSD MCSE+I Security+ Net+ Mark Horninger (A+
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005.

SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.

  • Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasks
  • Covers SQL Server 2005, which is a massive...
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005.

SQL Server is the perfect product fo...

cena: 302,75 zł

 Practical Oracle Security: Your Unauthorized Guide to Relational Database Security Josh Shaul (Director, Worldwide Systems Engineering at Application Security, Oracle Expert, New York, NY), Aaron Ingram  9781597491983 Syngress Media,U.S.
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

ISBN: 9781597491983 / Angielski / Miękka / 288 str.

ISBN: 9781597491983/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Worldwide Systems Engineering at Appli Josh Shaul (Director; Ora Aaron Ingram (Security Engineer at Application Security
This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.

  • The only practical, hands-on guide for securing your Oracle database published by independent experts.
  • Your Oracle database does not exist in a vacuum, so this book shows you how to securely integrate your database into your enterprise.

This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to asses...
cena: 302,75 zł

 Web Application Vulnerabilities: Detect, Exploit, Prevent Palmer, Steven 9781597492096 Syngress Publishing
Web Application Vulnerabilities: Detect, Exploit, Prevent

ISBN: 9781597492096 / Angielski / Miękka / 460 str.

ISBN: 9781597492096/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven H. Palmer
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.

  • Learn to defend Web-based...
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. ...
cena: 227,28 zł

 The Best Damn Firewall Book Period Thomas W. Shinder 9781597492188 Syngress Publishing
The Best Damn Firewall Book Period

ISBN: 9781597492188 / Angielski / Miękka / 1123 str.

ISBN: 9781597492188/Angielski/Miękka/1123 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dr. Thomas W. Shinder
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit.

Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around...

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Micr...
cena: 215,01 zł

 Infosecurity 2008 Threat Analysis Schiller, Craig 9781597492249 Syngress Publishing
Infosecurity 2008 Threat Analysis

ISBN: 9781597492249 / Angielski / Miękka / 442 str.

ISBN: 9781597492249/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Craig Schiller; Seth Fogie; Colby Derodeff
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards...
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, c...
cena: 200,35 zł

 How to Cheat at Deploying and Securing RFID Paul Sanghera 9781597492300 Syngress Publishing
How to Cheat at Deploying and Securing RFID

ISBN: 9781597492300 / Angielski / Miękka / 343 str.

ISBN: 9781597492300/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul Sanghera
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities...

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas t...
cena: 185,68 zł

 Writing Security Tools and Exploits James C. Foster Vincent Liu 9781597499972 Syngress Publishing
Writing Security Tools and Exploits

ISBN: 9781597499972 / Angielski / Miękka / 638 str.

ISBN: 9781597499972/Angielski/Miękka/638 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James C. Foster; Vincent Liu
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques...
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational refere...
cena: 185,68 zł

 Advances in Enterprise Information Technology Security Djamel Khadraoui Francine Herrmann 9781599040905 Idea Group Reference
Advances in Enterprise Information Technology Security

ISBN: 9781599040905 / Angielski / Twarda / 368 str.

ISBN: 9781599040905/Angielski/Twarda/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Djamel Khadraoui; Francine Herrmann
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterprise IT activities. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined.
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterpris...
cena: 845,65 zł

 Integrating Security and Software Engineering: Advances and Future Vision Mouratidis, Haralambos 9781599041476 IGI Global
Integrating Security and Software Engineering: Advances and Future Vision

ISBN: 9781599041476 / Angielski / Twarda

ISBN: 9781599041476/Angielski/Twarda

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Haralambos Mouratidis; Paolo Giorgini
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. Integrating Security and Software Engineering: Advances and Future Visions discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and soft...
cena: 483,63 zł

 Web Services Security and E-Business Radhamani, G. 9781599041681 IGI Global
Web Services Security and E-Business

ISBN: 9781599041681 / Angielski / Twarda / 394 str.

ISBN: 9781599041681/Angielski/Twarda/394 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Radhamani; G. S. V. Radha Krishna Rao
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems.Web Services Security and E-Business provides insight into uncovering the security...
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access contro...
cena: 483,63 zł

 Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks Cvejic, Nedeljko 9781599045139 Idea Group Reference
Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks

ISBN: 9781599045139 / Angielski / Twarda / 346 str.

ISBN: 9781599045139/Angielski/Twarda/346 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nedeljko Cvejic; Tapio Seppnen
Digital audio watermarking has been proposed as a new and alternative method to enforce intellectual property rights and protect digital audio from tampering. Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks is a comprehensive compilation of the major theoretical frameworks, research findings, and practical applications. With inclusive coverage of the most authoritative research in the area, Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks will serve as a vital reference to researchers and practitioners in a variety of...
Digital audio watermarking has been proposed as a new and alternative method to enforce intellectual property rights and protect digital audio from ta...
cena: 920,96 zł

 Cryptography and Security Services: Mechanisms and Applications Mogollon, Manuel 9781599048376 Cybertech Publishing
Cryptography and Security Services: Mechanisms and Applications

ISBN: 9781599048376 / Angielski / Twarda / 490 str.

ISBN: 9781599048376/Angielski/Twarda/490 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manuel Mogollon
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms.
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing securi...
cena: 512,26 zł

 The Cryptogic Password Protocol Sean Gilbertson, Murli Bhamidipati 9781844012510 New Generation Publishing
The Cryptogic Password Protocol

ISBN: 9781844012510 / Angielski / Miękka / 52 str.

ISBN: 9781844012510/Angielski/Miękka/52 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Gilbertson;Murli Bhamidipati
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...? Passwords and PINs control access to increasingly valuable services. Electronic fraud has risen dramatically because fraudsters can easily overcome the simple approaches used by the public to manage their passwords and PINs. Imagine if: - You could have different and sophisticated passwords and PINs for each service. - There were no limits to the number of different passwords/PINs you could manage in your mind without having to memorise them. -...
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...?...
cena: 56,06 zł

 Security Modeling and Analysis of Mobile Agent Systems Tsai, Jeffrey J. P. 9781860946349 World Scientific Publishing Company
Security Modeling and Analysis of Mobile Agent Systems

ISBN: 9781860946349 / Angielski / Twarda / 212 str.

ISBN: 9781860946349/Angielski/Twarda/212 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeffrey J. P. Tsai; Lu Ma
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure...
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse a...
cena: 479,00 zł

 Troubleshooting Windows 2000 TCP/IP Syngress 9781928994114 Syngress Media,U.S.
Troubleshooting Windows 2000 TCP/IP

ISBN: 9781928994114 / Angielski / Miękka / 608 str.

ISBN: 9781928994114/Angielski/Miękka/608 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Syngress
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will learn to prevent, detect, troubleshoot and correct TCP/IP network problems. By using products such as distributed sniffers, field metering tools and protocol analyses, network managers can learn a lot about what is going on in (or wrong in) an internetwork and be able to troubleshoot a live TPC/IP...
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are buil...
cena: 302,75 zł

 .NET Mobile Web Developers Guide Syngress 9781928994565 Syngress Media,U.S.
.NET Mobile Web Developers Guide

ISBN: 9781928994565 / Angielski / Miękka / 520 str.

ISBN: 9781928994565/Angielski/Miękka/520 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Syngress
Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications.
This book assumes the readers have...
Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to develop...
cena: 302,75 zł

 Ruby Developers Guide Syngress 9781928994640 Syngress Media,U.S.
Ruby Developers Guide

ISBN: 9781928994640 / Angielski / Miękka / 520 str.

ISBN: 9781928994640/Angielski/Miękka/520 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Syngress
An expert guide to Ruby, a popular new Object-Oriented Programming Language

Ruby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby Developer's...

An expert guide to Ruby, a popular new Object-Oriented Programming Language

Ruby is quickly becoming a favourite among developers who need a simpl...

cena: 302,75 zł

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia