• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5402

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security: Policy, Processes, and Practices Goodman, Seymour 9780765617187 M.E. Sharpe
Information Security: Policy, Processes, and Practices

ISBN: 9780765617187 / Angielski / Twarda / 288 str.

ISBN: 9780765617187/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Detmar W. Straub; Seymour Goodman; Richard Baskerville
Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how...
Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The func...
cena: 780,44 zł

 Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures Johnson, Neil F. 9780792372042 Kluwer Academic Publishers
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures

ISBN: 9780792372042 / Angielski / Twarda / 137 str.

ISBN: 9780792372042/Angielski/Twarda/137 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Neil F. Johnson; Zoran Duric; Sushil Jajodia
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking).
Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital...
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferati...
cena: 403,47 zł

 E-Commerce Security and Privacy Anup K. Ghosh Anup K. Ghosh 9780792373995 Kluwer Academic Publishers
E-Commerce Security and Privacy

ISBN: 9780792373995 / Angielski / Twarda / 163 str.

ISBN: 9780792373995/Angielski/Twarda/163 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anup K. Ghosh; Anup K. Ghosh
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of...
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish t...
cena: 403,47 zł

 Trusted Recovery and Defensive Information Warfare Peng Liu Sushil Jajodia Liu Pen 9780792375722 Kluwer Academic Publishers
Trusted Recovery and Defensive Information Warfare

ISBN: 9780792375722 / Angielski / Twarda / 133 str.

ISBN: 9780792375722/Angielski/Twarda/133 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peng Liu; Sushil Jajodia; Liu Peng Liu
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system.
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted...
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prev...
cena: 403,47 zł

 Security of Data and Transaction Processing: A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000) Atluri, Vijay 9780792377610 Kluwer Academic Publishers
Security of Data and Transaction Processing: A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)

ISBN: 9780792377610 / Angielski / Twarda / 145 str.

ISBN: 9780792377610/Angielski/Twarda/145 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijay Atluri; Pierangela Samarati
Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area.
Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast...
cena: 403,47 zł

 Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography an International Journal. Volume 19, No. 2/3 Koblitz, Neal 9780792378020 Kluwer Academic Publishers
Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography an International Journal. Volume 19, No. 2/3

ISBN: 9780792378020 / Angielski / Twarda / 176 str.

ISBN: 9780792378020/Angielski/Twarda/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Neal I. Koblitz
Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area.
Towards a Quarter-Century of Public Key Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in ...
cena: 403,47 zł

 Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Atluri, Vijay 9780792378488 Kluwer Academic Publishers
Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999,

ISBN: 9780792378488 / Angielski / Twarda / 334 str.

ISBN: 9780792378488/Angielski/Twarda/334 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijay Atluri; John Hale
Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society.
Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including:
  • Critical Infrastructure Protection;
  • Electronic Commerce;
  • ...
Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Inter...
cena: 403,47 zł

 Automated Biometrics: Technologies and Systems Zhang, David D. 9780792378563 Kluwer Academic Publishers
Automated Biometrics: Technologies and Systems

ISBN: 9780792378563 / Angielski / Twarda / 332 str.

ISBN: 9780792378563/Angielski/Twarda/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Zhang
Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a...
Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requi...
cena: 605,23 zł

 Information Security for Global Information Infrastructures: Ifip Tc11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Sihan Qing 9780792379140 Kluwer Academic Publishers
Information Security for Global Information Infrastructures: Ifip Tc11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000,

ISBN: 9780792379140 / Angielski / Twarda / 514 str.

ISBN: 9780792379140/Angielski/Twarda/514 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sihan Qing; Jan H. P. Eloff; Qing Sihan Qing
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences...
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is th...
cena: 806,99 zł

 Database Security XII: Status and Prospects Jajodia, Sushil 9780792384885 Kluwer Academic Publishers
Database Security XII: Status and Prospects

ISBN: 9780792384885 / Angielski / Twarda / 296 str.

ISBN: 9780792384885/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil G. Jajodia
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:
  • Electronic Commerce
  • Informational Assurances
  • Workflow
  • Privacy
  • Policy...
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With...
cena: 605,23 zł

 Networking Security and Standards Weidong Kou Kou Weidon Weidong Kou 9780792398905 Kluwer Academic Publishers
Networking Security and Standards

ISBN: 9780792398905 / Angielski / Twarda / 207 str.

ISBN: 9780792398905/Angielski/Twarda/207 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Weidong Kou; Kou Weidong Kou;Weidong Kou
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded...
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modifi...
cena: 605,23 zł

 Anti-Virus Tools and Techniques for Computer W. Timothy Polk 9780815513643 Noyes Data Corporation/Noyes Publications
Anti-Virus Tools and Techniques for Computer

ISBN: 9780815513643 / Angielski / Twarda / 108 str.

ISBN: 9780815513643/Angielski/Twarda/108 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. Timothy Polk
"Anti-Virus Tools & Techniques for Computer".
"Anti-Virus Tools & Techniques for Computer".
cena: 97,50 zł

 Building an Information Security Awareness Program Mark B. Desman 9780849301162 Auerbach Publications
Building an Information Security Awareness Program

ISBN: 9780849301162 / Angielski / Miękka / 272 str.

ISBN: 9780849301162/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark B. Desman
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step...
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. ...
cena: 477,97 zł

 Computer Forensics: Evidence Collection and Management Newman, Robert C. 9780849305610 Auerbach Publications
Computer Forensics: Evidence Collection and Management

ISBN: 9780849305610 / Angielski / Twarda / 432 str.

ISBN: 9780849305610/Angielski/Twarda/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert C. Newman
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.

The book is divided into two major parts for easy...

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit ...
cena: 463,34 zł

 The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Young, Susan 9780849308888 Auerbach Publications
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

ISBN: 9780849308888 / Angielski / Twarda / 896 str.

ISBN: 9780849308888/Angielski/Twarda/896 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J. Burke Hansen; Susan Young
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing ...
cena: 609,72 zł

 Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management Peltier, Thomas R. 9780849311376 Auerbach Publications
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management

ISBN: 9780849311376 / Angielski / Miękka / 312 str.

ISBN: 9780849311376/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas R. Peltier
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals....
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts a...
cena: 463,34 zł

 A Practical Guide to Security Engineering and Information Assurance Debra S. Herrmann 9780849311635 Auerbach Publications
A Practical Guide to Security Engineering and Information Assurance

ISBN: 9780849311635 / Angielski / Twarda / 408 str.

ISBN: 9780849311635/Angielski/Twarda/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debra S. Herrmann
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to...
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions ...
cena: 609,72 zł

 Securing Windows Nt/2000: From Policies to Firewalls Simonyi, Michael A. 9780849312618 Auerbach Publications
Securing Windows Nt/2000: From Policies to Firewalls

ISBN: 9780849312618 / Angielski / Miękka / 272 str.

ISBN: 9780849312618/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael A. Simonyi
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The...
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large cor...
cena: 477,97 zł

 Building a Global Information Assurance Program John E. MacArthur Raymond J. Curts Douglas E. Campbell 9780849313684 Auerbach Publications
Building a Global Information Assurance Program

ISBN: 9780849313684 / Angielski / Miękka / 424 str.

ISBN: 9780849313684/Angielski/Miękka/424 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John E. MacArthur; Raymond J. Curts; Douglas E. Campbell
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised....
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often ...
cena: 536,56 zł

 Using the Common Criteria for IT Security Evaluation Debra S. Herrmann 9780849314049 Auerbach Publications
Using the Common Criteria for IT Security Evaluation

ISBN: 9780849314049 / Angielski / Miękka / 304 str.

ISBN: 9780849314049/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debra S. Herrmann
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new...
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology i...
cena: 585,33 zł

Pierwsza Podprzednia  4  5  6  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia