• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5419

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Intrusion Detection: A Machine Learning Approach Jeffrey J. P. Tsai 9781848164475 Imperial College Press
Intrusion Detection: A Machine Learning Approach

ISBN: 9781848164475 / Angielski / Twarda / 184 str.

ISBN: 9781848164475/Angielski/Twarda/184 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeffrey J. P. Tsai
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents th...
cena: 451,14

 Cybersecurity: Geopolitics, Law, and Policy Amos N. Guiora 9781138033290 CRC Press
Cybersecurity: Geopolitics, Law, and Policy

ISBN: 9781138033290 / Angielski / Miękka / 176 str.

ISBN: 9781138033290/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Amos N. Guiora

This book examines the legal and policy aspects of cyber-security.

It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and regulatory bodies and management of the complex relationships between them. In drawing on interviews conducted with experts from a wide range of fields, the book presents the reader with dilemmas and paradigms that confront law makers, corporate leaders, law enforcement, and national...

This book examines the legal and policy aspects of cyber-security.

It takes a much needed look at cyber-security from a geopolitical perspec...

cena: 247,83

 INFORMATION SECURITY OBJECTIVES AND PRACTICES - An Exploratory Study Ma, Qingxiong 9783639040937 VDM VERLAG DR. MULLER AKTIENGESELLSCHAFT & CO
INFORMATION SECURITY OBJECTIVES AND PRACTICES - An Exploratory Study

ISBN: 9783639040937 / Angielski / Miękka / 200 str.

ISBN: 9783639040937/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Qingxiong Ma; John Pearson
Information security is a management problem, not a technology one. Experience indicates that technology cannot provide all the answers to the problems posed by people in the context of information security management (ISM). Although many different frameworks and guidelines have been proposed by researchers, practitioners, consultants, government and organizations, current information security objectives and practices are inconsistent or misleading to practitioners. Concepts in the field of ISM are largely based on case studies, anecdotal evidence and the prescription of industry leaders ....
Information security is a management problem, not a technology one. Experience indicates that technology cannot provide all the answers to the problem...
cena: 307,02

 Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009, Proceedings Chen, Hsinchun 9783642013928 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009, Proceedings

ISBN: 9783642013928 / Angielski / Miękka / 168 str.

ISBN: 9783642013928/Angielski/Miękka/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http: //isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the...
Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems fo...
cena: 203,13

 Computational Intelligence in Security for Information Systems: Cisis'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings Gastaldo, Paolo 9783642040900 Springer
Computational Intelligence in Security for Information Systems: Cisis'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings

ISBN: 9783642040900 / Angielski / Miękka / 216 str.

ISBN: 9783642040900/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alvaro Herrero; Paolo Gastaldo; Rodolfo Zunino
The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS 09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and...
The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS 09) presented the most recent developments ...
cena: 609,48

 Handbook of Electronic Security and Digital Forensics Jahankhani, Hamid 9789812837035 WORLD SCIENTIFIC PUBLISHING CO PTE LTD
Handbook of Electronic Security and Digital Forensics

ISBN: 9789812837035 / Angielski / Twarda / 708 str.

ISBN: 9789812837035/Angielski/Twarda/708 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Jahankhani; David Lilburn Watson
Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. This book provides literature on e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence.
Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, ex...
cena: 1036,13

 Digital Business Security Development: Management Technologies Kerr, Don 9781605668062 Business Science Reference
Digital Business Security Development: Management Technologies

ISBN: 9781605668062 / Angielski / Twarda / 240 str.

ISBN: 9781605668062/Angielski/Twarda/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Donn Kerr
Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.
Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protecti...
cena: 927,56

 Computational Forensics: Third International Workshop, Iwcf 2009, the Hague, the Netherlands, August 13-14, 2009, Proceedings Geradts, Zeno J. M. H. 9783642035203 Springer
Computational Forensics: Third International Workshop, Iwcf 2009, the Hague, the Netherlands, August 13-14, 2009, Proceedings

ISBN: 9783642035203 / Angielski / Miękka / 181 str.

ISBN: 9783642035203/Angielski/Miękka/181 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zeno J. M. H. Geradts
ThisLectureNotesinComputerScience(LNCS)volumecontainsthepapersp- sentedatthe ThirdInternationalWorkshoponComputationalForensics(IWCF 2009), held August 13-14, 2009 at The Netherlands Forensic Institute in The Hague, The Netherlands. Computational forensics is a research domain focusing on the investigation of forensic problems using computational methods. Its primary goal is the d- covery and advancement of forensic knowledge involving modeling, computer simulation, and computer-based analysis and recognition in studying and so- ing forensic problems. The Computational Forensics Workshop...
ThisLectureNotesinComputerScience(LNCS)volumecontainsthepapersp- sentedatthe ThirdInternationalWorkshoponComputationalForensics(IWCF 2009), held Augus...
cena: 203,13

 Electronic Government: 8th International Conference, EGOV 2009, Linz, Austria, August 31-September 3, 2009, Proceedings Wimmer, Maria A. 9783642035159 Springer
Electronic Government: 8th International Conference, EGOV 2009, Linz, Austria, August 31-September 3, 2009, Proceedings

ISBN: 9783642035159 / Angielski / Miękka / 432 str.

ISBN: 9783642035159/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maria A. Wimmer
Years of worldwide economic depression do not only shatter private-sector ?rms and strain public-sector budgets, they also test the viability of academic conf- ences and other scholarly events. Given this context it is remarkable how well the eighth EGOV conference maintained its standing as an annual international conference with a global reach. Submissions from Europe increased over those from other parts of the globe. However, the conference upheld its attractiveness toscholarsfromaroundtheworldasavenueofhighreputation.The2009EGOV conference brought together scholars and practitioners from...
Years of worldwide economic depression do not only shatter private-sector ?rms and strain public-sector budgets, they also test the viability of acade...
cena: 203,13

 Biometric ID Management and Multimodal Communication: Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, Septembe Fierrez, Julian 9783642043901 Springer
Biometric ID Management and Multimodal Communication: Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, Septembe

ISBN: 9783642043901 / Angielski / Miękka / 376 str.

ISBN: 9783642043901/Angielski/Miękka/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Julian Fierrez
This volume contains the research papers presented at the Joint COST 2101 & 2102 International Conference on Biometric ID Management and Multimodal Communi- tion, BioID_MultiComm 2009, hosted by the Biometric Recognition Group, ATVS, at the Escuela Politecnica Superior, Universidad Autonoma de Madrid, Spain, during September 16-18, 2009. BioID_MultiComm 2009 was a joint international conference organized coope- tively by COST Actions 2101 & 2102. COST 2101 Action focuses on "Biometrics for Identity Documents and Smart Cards (BIDS)," while COST 2102 Action is entitled "Cross-Modal Analysis of...
This volume contains the research papers presented at the Joint COST 2101 & 2102 International Conference on Biometric ID Management and Multimodal Co...
cena: 203,13

 Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 Roberto Setola, Stefan Geretshuber 9783642035517 Springer-Verlag Berlin and Heidelberg GmbH &
Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008

ISBN: 9783642035517 / Angielski / Miękka / 396 str.

ISBN: 9783642035517/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roberto Setola;Stefan Geretshuber
This volume contains the proceedings of the Third International Workshop on Critical Information Infrastructure Security (CRITIS 2008), which was held - tober 13-15, 2008 in Villa Mondragone (Rome), Italy, and was co-organized by AIIC (The Italian Society of Critical Infrastructures Experts) and ENEA (The Italian National Agency for New Technology, Energy and the Environment). This year's workshop was focused on an interdisciplinary and multifaced - alogue about the third millennium security strategies for critical information infrastructures (CII) and their protection (CIP). The aim was to...
This volume contains the proceedings of the Third International Workshop on Critical Information Infrastructure Security (CRITIS 2008), which was held...
cena: 203,13

 Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization Olzak, Thomas 9781597494311 Syngress
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization

ISBN: 9781597494311 / Angielski / Miękka / 486 str.

ISBN: 9781597494311/Angielski/Miękka/486 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Olzak
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a fresh virtualization environment. Readers walk through step-by-step instructions on everything from building a Windows 2008 server to installing and configuring Hyper-V and App-V.

The book begins with the basics of virtualization, including the role of virtualization in the changing landscape of the traditional data center and its benefits,...

Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those conside...
cena: 173,47

 Enterprise Security for the Executive: Setting the Tone from the Top Bayuk, Jennifer 9780313376603 Praeger Publishers
Enterprise Security for the Executive: Setting the Tone from the Top

ISBN: 9780313376603 / Angielski / Twarda / 163 str.

ISBN: 9780313376603/Angielski/Twarda/163 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jennifer Bayuk

"Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concepts and techniques to make sure they are able to manage and support the efforts of their security team. It is the first such work to define the leadership role for executives in any business's security apparatus.

In "Enterprise Security for the Executive," author Jennifer Bayuk, a highly regarded information security specialist and sought-after consultant and speaker, explains protocols and technologies at just the right level of depth for the...

"Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concep...

cena: 313,11

 Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age Dunn Cavelty, Myriam 9780415569880 Routledge
Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age

ISBN: 9780415569880 / Angielski / Miękka / 182 str.

ISBN: 9780415569880/Angielski/Miękka/182 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Myriam Dunn Cavelty

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.

Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat...

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in ...

cena: 242,88

 Advances in Network and Distributed Systems Security: Ifip Tc11 Wg11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuve de Decker, Bart 9780792375586 Springer Netherlands
Advances in Network and Distributed Systems Security: Ifip Tc11 Wg11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuve

ISBN: 9780792375586 / Angielski / Twarda / 208 str.

ISBN: 9780792375586/Angielski/Twarda/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart de Decker; Frank Piessens; Jan Smits
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,...
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts ...
cena: 609,48

 Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings McGovern, Glenn P. 9781439825129 CRC Press
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings

ISBN: 9781439825129 / Angielski / Twarda / 331 str.

ISBN: 9781439825129/Angielski/Twarda/331 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Glenn McGovern

Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations,...

Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Ass...

cena: 768,42

 Advances in Information and Computer Security: 4th International Workshop on Security, Iwsec 2009 Toyama, Japan, October 28-30, 2009 Proceedings Takagi, Tsuyoshi 9783642048456 Springer
Advances in Information and Computer Security: 4th International Workshop on Security, Iwsec 2009 Toyama, Japan, October 28-30, 2009 Proceedings

ISBN: 9783642048456 / Angielski / Miękka / 229 str.

ISBN: 9783642048456/Angielski/Miękka/229 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tsuyoshi Takagi
The Fourth International Workshop on Security (IWSEC 2009) was held at Toyama International Conference Center, Toyama, Japan, October 28-30, 2009. The workshop was co-organized by CSEC, a special interest group on computer security of the IPSJ (Information Processing Society of Japan) and ISEC, a technical group on information security of IEICE (The Institute of Electronics, Information and Communication Engineers). The excellent Local Organizing Committee was led by the IWSEC 2009 General Co-chairs, Kazuo Takaragi and Hiroaki Kikuchi....
The Fourth International Workshop on Security (IWSEC 2009) was held at Toyama International Conference Center, Toyama, Japan, October 28-30, 2009. The...
cena: 203,13

 Network and System Security John R. Vacca 9781597495356 Syngress Media,U.S.
Network and System Security

ISBN: 9781597495356 / Angielski / Miękka / 408 str.

ISBN: 9781597495356/Angielski/Miękka/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John R. Vacca
This work provides focused coverage of network and system security technologies. The book explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertize.
This work provides focused coverage of network and system security technologies. The book explores practical solutions to a wide range of network and ...
cena: 277,19

 Enterprise Cyber Security: principles and practice Dhillon, Gurpreet S. 9781492148791 Createspace
Enterprise Cyber Security: principles and practice

ISBN: 9781492148791 / Angielski / Miękka / 284 str.

ISBN: 9781492148791/Angielski/Miękka/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gurpreet S. Dhillon
cena: 284,29

 Information Security - The Next Decade Eloff, Jan H. P. 9780412640209 Kluwer Academic Publishers
Information Security - The Next Decade

ISBN: 9780412640209 / Angielski / Twarda / 625 str.

ISBN: 9780412640209/Angielski/Twarda/625 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chapman;Hall;Chapman & Hall
These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.
These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conf...
cena: 1073,96

Pierwsza Podprzednia  19  20  21  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia