• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5419

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The It Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments Wright, Craig S. 9781597492669 Syngress Publishing
The It Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments

ISBN: 9781597492669 / Angielski / Miękka / 715 str.

ISBN: 9781597492669/Angielski/Miękka/715 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Craig S. Wright
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.

  • The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them
  • The most...
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to...
cena: 262,70

 Malware Forensics: Investigating and Analyzing Malicious Code Malin, Cameron H. 9781597492683 Syngress Publishing
Malware Forensics: Investigating and Analyzing Malicious Code

ISBN: 9781597492683 / Angielski / Miękka / 674 str.

ISBN: 9781597492683/Angielski/Miękka/674 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cameron H. Malin; Eoghan Casey; James M. Aquilina

Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence...

Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Writte...

cena: 272,62

 It Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement Chorafas, Dimitris N. 9781420086171 Auerbach Publications
It Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

ISBN: 9781420086171 / Angielski / Twarda / 305 str.

ISBN: 9781420086171/Angielski/Twarda/305 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dr Dimitris N. Chorafas

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board s audit committee and CEO. Written as a contribution to the accounting and auditing professions as well as to IT practitioners, IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement links these two key business strategies and explains how to perform IT auditing in a comprehensive and strategic...

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practi...

cena: 669,27

 Coastal Lagoons: Critical Habitats of Environmental Change Kennish, Michael J. 9781420088304 CRC
Coastal Lagoons: Critical Habitats of Environmental Change

ISBN: 9781420088304 / Angielski / Twarda / 568 str.

ISBN: 9781420088304/Angielski/Twarda/568 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael J. Kennish; Hans W. Paerl

Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agricultural, and urban waste, overuse from fisheries, aquaculture, transportation, energy production, and other human activities. The features that make coastal lagoons vital ecosystems underline the importance of sound management strategies for long-term environmental and resource sustainability. Written by an internationally renowned group of contributors, Coastal Lagoons: Critical Habitats of Environmental Change examines the...

Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agric...

cena: 1090,67

 Securing Citrix Xenapp Server in the Enterprise Azad, Tariq 9781597492812 Syngress Publishing
Securing Citrix Xenapp Server in the Enterprise

ISBN: 9781597492812 / Angielski / Miękka / 739 str.

ISBN: 9781597492812/Angielski/Miękka/739 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tariq Azad
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious...
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and ...
cena: 230,53

 Next Generation Ssh2 Implementation: Securing Data in Motion Liu, Dale 9781597492836 Syngress Publishing
Next Generation Ssh2 Implementation: Securing Data in Motion

ISBN: 9781597492836 / Angielski / Miękka / 336 str.

ISBN: 9781597492836/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Justin Peltier
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new...
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal informat...
cena: 173,47

 Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations Fei Hu 9781498723183 CRC Press
Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations

ISBN: 9781498723183 / Angielski / Twarda / 584 str.

ISBN: 9781498723183/Angielski/Twarda/584 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fei Hu

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and...

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of h...

cena: 570,12

 New Trends in Cryptographic Systems Nadia Nedjah, Luiza Macedo Mourelle 9781594549779 Nova Science Publishers Inc
New Trends in Cryptographic Systems

ISBN: 9781594549779 / Angielski / Twarda / 135 str.

ISBN: 9781594549779/Angielski/Twarda/135 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nadia Nedjah;Luiza Macedo Mourelle
Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. This book includes content that is focused on
Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that ...
cena: 1145,15

 Security in the Private Cloud John R. Vacca 9781482259551 CRC Press
Security in the Private Cloud

ISBN: 9781482259551 / Angielski / Twarda / 381 str.

ISBN: 9781482259551/Angielski/Twarda/381 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John R. Vacca

This comprehensive handbook serves as a professional reference and practitioner s guide to today s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

"

This comprehensive handbook serves as a professional reference and practitioner s guide to today s most complete and concise view of private cloud ...

cena: 718,85

 Information Assurance Architecture Keith D. Willett 9780849380679 TAYLOR & FRANCIS LTD
Information Assurance Architecture

ISBN: 9780849380679 / Angielski / Twarda / 620 str.

ISBN: 9780849380679/Angielski/Twarda/620 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keith D. Willett
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel d...
cena: 694,06

 Information Security Applications: 8th International Workshop, WISA 2007 Jeju Island, Korea, August 27-29, 2007 Revised Selected Papers Sehun, Kim 9783540775348 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Information Security Applications: 8th International Workshop, WISA 2007 Jeju Island, Korea, August 27-29, 2007 Revised Selected Papers

ISBN: 9783540775348 / Angielski / Miękka / 406 str.

ISBN: 9783540775348/Angielski/Miękka/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We...
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop...
cena: 203,13

 E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers Alkassar, Ammar 9783540774921 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers

ISBN: 9783540774921 / Angielski / Miękka / 208 str.

ISBN: 9783540774921/Angielski/Miękka/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical, socio-ethicalandlegalrelationsbetween Identity and...
Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable iden...
cena: 203,13

 Policies and Research in Identity Management: First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Era De Leeuw, Elisabeth 9780387779959 Springer
Policies and Research in Identity Management: First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Era

ISBN: 9780387779959 / Angielski / Twarda / 160 str.

ISBN: 9780387779959/Angielski/Twarda/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elisabeth De Leeuw; Simone Fisher-Hubner; Jimmy Tseng
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community...
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase ...
cena: 203,13

 Wireless Security: Know It All Praphul Chandra 9781856175296 Newnes
Wireless Security: Know It All

ISBN: 9781856175296 / Angielski / Miękka / 726 str.

ISBN: 9781856175296/Angielski/Miękka/726 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Praphul Chandra
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf

Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.

- A 360-degree view from our best-selling authors
-...

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first ...
cena: 282,53

 Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography Dube, Roger R. 9780470193396 John Wiley & Sons
Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography

ISBN: 9780470193396 / Angielski / Twarda / 256 str.

ISBN: 9780470193396/Angielski/Twarda/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roger R. Dube
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format.
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the...
cena: 578,99

 Guide to Biometric Reference Systems and Performance Evaluation Dijana Petrovska-Delacra(c)Taz Ga(c)Rard Chollet Bernadette Dorizzi 9781848002913 Springer
Guide to Biometric Reference Systems and Performance Evaluation

ISBN: 9781848002913 / Angielski / Twarda / 382 str.

ISBN: 9781848002913/Angielski/Twarda/382 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dijana Petrovska-Delacra(c)Taz; Ga(c)Rard Chollet; Bernadette Dorizzi
With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permeating many sectors of our society. Even though the origins and the most frequent use of b- metrics, primarily ?ngerprints, have been in forensics and law enforcement app- cations, biometric recognition is now needed to address a number of societal pr- lems related to security risks, terror threats and ?nancial fraud. In some situations, for example, detecting duplicate enrolments (for issuing of?cial documents such as passports and driver...
With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permea...
cena: 406,31

 Geospatial Information Technology for Emergency Response Sisi Zlatanova Jonathan Li  9780415422475 Taylor & Francis
Geospatial Information Technology for Emergency Response

ISBN: 9780415422475 / Angielski / Twarda / 381 str.

ISBN: 9780415422475/Angielski/Twarda/381 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sisi Zlatanova;Jonathan Li

When disaster occurs, the response phrase is viewed as the most critical in terms of saving lives and protecting property. This book aims to share technological advances that allow wider, faster and better utilization of geospatial information in emergency response situations.

When disaster occurs, the response phrase is viewed as the most critical in terms of saving lives and protecting property. This book aims to share ...

cena: 1313,76

 Securing Computer Networks: Anaysis Design and Implementation Fisch, Eric A. 9780849318689 Taylor & Francis
Securing Computer Networks: Anaysis Design and Implementation

ISBN: 9780849318689 / Angielski / Twarda / 392 str.

ISBN: 9780849318689/Angielski/Twarda/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric A. Fisch;Gregory B. White
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the author...
cena: 208,17

 Open Source Systems Security Certification Ernesto Damiani Claudio Agostino Ardagna Nabil Nabi 9780387773230 Springer
Open Source Systems Security Certification

ISBN: 9780387773230 / Angielski / Twarda / 204 str.

ISBN: 9780387773230/Angielski/Twarda/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ernesto Damiani; Claudio Agostino Ardagna; Nabil Nabil El Ioini

Open Source Advances in Computer Applications book series provides timely technological and business information for:

Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;

Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems;

Ensuring integrated systems,...

Open Source Advances in Computer Applications book series provides timely technological and business information for:

...
cena: 406,31

 Information Security Brotby, Krag 9780470131183 Wiley-Interscience
Information Security

ISBN: 9780470131183 / Angielski / Twarda / 208 str.

ISBN: 9780470131183/Angielski/Twarda/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Krag Brotby
The Growing Imperative Need for Effective Information Security Governance

With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that...

The Growing Imperative Need for Effective Information Security Governance

With monotonous regularity, headlines announce ever more spectacular fail...

cena: 448,53

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia