Wireless Security Handbook
ISBN: 9780849333781 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. < P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook...
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, in...
|
|
cena:
726,18 zł |
How to Achieve 27001 Certification: An Example of Applied Compliance Management
ISBN: 9780849336485 / Angielski / Twarda / 348 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. This book provides questions and answers to determine information security strengths and weaknesses with respect to the standard. It presents detailed, step-by-step information to plan implementation and help an organization prepare for audit and certification. It also includes a questionnaire to assess readiness for an...
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an underst...
|
|
cena:
492,71 zł |
Quantum Communications and Cryptography
ISBN: 9780849336843 / Angielski / Twarda / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect...
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics ...
|
|
cena:
855,86 zł |
Complete Guide to CISM Certification
ISBN: 9780849353567 / Angielski / Twarda / 474 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal...
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, desi...
|
|
cena:
492,71 zł |
practical hacking techniques and countermeasures
ISBN: 9780849370571 / Angielski / Miękka / 737 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. < P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation...
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustra...
|
|
cena:
492,71 zł |
Information Security: Design, Implementation, Measurement, and Compliance
ISBN: 9780849370878 / Angielski / Twarda / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for... Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New secur...
|
|
cena:
622,44 zł |
Multimedia Watermarking Techniques and Applications
ISBN: 9780849372131 / Angielski / Twarda / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
|
cena:
622,44 zł |
Information Security Management Handbook
ISBN: 9780849374951 / Angielski / Twarda / 3280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this updated handbook contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics.
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this upd...
|
|
cena:
1244,88 zł |
Securing Converged IP Networks
ISBN: 9780849375804 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of... Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, me...
|
|
cena:
492,71 zł |
Security in Distributed, Grid, Mobile, and Pervasive Computing
ISBN: 9780849379215 / Angielski / Twarda / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
|
|
cena:
430,47 zł |
IT Security Governance Guidebook with Security Program Metrics on CD-ROM
ISBN: 9780849384356 / Angielski / Twarda / 189 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model...
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information prot...
|
|
cena:
622,44 zł |
Handbook of Applied Cryptography
ISBN: 9780849385230 / Angielski / Twarda / 810 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a...
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an en...
|
|
cena:
803,99 zł |
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks
ISBN: 9780879302399 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
492,71 zł |
Secure Data Networking
ISBN: 9780890066928 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, an...
|
|
cena:
645,06 zł |
Smart Card Security and Applications
ISBN: 9780890069530 / Angielski / Twarda / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals...
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, ...
|
|
cena:
639,89 zł |
Information Security and Auditing in the Digital Age
ISBN: 9780972741477 / Angielski / Miękka / 548 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
243,08 zł |
Informed Watermarking
ISBN: 9781402070716 / Angielski / Twarda / 182 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic has a long history, but before 1995 publications in scientific literature were almost absent. From 1995 onwards however the number of publications on watermarking has been steadily increasing. Today a number of workshops and conferences on this topic exist; also a number of scientific journals on watermarking have been published. This renewed scientific interest in...
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in ...
|
|
cena:
382,84 zł |
Network Interdiction and Stochastic Integer Programming
ISBN: 9781402073021 / Angielski / Twarda / 125 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On March 15, 2002 we held a workshop on network interdiction and the more general problem of stochastic mixed integer programming at the University of California, Davis. Jesus De Loera and I co-chaired the event, which included presentations of on-going research and discussion. At the workshop, we decided to produce a volume of timely work on the topics. This volume is the result. Each chapter represents state-of-the-art research and all of them were refereed by leading investigators in the respective fields. Problems - sociated with protecting and attacking computer, transportation, and...
On March 15, 2002 we held a workshop on network interdiction and the more general problem of stochastic mixed integer programming at the University of...
|
|
cena:
191,40 zł |
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks
ISBN: 9781420046595 / Angielski / Twarda / 504 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.
Drawing from the author s vast experience... An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regardin...
|
|
cena:
622,44 zł |
Digital Privacy: Theory, Technologies, and Practices
ISBN: 9781420052176 / Angielski / Twarda / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in...
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although t...
|
|
cena:
622,44 zł |