• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5401

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet Dunham, Ken 9781420069037 Auerbach Publications
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

ISBN: 9781420069037 / Angielski / Twarda / 168 str.

ISBN: 9781420069037/Angielski/Twarda/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ken Dunham; Jim Melnick
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats ...
cena: 356,03 zł

 Algorithmic Cryptanalysis Antoine Joux 9781420070026 Chapman & Hall/CRC
Algorithmic Cryptanalysis

ISBN: 9781420070026 / Angielski / Twarda / 501 str.

ISBN: 9781420070026/Angielski/Twarda/501 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antoine Joux

Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox, Hadamard-Fourier-Walsh transforms, lattice reduction, and Grobner bases. The author also presents advanced applications, such as LFSR-based stream ciphers, lattice methods for cryptanalysis, elliptic curves, and index calculus methods. He includes some hints and solutions to...

Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples...

cena: 658,50 zł

 Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications Loza, Boris 9781420848243 Authorhouse
Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications

ISBN: 9781420848243 / Angielski / Twarda / 341 str.

ISBN: 9781420848243/Angielski/Twarda/341 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Boris Loza
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," opera...
cena: 228,62 zł

 Computer Security and Telerobotics for Everyone Eamon P. Dohert 9781420896824 Authorhouse
Computer Security and Telerobotics for Everyone

ISBN: 9781420896824 / Angielski / Miękka / 179 str.

ISBN: 9781420896824/Angielski/Miękka/179 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eamon P. Doherty Ph. D.
cena: 83,88 zł

 Firewalls: Jumpstart for Network and Systems Administrators John R. Vacca (Technology Consultant, TechWrite, USA), Scott Ellis (Independent Consultant, Chicago, IL, U.S.A.) 9781555582975 Elsevier Science & Technology
Firewalls: Jumpstart for Network and Systems Administrators

ISBN: 9781555582975 / Angielski / Miękka / 448 str.

ISBN: 9781555582975/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA) TechWrite John R. Vacca (Technology Consultant; U.S.A.) IL Chicago Scott Ellis (Independent Consultant
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing...
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web se...
cena: 287,74 zł

 Java Cryptography Jonathan Knudsen 9781565924024 O'Reilly Media
Java Cryptography

ISBN: 9781565924024 / Angielski / Miękka / 364 str.

ISBN: 9781565924024/Angielski/Miękka/364 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan Knudsen

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java...

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides t...

cena: 175,55 zł

 Information Hiding Techniques for Steganography and Digital Watermarking Fabien Petitcolas (Candidate in Computer Science, University of Cambridge), Stefan Katzenbeisser (Student of Computer Sc 9781580530354 Artech House Publishers
Information Hiding Techniques for Steganography and Digital Watermarking

ISBN: 9781580530354 / Angielski / Twarda / 244 str.

ISBN: 9781580530354/Angielski/Twarda/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
University Fabien Petitcolas (Candidate in Computer Science; Vienna Un Stefan Katzenbeisser (Student of Computer Science;Stefan Katzenbeisser
This book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.
This book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.
cena: 548,78 zł

 Fundamentals of Network Security John E. Canavan 9781580531764 Artech House Publishers
Fundamentals of Network Security

ISBN: 9781580531764 / Angielski / Twarda / 340 str.

ISBN: 9781580531764/Angielski/Twarda/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John E. Canavan
Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.
Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professiona...
cena: 475,61 zł

 A Practical Guide to Managing Information Security Steve Purser 9781580537025 Artech House Publishers
A Practical Guide to Managing Information Security

ISBN: 9781580537025 / Angielski / Twarda / 284 str.

ISBN: 9781580537025/Angielski/Twarda/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steve Purser
This guidebook helps professionals to master the management of information security, concentrating on the proactive development and implementation of IT security for the enterprise.
This guidebook helps professionals to master the management of information security, concentrating on the proactive development and implementation of ...
cena: 466,46 zł

 Security in Wireless LANs and Mans Hardjono, Thomas 9781580537551 Artech House Publishers
Security in Wireless LANs and Mans

ISBN: 9781580537551 / Angielski / Twarda / 243 str.

ISBN: 9781580537551/Angielski/Twarda/243 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Hardjono; Lakshminath R. Dondeti
With the popularity of the wireless LAN standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues.
With the popularity of the wireless LAN standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN)...
cena: 498,48 zł

 Codes: The Guide to Secrecy from Ancient to Modern Times Mollin, Richard A. 9781584884705 Chapman & Hall/CRC
Codes: The Guide to Secrecy from Ancient to Modern Times

ISBN: 9781584884705 / Angielski / Twarda / 679 str.

ISBN: 9781584884705/Angielski/Twarda/679 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard A. Mollin
This book explores the depth and breadth of the field of cryptology. It begins by tracing the development of cryptology from inception to modern-day practice. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. It is designed such that the non-professional reader may...
This book explores the depth and breadth of the field of cryptology. It begins by tracing the development of cryptology from inception to modern-day p...
cena: 878,00 zł

 Expert Web Services Security in the .Net Platform Moroney, Laurence 9781590591154 Apress
Expert Web Services Security in the .Net Platform

ISBN: 9781590591154 / Angielski / Miękka / 280 str.

ISBN: 9781590591154/Angielski/Miękka/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter A. Bromberg; Brian Nantz; Laurence Moroney

Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. Expert Web Services Security in the .NET Platform is a comprehensive treatment on how to secure Web services on the .NET platform. This book specifically focuses on Web services security, not general .NET security.

Authors Brian Nantz and Laurence Moroney lay the foundation for a complete discussion of Web services security in the .NET platform by first describing...

Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features w...

cena: 172,89 zł

 Real World Microsoft Access Database Protection and Security Garry Robinson 9781590591260 Apress
Real World Microsoft Access Database Protection and Security

ISBN: 9781590591260 / Angielski / Miękka / 494 str.

ISBN: 9781590591260/Angielski/Miękka/494 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Garry Robinson

Author Garry Robinson approaches this book differently than other Access books on the market: he keeps the focus on issues that will help protect your database. Written from an experienced developers point of view, he discusses protection and security task-by-task. This book is even recommended among Microsoft TechNet Security Topics: Threats and Countermeasures.

Youll learn to hide tables as system tables, produce databases that are difficult to crack, and back up databases. You will learn how to keep staff from viewing salary tables, prevent customers from peeking...

Author Garry Robinson approaches this book differently than other Access books on the market: he keeps the focus on issues that wi...

cena: 211,32 zł

 Computer Security for the Home and Small Office Thomas C. Greene 9781590593165 Apress
Computer Security for the Home and Small Office

ISBN: 9781590593165 / Angielski / Miękka / 406 str.

ISBN: 9781590593165/Angielski/Miękka/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas C. Greene

Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.

The book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.

Furthermore, the book is packed with...

Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company worksta...

cena: 121,01 zł

 Always Use Protection: A Teen's Guide to Safe Computing Daniel Appleman 9781590593264 Apress
Always Use Protection: A Teen's Guide to Safe Computing

ISBN: 9781590593264 / Angielski / Miękka / 292 str.

ISBN: 9781590593264/Angielski/Miękka/292 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Appleman

Consider this true scenario: Two teenagers are both hit by some very nasty, damaging computer viruses. One was a virus that took down his Windows desktop at random times. The other was a trojan, with a hacker at the other end trying to blackmail him for game CD keys. Neither of the teens had up to date anti-virus software. Only one had a firewall.

Fact: Teenagers often suffer numerous other problems - from corrupt systems that need to be restored, to having E-mail accounts stolen, to being impersonated on instant message chats.

Security experts know that home...

Consider this true scenario: Two teenagers are both hit by some very nasty, damaging computer viruses. One was a virus that took down his Windows d...

cena: 64,52 zł

 Honeypots for Windows Roger Grimes 9781590593356 Apress
Honeypots for Windows

ISBN: 9781590593356 / Angielski / Miękka / 424 str.

ISBN: 9781590593356/Angielski/Miękka/424 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roger Grimes

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journeyhelping you set up the physical layer, design your honeypot, and perform malware code analysis.

You'll discover which Windows ports need to be open on your honeypot to fool those malicious hackers, and you'll learn about numerous open source tools imported from the Unix world....

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and reso...

cena: 172,89 zł

 Black Hat: Misfits, Criminals, and Scammers in the Internet Age John Biggs 9781590593790 Apress
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

ISBN: 9781590593790 / Angielski / Miękka / 158 str.

ISBN: 9781590593790/Angielski/Miękka/158 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Biggs

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read for anyone who owns a computer and has ever pondered the threats of modern technology.

Black Hat takes a fair and thorough look at the hacking cases that have made the news in recent years. These stories include all the juicy details, like...

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results These stories and fo...

cena: 68,55 zł

 Foundations of Security: What Every Programmer Needs to Know Kern, Christoph 9781590597842 Apress
Foundations of Security: What Every Programmer Needs to Know

ISBN: 9781590597842 / Angielski / Miękka / 324 str.

ISBN: 9781590597842/Angielski/Miękka/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Neil Daswani; Christoph Kern; Anita Kesavan

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book.

For the past few years, the Internet has had a "wild, wild...

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software securi...

cena: 302,60 zł

 Information Security Policies and Actions in Modern Integrated Systems Maria G. Fugini Bellettini Bellettini 9781591401865 IGI Global
Information Security Policies and Actions in Modern Integrated Systems

ISBN: 9781591401865 / Angielski / Twarda / 360 str.

ISBN: 9781591401865/Angielski/Twarda/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maria G. Fugini; Bellettini Bellettini
A discussion of research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Topics explored in the text include XML-based management systems, security of multimedia data, and technology and use of smart cards.
A discussion of research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related sec...
cena: 408,64 zł

 Information Security and Ethics: Social and Organizational Issues Quigley 9781591402862 IRM Press
Information Security and Ethics: Social and Organizational Issues

ISBN: 9781591402862 / Angielski / Twarda / 350 str.

ISBN: 9781591402862/Angielski/Twarda/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marian Quigley
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including web accessibility; the digital divide; youth protection and surveillance; Information security; education; ethics in the Information professions and Internet voting;...
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international schol...
cena: 408,64 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia