Data Storage: Systems, Management & Security Issues
ISBN: 9781536128277 / Angielski / Miękka / 121 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
498,50 zł |
Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
ISBN: 9781640120136 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Peters analyzes 198 cyber events and three case studies, discussing their area of effect, targeting intent, method, and attribution to elucidate the complex narrative of cyber strategy and its influence on economic power outcomes.
Peters analyzes 198 cyber events and three case studies, discussing their area of effect, targeting intent, method, and attribution to elucidate the c...
|
|
cena:
120,04 zł |
Security and Data Reliability in Cooperative Wireless Networks
ISBN: 9781138092792 / Angielski / Twarda / 503 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
585,04 zł |
Fintech: The Technology Driving Disruption in the Financial Services Industry
ISBN: 9781138294790 / Angielski / Twarda / 261 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
300,10 zł |
Error Correcting Codes: A Mathematical Introduction
ISBN: 9781138416086 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
941,15 zł |
Pearls of Discrete Mathematics
ISBN: 9781138435865 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
915,71 zł |
The Frugal Ciso: Using Innovation and Smart Approaches to Maximize Your Security Posture
ISBN: 9781138436831 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
813,96 zł |
Web Security: A WhiteHat Perspective
ISBN: 9781138436848 / Angielski / Twarda / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require...
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of ...
|
|
cena:
864,83 zł |
Information Security Fundamentals
ISBN: 9781138436893 / Angielski / Twarda / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise‘s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and responsibilities, and common threats. It...
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise‘s...
|
|
cena:
864,83 zł |
Unauthorized Access: The Crisis in Online Privacy and Security
ISBN: 9781138436923 / Angielski / Twarda / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy,...
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to publ...
|
|
cena:
890,27 zł |
Secure Java: For Web Application Development
ISBN: 9781138436954 / Angielski / Twarda / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors...
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application r...
|
|
cena:
890,27 zł |
Securing and Controlling Cisco Routers
ISBN: 9781138436992 / Angielski / Twarda / 732 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what...
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisc...
|
|
cena:
813,96 zł |
Security De-Engineering: Solving the Problems in Information Risk Management
ISBN: 9781138440388 / Angielski / Twarda / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems impacting corporate information risk management. It explains what the problems are, how and why they have manifested, and outlines powerful solutions.Ian Tibble delves into more than a decade of experience working with close to 100 different Fortune 500s...
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information s...
|
|
cena:
813,96 zł |
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
ISBN: 9781138440449 / Angielski / Twarda / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today‘s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner workings of that organization. Oracle Identity Management: Governance, Risk, and Compliance Architecture is the definitive guide for corporate stewards who are struggling with the challenge of meeting regulatory compliance pressures while embarking on the path of process and system remediation. The text...
In today‘s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is ...
|
|
cena:
813,96 zł |
Security Strategy: From Requirements to Reality
ISBN: 9781138440463 / Angielski / Twarda / 346 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and...
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Sec...
|
|
cena:
864,83 zł |
Defensive Tactics for Today's Law Enforcement
ISBN: 9781138458475 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
941,15 zł |
Managing Intelligence: A Guide for Law Enforcement Professionals
ISBN: 9781138458574 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
915,71 zł |
What They Didn't Teach at the Academy: Topics, Stories, and Reality Beyond the Classroom
ISBN: 9781138458673 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
890,27 zł |
Security for Service Oriented Architectures
ISBN: 9781138468436 / Angielski / Twarda / 341 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage,...
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide gui...
|
|
cena:
864,83 zł |
Extremist Propaganda in Social Media: A Threat to Homeland Security
ISBN: 9781138493674 / Angielski / Twarda / 210 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
661,34 zł |