• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5401

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Killmeyer, Jan 9780849315497 Auerbach Publications
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

ISBN: 9780849315497 / Angielski / Twarda / 424 str.

ISBN: 9780849315497/Angielski/Twarda/424 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Killmeyer Tudor
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight...
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security...
cena: 609,72 zł

 The Ethical Hack: A Framework for Business Value Penetration Testing Tiller, James S. 9780849316098 Auerbach Publications
The Ethical Hack: A Framework for Business Value Penetration Testing

ISBN: 9780849316098 / Angielski / Twarda / 356 str.

ISBN: 9780849316098/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James S. Tiller; Tiller S. Tiller
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.The Ethical Hack: A Framework for Business Value...
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered f...
cena: 609,72 zł

 Network Perimeter Security: Building Defense In-Depth Riggs, Cliff 9780849316289 Auerbach Publications
Network Perimeter Security: Building Defense In-Depth

ISBN: 9780849316289 / Angielski / Twarda / 420 str.

ISBN: 9780849316289/Angielski/Twarda/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cliff Riggs
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time...
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-t...
cena: 609,72 zł

 Information Security Policies and Procedures: A Practitioner's Reference, Second Edition Peltier, Thomas R. 9780849319587 Auerbach Publications
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition

ISBN: 9780849319587 / Angielski / Twarda / 408 str.

ISBN: 9780849319587/Angielski/Twarda/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas R. Peltier; Peltier R. Peltier
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives...
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the ef...
cena: 609,72 zł

 Strategic Information Security John Wylder 9780849320415 Auerbach Publications
Strategic Information Security

ISBN: 9780849320415 / Angielski / Twarda / 240 str.

ISBN: 9780849320415/Angielski/Twarda/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Wylder
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.Strategic Information Security integrates the importance of sound security policy with the strategic goals of an...
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain t...
cena: 477,97 zł

 Surviving Security: How to Integrate People, Process, and Technology Andress, Amanda 9780849320422 Auerbach Publications
Surviving Security: How to Integrate People, Process, and Technology

ISBN: 9780849320422 / Angielski / Twarda / 528 str.

ISBN: 9780849320422/Angielski/Twarda/528 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andress Andress; Amanda Andress; Amanda Andress
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security...
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be t...
cena: 609,72 zł

 Database and Applications Security: Integrating Information Security and Data Management Thuraisingham, Bhavani 9780849322242 Auerbach Publications
Database and Applications Security: Integrating Information Security and Data Management

ISBN: 9780849322242 / Angielski / Twarda / 656 str.

ISBN: 9780849322242/Angielski/Twarda/656 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Miguel J. Bagajewicz; Bhavani M. Thuraisingham
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing.
Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and...
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provide...
cena: 609,72 zł

 Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks Brooks, R. R. 9780849322723 CRC Press
Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks

ISBN: 9780849322723 / Angielski / Twarda / 400 str.

ISBN: 9780849322723/Angielski/Twarda/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard R. Brooks; R. Brooks
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that can be used to create systems that overcome security attacks through adaptation as opposed to the earlier fortress mentality, and provides instruction on creating disruptive applications that are much more secure than in the past. The book provides a fundamental understanding of design principles, and provides a model explaining mobile code and the methods that can be used to design secure robust peer-to-peer networks. Also included are recent...
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that...
cena: 731,67 zł

 Investigator's Guide to Steganography Gregory Kipper 9780849324338 Auerbach Publications
Investigator's Guide to Steganography

ISBN: 9780849324338 / Angielski / Twarda / 240 str.

ISBN: 9780849324338/Angielski/Twarda/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory Kipper
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography began and evolved from ancient times. It also looks at the workings of digital steganography and watermarking methods and tools on the Internet.
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography bega...
cena: 477,97 zł

 Audit and Trace Log Management: Consolidation and Analysis Maier, Phillip Q. 9780849327254 Auerbach Publications
Audit and Trace Log Management: Consolidation and Analysis

ISBN: 9780849327254 / Angielski / Twarda / 192 str.

ISBN: 9780849327254/Angielski/Twarda/192 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Phillip Q. Maier
As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and Analysis offers a comprehensive introduction and explanation of requirements and problem definition, and also delivers a multidimensional solution set with broad applicability across a wide range of organizations.

Itprovidesa wealth of information in the form of processwalkthroughs. These include problem determination, requirements gathering, scope definition, risk assessment, compliance...

As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. A...
cena: 512,17 zł

 Multimedia Security Handbook Borko Furht Darko Kirovski Borivoje Furht 9780849327735 CRC Press
Multimedia Security Handbook

ISBN: 9780849327735 / Angielski / Twarda / 832 str.

ISBN: 9780849327735/Angielski/Twarda/832 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borko Furht; Darko Kirovski; Borivoje Furht
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.
Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the...
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from pi...
cena: 1048,72 zł

 Curing the Patch Management Headache Felicia M. Nicastro 9780849328541 Auerbach Publications
Curing the Patch Management Headache

ISBN: 9780849328541 / Angielski / Twarda / 288 str.

ISBN: 9780849328541/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Felicia M. Nicastro
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Until now, there were no technical books for companies to use as a starting point for deploying the process. Curing the Patch Management Headache responds to this demand by tying together all aspects of the subject into one easy-to-understand format that is applicable regardless of the operating...
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining th...
cena: 585,33 zł

 Network Security Technologies Kwok T. Fung K. T. Fung 9780849330278 Auerbach Publications
Network Security Technologies

ISBN: 9780849330278 / Angielski / Twarda / 296 str.

ISBN: 9780849330278/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kwok T. Fung; K. T. Fung
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities,...
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables unde...
cena: 536,56 zł

 Enhancing Computer Security with Smart Technology V. Rao Vemuri 9780849330452 Auerbach Publications
Enhancing Computer Security with Smart Technology

ISBN: 9780849330452 / Angielski / Twarda / 288 str.

ISBN: 9780849330452/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
V. Rao Vemuri
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security.
A collection of tutorials that draw from a broad spectrum of viewpoints and...
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a mac...
cena: 756,05 zł

 Wireless Crime and Forensic Investigation Gregory Kipper 9780849331886 Auerbach Publications
Wireless Crime and Forensic Investigation

ISBN: 9780849331886 / Angielski / Twarda / 280 str.

ISBN: 9780849331886/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory Kipper
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem.
From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and...
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining ac...
cena: 477,97 zł

 Wireless Security Handbook Aaron E. Earle 9780849333781 Auerbach Publications
Wireless Security Handbook

ISBN: 9780849333781 / Angielski / Twarda / 384 str.

ISBN: 9780849333781/Angielski/Twarda/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aaron E. Earle
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook...
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, in...
cena: 707,28 zł

 How to Achieve 27001 Certification: An Example of Applied Compliance Management Arnason, Sigurjon Thor 9780849336485 Auerbach Publications
How to Achieve 27001 Certification: An Example of Applied Compliance Management

ISBN: 9780849336485 / Angielski / Twarda / 348 str.

ISBN: 9780849336485/Angielski/Twarda/348 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sigurjon Thor Arnason; Arnason Thor Arnason; Keith Willett
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. This book provides questions and answers to determine information security strengths and weaknesses with respect to the standard. It presents detailed, step-by-step information to plan implementation and help an organization prepare for audit and certification. It also includes a questionnaire to assess readiness for an...
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an underst...
cena: 477,97 zł

 Quantum Communications and Cryptography Alexander V. Sergienko 9780849336843 CRC Press
Quantum Communications and Cryptography

ISBN: 9780849336843 / Angielski / Twarda / 248 str.

ISBN: 9780849336843/Angielski/Twarda/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexander V. Sergienko
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect...
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics ...
cena: 853,61 zł

 Complete Guide to CISM Certification Thomas R. Peltier Justin Peltier 9780849353567 Auerbach Publications
Complete Guide to CISM Certification

ISBN: 9780849353567 / Angielski / Twarda / 474 str.

ISBN: 9780849353567/Angielski/Twarda/474 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas R. Peltier; Justin Peltier
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal...
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, desi...
cena: 477,97 zł

 practical hacking techniques and countermeasures  Spivey, Mark D. 9780849370571 Auerbach Publications
practical hacking techniques and countermeasures

ISBN: 9780849370571 / Angielski / Miękka / 737 str.

ISBN: 9780849370571/Angielski/Miękka/737 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark D. Spivey
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation...
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustra...
cena: 477,97 zł

Pierwsza Podprzednia  4  5  6  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia