• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5402

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security: Design, Implementation, Measurement, and Compliance Layton, Timothy P. 9780849370878 Auerbach Publications
Information Security: Design, Implementation, Measurement, and Compliance

ISBN: 9780849370878 / Angielski / Twarda / 264 str.

ISBN: 9780849370878/Angielski/Twarda/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Timothy P. Layton
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for...
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New secur...
cena: 609,72 zł

 Multimedia Watermarking Techniques and Applications Borko Furht Darko Kirovski 9780849372131 Auerbach Publications
Multimedia Watermarking Techniques and Applications

ISBN: 9780849372131 / Angielski / Twarda / 464 str.

ISBN: 9780849372131/Angielski/Twarda/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borko Furht; Darko Kirovski
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad...
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
cena: 609,72 zł

 Information Security Management Handbook Harold F., Cissp Tipton Micki, Cissp Krause 9780849374951 Auerbach Publications
Information Security Management Handbook

ISBN: 9780849374951 / Angielski / Twarda / 3280 str.

ISBN: 9780849374951/Angielski/Twarda/3280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harold F. Tipton; Micki Krause
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this updated handbook contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics.
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this upd...
cena: 1219,45 zł

 Securing Converged IP Networks Tyson Macaulay 9780849375804 Auerbach Publications
Securing Converged IP Networks

ISBN: 9780849375804 / Angielski / Twarda / 280 str.

ISBN: 9780849375804/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tyson Macaulay
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of...
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, me...
cena: 477,97 zł

 Security in Distributed, Grid, Mobile, and Pervasive Computing Yang Xiao 9780849379215 Auerbach Publications
Security in Distributed, Grid, Mobile, and Pervasive Computing

ISBN: 9780849379215 / Angielski / Twarda / 440 str.

ISBN: 9780849379215/Angielski/Twarda/440 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yang Xiao
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
cena: 404,81 zł

 IT Security Governance Guidebook with Security Program Metrics on CD-ROM Fred Cohen 9780849384356 Auerbach Publications
IT Security Governance Guidebook with Security Program Metrics on CD-ROM

ISBN: 9780849384356 / Angielski / Twarda / 189 str.

ISBN: 9780849384356/Angielski/Twarda/189 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fred Cohen
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model...
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information prot...
cena: 634,12 zł

 Handbook of Applied Cryptography Scott A. (University of Waterloo, Ontario, Canada) Vanstone 9780849385230 CRC Press
Handbook of Applied Cryptography

ISBN: 9780849385230 / Angielski / Twarda / 810 str.

ISBN: 9780849385230/Angielski/Twarda/810 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Canada) Vanstone Ontario Scott A. (University of Waterloo
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a...
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an en...
cena: 780,44 zł

 Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks Peltier, Thomas 9780879302399 Backbeat Books
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks

ISBN: 9780879302399 / Angielski / Miękka / 176 str.

ISBN: 9780879302399/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas R. Peltier
cena: 477,97 zł

 Secure Data Networking Michael Purser 9780890066928 Artech House Publishers
Secure Data Networking

ISBN: 9780890066928 / Angielski / Twarda / 252 str.

ISBN: 9780890066928/Angielski/Twarda/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Purser
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, an...
cena: 571,65 zł

 Smart Card Security and Applications Mike Hendry 9780890069530 Artech House Publishers
Smart Card Security and Applications

ISBN: 9780890069530 / Angielski / Twarda / 308 str.

ISBN: 9780890069530/Angielski/Twarda/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Hendry
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals...
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, ...
cena: 567,07 zł

 Informed Watermarking Joachim Eggers Bernd Girod 9781402070716 Kluwer Academic Publishers
Informed Watermarking

ISBN: 9781402070716 / Angielski / Twarda / 182 str.

ISBN: 9781402070716/Angielski/Twarda/182 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joachim Eggers; Bernd Girod
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic has a long history, but before 1995 publications in scientific literature were almost absent. From 1995 onwards however the number of publications on watermarking has been steadily increasing. Today a number of workshops and conferences on this topic exist; also a number of scientific journals on watermarking have been published. This renewed scientific interest in...
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in ...
cena: 403,47 zł

 Network Interdiction and Stochastic Integer Programming David L. Woodruff David L. Woodruff 9781402073021 Springer
Network Interdiction and Stochastic Integer Programming

ISBN: 9781402073021 / Angielski / Twarda / 125 str.

ISBN: 9781402073021/Angielski/Twarda/125 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David L. Woodruff; David L. Woodruff
On March 15, 2002 we held a workshop on network interdiction and the more general problem of stochastic mixed integer programming at the University of California, Davis. Jesus De Loera and I co-chaired the event, which included presentations of on-going research and discussion. At the workshop, we decided to produce a volume of timely work on the topics. This volume is the result. Each chapter represents state-of-the-art research and all of them were refereed by leading investigators in the respective fields. Problems - sociated with protecting and attacking computer, transportation, and...
On March 15, 2002 we held a workshop on network interdiction and the more general problem of stochastic mixed integer programming at the University of...
cena: 201,72 zł

 Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks Brancik, Kenneth 9781420046595 Auerbach Publications
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks

ISBN: 9781420046595 / Angielski / Twarda / 504 str.

ISBN: 9781420046595/Angielski/Twarda/504 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth Brancik
An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.

Drawing from the author s vast experience...

An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regardin...
cena: 634,12 zł

 Digital Privacy: Theory, Technologies, and Practices Acquisti, Alessandro 9781420052176 Auerbach Publications
Digital Privacy: Theory, Technologies, and Practices

ISBN: 9781420052176 / Angielski / Twarda / 492 str.

ISBN: 9781420052176/Angielski/Twarda/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Acquisti; Sabrina Di Vimercati; Stefanos Gritzalis
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in...
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although t...
cena: 609,72 zł

 Mechanics of User Identification and Authentication: Fundamentals of Identity Management Todorov, Dobromir 9781420052190 Auerbach Publications
Mechanics of User Identification and Authentication: Fundamentals of Identity Management

ISBN: 9781420052190 / Angielski / Twarda / 760 str.

ISBN: 9781420052190/Angielski/Twarda/760 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dobromir Todorov
Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth yet accessible manner.
Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting ...
cena: 634,12 zł

 Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement Brotby 9781420052855 Auerbach Publications
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

ISBN: 9781420052855 / Angielski / Twarda / 200 str.

ISBN: 9781420052855/Angielski/Twarda/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. Krag Brotby
Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this book presents case studies and tools for monitoring specific items, and offers practical guidance for implementing metrics across an entire organization.
Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this b...
cena: 404,81 zł

 Building an Effective Information Security Policy Architecture Sandy Bacik 9781420059052 CRC
Building an Effective Information Security Policy Architecture

ISBN: 9781420059052 / Angielski / Twarda / 368 str.

ISBN: 9781420059052/Angielski/Twarda/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sandy Bacik
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise.

A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book...

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant ...
cena: 658,50 zł

 Multimedia Content Encryption: Techniques and Applications Lian, Shiguo 9781420065275 Auerbach Publications
Multimedia Content Encryption: Techniques and Applications

ISBN: 9781420065275 / Angielski / Twarda / 224 str.

ISBN: 9781420065275/Angielski/Twarda/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shiguo Lian

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field.

The book begins with the history of multimedia encryption and then examines general performance...

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no l...

cena: 585,33 zł

 Encyclopedia of Information Assurance - 4 Volume Set (Print) Rebecca Herold Marcus K. Rogers 9781420066203 Auerbach Publications
Encyclopedia of Information Assurance - 4 Volume Set (Print)

ISBN: 9781420066203 / Angielski / Twarda / 3860 str.

ISBN: 9781420066203/Angielski/Twarda/3860 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rebecca Herold; Marcus K. Rogers
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed...
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) p...
cena: 6097,22 zł

 Information Security Management Handbook, Volume 2 Harold F., Cissp Tipton Micki, Cissp Krause 9781420067088 Auerbach Publications
Information Security Management Handbook, Volume 2

ISBN: 9781420067088 / Angielski / Twarda / 456 str.

ISBN: 9781420067088/Angielski/Twarda/456 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harold F. Tipton; Micki Krause
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT...
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth ...
cena: 634,12 zł

Pierwsza Podprzednia  4  5  6  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia