• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5405

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues Warkentin, Merrill 9781591409113 IGI Global
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues

ISBN: 9781591409113 / Angielski / Twarda / 406 str.

ISBN: 9781591409113/Angielski/Twarda/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Merrill Warkentin; Rayford Vaughn
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges in the IT field how to create secure environments for the application of technology to serve future needs. This book bridges the gap between theory and practice, academia and industry, computer science and MIS. The chapters provide an integrated, holistic perspective on this complex set of challenges, supported with practical experiences of leading figures from all realms. Enterprise Information Systems Assurance and...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of ...
cena: 456,97 zł

 Privacy Protection for E-Services Yee, George 9781591409144 IGI Global
Privacy Protection for E-Services

ISBN: 9781591409144 / Angielski / Twarda / 303 str.

ISBN: 9781591409144/Angielski/Twarda/303 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Yee
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material, such as: consumer empowerment, assessing privacy risks, security technologies needed for privacy protection, systems for privacy policy enforcement, and even methods for assessing privacy technologies. Privacy Protection for E-Services is a...
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy pre...
cena: 482,64 zł

 Cyber Warfare and Cyber Terrorism Andrew Colarik 9781591409915 Idea Group Reference
Cyber Warfare and Cyber Terrorism

ISBN: 9781591409915 / Angielski / Twarda / 566 str.

ISBN: 9781591409915/Angielski/Twarda/566 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Colarik
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and...
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologie...
cena: 832,25 zł

 Hacking The Xbox Andrew Bunnie Huang 9781593270292 No Starch Press,US
Hacking The Xbox

ISBN: 9781593270292 / Angielski / Miękka / 288 str.

ISBN: 9781593270292/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Bunnie Huang

This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.

Hacking the Xbox...

This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essentia...

cena: 127,73 zł

 Implementing the ISO/IEC 27001 Information Security Management System Standard Edward Humphreys 9781596931725 Artech House Publishers
Implementing the ISO/IEC 27001 Information Security Management System Standard

ISBN: 9781596931725 / Angielski / Twarda / 286 str.

ISBN: 9781596931725/Angielski/Twarda/286 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Edward Humphreys
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored ...
cena: 434,45 zł

 Cisco PIX Firewalls: Configure / Manage / Troubleshoot Umer Khan 9781597490047 Syngress Media,U.S.
Cisco PIX Firewalls: Configure / Manage / Troubleshoot

ISBN: 9781597490047 / Angielski / Miękka / 576 str.

ISBN: 9781597490047/Angielski/Miękka/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Umer Khan
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.

  • The Cisco Pix firewall is the #1 market leading...
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 b...
cena: 301,94 zł

 Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals James C. Foster Mike Price Stuart McClure 9781597490054 Syngress Publishing
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

ISBN: 9781597490054 / Angielski / Miękka / 667 str.

ISBN: 9781597490054/Angielski/Miękka/667 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James C. Foster; Mike Price; Stuart McClure
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.

2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP,...

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1....

cena: 195,06 zł

 Securing IM and P2P Applications for the Enterprise Marcus Sachs, Paul Piccard 9781597490177 Syngress Media,U.S.
Securing IM and P2P Applications for the Enterprise

ISBN: 9781597490177 / Angielski / Miękka / 650 str.

ISBN: 9781597490177/Angielski/Miękka/650 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcus Sachs;Paul Piccard
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications.

These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect...

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many b...
cena: 301,94 zł

 Host Integrity Monitoring Using Osiris and Samhain Brian Wotring 9781597490184 Syngress Media,U.S.
Host Integrity Monitoring Using Osiris and Samhain

ISBN: 9781597490184 / Angielski / Miękka / 450 str.

ISBN: 9781597490184/Angielski/Miękka/450 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brian Wotring
This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments.

Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not...

This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and...
cena: 275,04 zł

 Skype Me! From Single User to Small Enterprise and Beyond Markus Daehne 9781597490320 Syngress Media,U.S.
Skype Me! From Single User to Small Enterprise and Beyond

ISBN: 9781597490320 / Angielski / Miękka / 350 str.

ISBN: 9781597490320/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Markus Daehne
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new "Skype Ready" cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype...
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure ...
cena: 215,86 zł

 How to Cheat at IT Project Management Susan Snedaker (MCSE, MCT Founder, Virtual Team Consulting, Tucson, AZ, USA) 9781597490375 Syngress Media,U.S.
How to Cheat at IT Project Management

ISBN: 9781597490375 / Angielski / Miękka / 592 str.

ISBN: 9781597490375/Angielski/Miękka/592 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Virtual Team Consulting MCT Founder Susan Snedaker (MCSE
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. It's short enough to be easily read and used but long enough to be comprehensive in the right...
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complex...
cena: 275,04 zł

 Perfect Password: Selection, Protection, Authentication Mark Burnett (Independent researcher, consultant, and writer specializing in Windows security) 9781597490412 Syngress Media,U.S.
Perfect Password: Selection, Protection, Authentication

ISBN: 9781597490412 / Angielski / Miękka / 182 str.

ISBN: 9781597490412/Angielski/Miękka/182 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
and writer consultant Mark Burnett (Independent researcher
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
cena: 156,68 zł

 Security Log Management: Identifying Patterns in the Chaos Jacob Babbin (Contractor with a government agency filling the role of Intrusion Detection Team Lead) 9781597490429 Syngress Media,U.S.
Security Log Management: Identifying Patterns in the Chaos

ISBN: 9781597490429 / Angielski / Miękka / 350 str.

ISBN: 9781597490429/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jacob Babbin (Contractor with a government agency filling th
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to...
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...
cena: 301,94 zł

 RFID Security Frank Thornton (Owner, Blackthorn Systems, New Hampshire, USA), Chris Lanthem (Security/Network Engineer for NSight Tech 9781597490474 Syngress Media,U.S.
RFID Security

ISBN: 9781597490474 / Angielski / Miękka / 448 str.

ISBN: 9781597490474/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
US New Hampshire Blackthorn Systems Frank Thornton (Owner;Chris Lanthem (Security/Network Engineer for NSight Technolo
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books.

RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.

Coverage includes: security breaches for monetary gain (hacking a shops RFID system...

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas t...
cena: 301,94 zł

 Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Eric Cole, Sandra Ring 9781597490481 Syngress Media,U.S.
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

ISBN: 9781597490481 / Angielski / Miękka / 350 str.

ISBN: 9781597490481/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Cole;Sandra Ring
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today.

This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely...

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of...
cena: 215,86 zł

 Google Talking Joshua Brashars (External Threat Assessment Team, Secure Science Corporation, San Diego, CA), Johnny Long (Security Rese 9781597490559 Syngress Media,U.S.
Google Talking

ISBN: 9781597490559 / Angielski / Miękka / 300 str.

ISBN: 9781597490559/Angielski/Miękka/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Secure Sci Joshua Brashars (External Threat Assessment Team;Johnny Long (Security Researcher)
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool.

Google Talking takes communication to the next level, combining the awesome power of Text and Voice This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.

This book will cover...

Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according...
cena: 215,86 zł

 Syngress Force Emerging Threat Analysis: From Mischief to Malicious Robert Graham (Chief Scientist of Internet Security Systems, Inc) 9781597490566 Syngress Media,U.S.
Syngress Force Emerging Threat Analysis: From Mischief to Malicious

ISBN: 9781597490566 / Angielski / Miękka / 500 str.

ISBN: 9781597490566/Angielski/Miękka/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Graham (Chief Scientist of Internet Security Systems
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library

This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today

This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..

* From Practical VoIP Security, Thomas Porter, Ph.D. and...

A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library

This Syngress Anthology Helps You Protect Your Enterp...

cena: 301,94 zł

 How to Cheat at Configuring ISA Server 2004 Debra Littlejohn Shinder (MCSE, Technology consultant, trainer, and writer), Thomas W Shinder (Member of Microsoft’s ISA 9781597490573 Syngress Media,U.S.
How to Cheat at Configuring ISA Server 2004

ISBN: 9781597490573 / Angielski / Miękka / 616 str.

ISBN: 9781597490573/Angielski/Miękka/616 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
train Technology consultant Debra Littlejohn Shinder (MCSE;Thomas W Shinder (Member of Microsoft’s ISA Server Beta Team
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.

How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books...

How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step ...
cena: 215,86 zł

 How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure Melissa M. Meyer, Michael Cross, MD (Hospital for Special Surgery), Hal Kurz (CIO of Innovative Technology Consultants a 9781597490580 Syngress Media,U.S.
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure

ISBN: 9781597490580 / Angielski / Miękka / 500 str.

ISBN: 9781597490580/Angielski/Miękka/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Melissa M. Meyer; MD (Hospital for Special Surgery) Michael Cross;Hal Kurz (CIO of Innovative Technology Consultants and Compa
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.

The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts...

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for th...
cena: 248,14 zł

 Video Conferencing over IP: Configure, Secure, and Troubleshoot Michael Gough (Computer security consultant, host and webmaster, www.SkypeTips.com and www.VideoCallTips.com) 9781597490634 Syngress Media,U.S.
Video Conferencing over IP: Configure, Secure, and Troubleshoot

ISBN: 9781597490634 / Angielski / Miękka / 336 str.

ISBN: 9781597490634/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
host and webmas Michael Gough (Computer security consultant
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.

For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact.

Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity...

This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to depl...
cena: 301,94 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia