• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5403

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Hackers: Crime and the Digital Sublime Taylor, Paul 9780415180726 Routledge
Hackers: Crime and the Digital Sublime

ISBN: 9780415180726 / Angielski / Miękka / 216 str.

ISBN: 9780415180726/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul A. Taylor
The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike. Using material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if...
The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts al...
cena: 243,34 zł

 The Shellcoder's Handbook: Discovering and Exploiting Security Holes Gerardo Richarte 9780470080238 John Wiley & Sons Inc
The Shellcoder's Handbook: Discovering and Exploiting Security Holes

ISBN: 9780470080238 / Angielski / Miękka / 752 str.

ISBN: 9780470080238/Angielski/Miękka/752 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerardo Richarte
  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
  • Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
  • The...
  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to...
cena: 169,09 zł

 Applied Cryptanalysis: Breaking Ciphers in the Real World Stamp, Mark 9780470114865 John Wiley & Sons
Applied Cryptanalysis: Breaking Ciphers in the Real World

ISBN: 9780470114865 / Angielski / Twarda / 424 str.

ISBN: 9780470114865/Angielski/Twarda/424 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Stamp; Richard M. Low
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every ef...
cena: 542,89 zł

 Wiley Pathways Network Security Fundamentals Project Manual Rachelle Reese 9780470127988 John Wiley & Sons
Wiley Pathways Network Security Fundamentals Project Manual

ISBN: 9780470127988 / Angielski / Miękka / 312 str.

ISBN: 9780470127988/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rachelle Reese
You can get there

The Network Security Fundamentals Project Manual offers a wealth of easy-to-read, practical, and up-to-date activities that reinforce fundamental network security concepts. You will develop the core competencies and skills you'll need in the real world, including how to:
* Install Network Monitor and capture traffic
* Encrypt files using folder properties and the cipher command
* Install and use Certificate Services
* Configure an IPsec policy that requires authentication and encryption
* Use RSoP to view effective policy...
You can get there

The Network Security Fundamentals Project Manual offers a wealth of easy-to-read, practical, and up-to-date activities ...
cena: 206,88 zł

 Security for Ubiquitous Computing Frank Stajano 9780470844939 John Wiley & Sons
Security for Ubiquitous Computing

ISBN: 9780470844939 / Angielski / Twarda / 268 str.

ISBN: 9780470844939/Angielski/Twarda/268 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frank Stajano
* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
* Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
* Includes a primer on security and the basics of cryptography
* Describes the...
* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on...
cena: 501,90 zł

 Umts Security Niemi, Valtteri 9780470847947 John Wiley & Sons
Umts Security

ISBN: 9780470847947 / Angielski / Twarda / 256 str.

ISBN: 9780470847947/Angielski/Twarda/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Valtteri Niemi; Kaisa Nyberg
Can you afford not to read this book?........

The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and phone users and numerous different radio access technologies will co-exist within the UMTS system's core network - security is, therefore, of the utmost importance.

UMTS Security focuses on the standardized security features of UMTS and brings together material previously only available in specifications, design documents and presentations in one concise form. In addition, this unique volume also covers...

Can you afford not to read this book?........

The Universal Mobile Telecommunication System (UMTS) offers a consistent set of service...

cena: 558,26 zł

 Practical Cryptography Bruce (Counterpane Internet Security, Minneapolis, Minnesota) Schneier 9780471223573 John Wiley & Sons Inc
Practical Cryptography

ISBN: 9780471223573 / Angielski / Miękka / 432 str.

ISBN: 9780471223573/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Minnesota Minneapolis Bruce (Counterpane Internet Security
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and...
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most rel...
cena: 181,59 zł

 The Art of Deception: Controlling the Human Element of Security William L. (Rancho Santa Fe, CA, author ) Simon 9780471237129 John Wiley & Sons
The Art of Deception: Controlling the Human Element of Security

ISBN: 9780471237129 / Angielski / Twarda / 368 str.

ISBN: 9780471237129/Angielski/Twarda/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
author ) Simon CA William L. (Rancho Santa Fe
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a...
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desp...
cena: 180,62 zł

 Information Security: A Strategic Approach Leveque, Vincent 9780471736127 IEEE Computer Society Press
Information Security: A Strategic Approach

ISBN: 9780471736127 / Angielski / Miękka / 288 str.

ISBN: 9780471736127/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vincent Leveque
Bridging the gap between information security and strategic planning


This publication is a reflection of the author's firsthand experience as an information security consultant, working for an array of clients in the private and public sectors. Readers discover how to work with their organizations to develop and implement a successful information security plan by improving management practices and by establishing information security as an integral part of overall strategic planning.

The book starts with an overview of basic concepts in strategic planning,...
Bridging the gap between information security and strategic planning


This publication is a reflection of the author's firsthand ex...
cena: 455,78 zł

 IT Security Interviews Exposed : Secrets to Landing Your Next Information Security Job Chris Butler Russ Rogers Mason Ferratt 9780471779872 John Wiley & Sons
IT Security Interviews Exposed : Secrets to Landing Your Next Information Security Job

ISBN: 9780471779872 / Angielski / Miękka / 240 str.

ISBN: 9780471779872/Angielski/Miękka/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Butler; Russ Rogers; Mason Ferratt
  • Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help
  • Divided into two parts: how to get the job and a security crash course to prepare for the job interview
  • Security is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position
  • Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's...
  • Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help
  • ...
cena: 102,43 zł

 Protecting Information: From Classical Error Correction to Quantum Cryptography Loepp, Susan 9780521534765 Cambridge University Press
Protecting Information: From Classical Error Correction to Quantum Cryptography

ISBN: 9780521534765 / Angielski / Miękka / 304 str.

ISBN: 9780521534765/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Susan Loepp; William Wootters
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...
cena: 281,12 zł

 Secure Communicating Systems: Design, Analysis, and Implementation Huth, Michael R. a. 9780521807319 Cambridge University Press
Secure Communicating Systems: Design, Analysis, and Implementation

ISBN: 9780521807319 / Angielski / Twarda / 296 str.

ISBN: 9780521807319/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Huth
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical implementation; standard security models for information flow in computer programs or human organizations; and moral, legal, and political issues. Another novel feature is the presentation of a formal model-checking tool for specifying and debugging security protocols. A...
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in progra...
cena: 347,56 zł

 Cobb's Guide to PC and LAN Security Stephen Cobb 9780595181506 Backinprint.com
Cobb's Guide to PC and LAN Security

ISBN: 9780595181506 / Angielski / Miękka / 736 str.

ISBN: 9780595181506/Angielski/Miękka/736 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Cobb
cena: 161,22 zł

 The Weakest Security Link Series: 1st Edition Medina, Luis F. 9780595264940 Writers Club Press
The Weakest Security Link Series: 1st Edition

ISBN: 9780595264940 / Angielski / Miękka / 200 str.

ISBN: 9780595264940/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Luis F. Medina
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understanding of networking technologies can benefit from this book. Unlike other network security books written with in-depth coverage of things you don t need, this book takes a different spin on security: The focus of this book is to explore and identify the weak security links in your entire network. We will achieve this by addressing the basic and most overlooked security steps in your network. When you purchase this book, you will receive a free...
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understandin...
cena: 68,99 zł

 The Expert Guide to PeopleSoft Security Jason Carter 9780595324408 iUniverse
The Expert Guide to PeopleSoft Security

ISBN: 9780595324408 / Angielski / Miękka / 116 str.

ISBN: 9780595324408/Angielski/Miękka/116 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jason Carter
Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.

"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge...

Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
cena: 76,67 zł

 Information Security For The Little Guy Joseph M. Hoffman 9780595386246 iUniverse
Information Security For The Little Guy

ISBN: 9780595386246 / Angielski / Miękka / 56 str.

ISBN: 9780595386246/Angielski/Miękka/56 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph M. Hoffman
Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
cena: 38,24 zł

 The Expert Guide to PeopleSoft Security Jason Carter 9780595665792 iUniverse
The Expert Guide to PeopleSoft Security

ISBN: 9780595665792 / Angielski / Twarda / 116 str.

ISBN: 9780595665792/Angielski/Twarda/116 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jason Carter
Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.

"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge...

Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
cena: 115,10 zł

 Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs Garfinkel, Simson 9780596000455 O'Reilly Media
Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs

ISBN: 9780596000455 / Angielski / Miękka / 788 str.

ISBN: 9780596000455/Angielski/Miękka/788 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simson Garfinkel

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites.Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet...

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business...

cena: 204,91 zł

 Hardening Cisco Routers Thomas Akin 9780596001667 O'Reilly Media
Hardening Cisco Routers

ISBN: 9780596001667 / Angielski / Miękka / 194 str.

ISBN: 9780596001667/Angielski/Miękka/194 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Akin

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:

    The importance of router security and where routers fit...

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement...

cena: 95,89 zł

 Linux Security Cookbook Daniel J. Barrett Richard E. Silverman Robert G. Byrnes 9780596003913 O'Reilly Media
Linux Security Cookbook

ISBN: 9780596003913 / Angielski / Miękka / 336 str.

ISBN: 9780596003913/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel J. Barrett; Richard E. Silverman; Robert G. Byrnes

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of...

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one s...

cena: 155,73 zł

Pierwsza Podprzednia  1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia