Pki: Implementing & Managing E-Security
ISBN: 9780072131239 / Angielski / Miękka / 513 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-by-step plan which addresses planning, deploying and cost of ownership with PKI.
This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-b...
|
|
cena:
261,96 zł |
Fighting Fraud: How to Establish and Manage an Anti-Fraud Program
ISBN: 9780123708687 / Angielski / Miękka / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program. The author's intent is to provide the reader with a practitioner's guide (a "how-to" book), augmented by some background information... This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and... |
|
cena:
207,71 zł |
The Personal Internet Security Guidebook: Keeping Hackers and Crackers out of Your Home
ISBN: 9780126565614 / Angielski / Miękka / 202 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network. This is a how-to guide to keeping your personal computer safe on... The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hac... |
|
cena:
258,38 zł |
Protecting Data Privacy in Health Services Research
ISBN: 9780309071871 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that we need to support informed choices depends on access to data, but at the same time, individual privacy and patient-health care provider confidentiality must be protected.
The need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that...
|
|
cena:
218,69 zł |
Advances in Digital Forensics II: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January
ISBN: 9780387368900 / Angielski / Twarda / 364 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security... Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir... |
|
cena:
389,98 zł |
Botnet Detection: Countering the Largest Security Threat
ISBN: 9780387687667 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help ... |
|
cena:
389,98 zł |
Security for Telecommunications Networks
ISBN: 9780387724416 / Angielski / Twarda / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in... This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunicati... |
|
cena:
467,99 zł |
Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac
ISBN: 9780387732688 / Angielski / Twarda / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings... International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of inform... |
|
cena:
194,97 zł |
Fighting Terror Online: The Convergence of Security, Technology, and the Law
ISBN: 9780387735771 / Angielski / Twarda / 178 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book ?nds its roots in the horror that engulfed us all around the globe as we experienced and watched with disbelief the events of September 11, 2001. Naturally, policy-makers around the world rushed to examine their law enforcement capabilities and the suitability of these tools to the new war on terror. This examination resulted in a wave of legislation around the world, aimed at increasing the power of law enforcement agencies. The digital environment was a major focus of these regulatory and legis- tive attempts. Given the horror of the events and the haste to provide law enforcement...
This book ?nds its roots in the horror that engulfed us all around the globe as we experienced and watched with disbelief the events of September 11, ...
|
|
cena:
194,97 zł |
Error Correcting Codes : A Mathematical Introduction
ISBN: 9780412786907 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Assuming little previous mathematical knowledge, Error Correcting Codes provides a sound introduction to key areas of the subject. Topics have been chosen for their importance and practical significance, which Baylis demonstrates in a rigorous but gentle mathematical style.
Coverage includes optimal codes; linear and non-linear codes; general techniques of decoding errors and erasures; error detection; syndrome decoding, and much more. Error Correcting Codes contains not only straight maths, but also exercises on more investigational problem solving. Chapters on number theory and... Assuming little previous mathematical knowledge, Error Correcting Codes provides a sound introduction to key areas of the subject. Topics have been ch...
|
|
cena:
440,80 zł |
The Limits of Privacy
ISBN: 9780465040902 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy is perhaps the most hallowed of American rights--and most people are concerned that new technologies available to governments and corporations threaten to erode this most privileged of rights. But in The Limits of Privacy, Amitai Etzioni offers a decidedly different point of view, in which the right to privacy is balanced against concern for public safety and health. Etzioni looks at five flashpoint issues: Megan's Laws, HIV testing of infants, deciphering of encrypted messages, national identification cards, and medical records, and concludes that there are times when Amricans'...
Privacy is perhaps the most hallowed of American rights--and most people are concerned that new technologies available to governments and corporations...
|
|
cena:
138,51 zł |
World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing
ISBN: 9780471218166 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The future of computing-the future of business
Rapid technological innovation is moving us towards a world of ubiquitous computing-a world in which we are surrounded by smart machines that are always on, always aware, and always monitoring us. These developments will create a world virtually without secrets in which information is widely available and analyzable worldwide. This environment will certainly affect business, government, and the individual alike, dramatically affecting the way organizations and individuals interact. This book explores the implications of the coming world and... The future of computing-the future of business
Rapid technological innovation is moving us towards a world of ubiquitous computing-a world in wh... |
|
cena:
202,64 zł |
Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees
ISBN: 9780471694694 / Angielski / Twarda / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing.
Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing...
|
|
cena:
143,97 zł |
Reshaping National Intelligence for an Age of Information
ISBN: 9780521533492 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In a bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider's views on how intelligence gathering and analysis must change. Treverton suggests why intelligence needs to be contrarian and attentive to the longer term. Believing that it is important to tap expertise outside government to solve intelligence problems, he argues that involving colleagues in the academy, think tanks, and Wall Street befits the changed role of government from doer to convener, mediator, and coalition-builder. Hb ISBN (2001):...
In a bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider...
|
|
cena:
131,70 zł |
Reshaping National Intelligence for an Age of Information
ISBN: 9780521580960 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In a bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider's views on how intelligence gathering and analysis must change. Treverton suggests why intelligence needs to be contrarian and attentive to the longer term. Believing that it is important to tap expertise outside government to solve intelligence problems, he argues that involving colleagues in the academy, think tanks, and Wall Street befits the changed role of government from doer to convener, mediator, and coalition-builder. Hb ISBN (2001):...
In a bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider...
|
|
cena:
258,44 zł |
Aspectj Cookbook
ISBN: 9780596006549 / Angielski / Miękka / 331 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When Object Oriented programming (OO) first appeared, it was a revelation. OO gave developers the ability to create software that was more flexible and robust, but as time went on and applications became more sophisticated, too, certain areas of "traditional" OO architectures were found wanting. Aspect-oriented programming (AOP) addresses those issues by extending the OO approach even further.Many developers are interested in AOP--especially in AspectJ, the open source extension of the Java programming language that explicitly supports the AOP approach. Yet, although AspectJ is included... When Object Oriented programming (OO) first appeared, it was a revelation. OO gave developers the ability to create software that was more flexible... |
|
cena:
191,97 zł |
Essential SNMP: Help for System and Network Administrators
ISBN: 9780596008406 / Angielski / Miękka / 462 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing into an interface, to far more esoteric items, like the air temperature inside a router. In spite of its name, though, SNMP is not especially simple to learn. O'Reilly has answered the call for help with a practical introduction that shows how to install, configure, and... Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices l... |
|
cena:
213,31 zł |
A+, Network+, Security+ Exams in a Nutshell
ISBN: 9780596528249 / Angielski / Miękka / 812 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of specialization. If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book inval... |
|
cena:
234,64 zł |
Electronic Security Systems : Reducing False Alarms
ISBN: 9780750635431 / Angielski / Twarda / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'. Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large... In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor ... |
|
cena:
385,12 zł |
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security
ISBN: 9780750677462 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Finally--a single volume guide to really effective security for both voice and data wireless networks More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers. In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless... Finally--a single volume guide to really effective security for both voice and data wireless networks More and more data and voice communic... |
|
cena:
263,45 zł |