• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5419

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Database Security X: Status and Prospects Samarati, Pierangela 9780412808203 Chapman & Hall
Database Security X: Status and Prospects

ISBN: 9780412808203 / Angielski / Twarda / 313 str.

ISBN: 9780412808203/Angielski/Twarda/313 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pierangela Samarati; Ravi Sandhu
The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.
The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their k...
cena: 609,48

 Communications and Multimedia Security II Chapman & Hall                           Patrick Horster 9780412797804 Chapman & Hall
Communications and Multimedia Security II

ISBN: 9780412797804 / Angielski / Twarda / 318 str.

ISBN: 9780412797804/Angielski/Twarda/318 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chapman & Hall; Patrick Horster
In multimedia and communication environments all documents must be protected against attacks. The movie Forrest Gump showed how multimedia documents can be manipulated. The required security can be achieved by a number of different security measures. This book provides an overview of the current research in Multimedia and Communication Security. A broad variety of subjects are addressed including: network security; attacks; cryptographic techniques; healthcare and telemedicine; security infrastructures; payment systems; access control; models and policies; auditing and firewalls. This volume...
In multimedia and communication environments all documents must be protected against attacks. The movie Forrest Gump showed how multimedia documents c...
cena: 609,48

 Hacking Wall Street: Attacks And Countermeasures Geer, Dan 9781441463630 Createspace
Hacking Wall Street: Attacks And Countermeasures

ISBN: 9781441463630 / Angielski / Miękka / 404 str.

ISBN: 9781441463630/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karlos Krinklebine
In this one of a kind book, the author exposes the who, what, why and how of today's professional hackers as they attempt and often succeed in stealing the identities of millions of consumers and swindle Wall Street's largest financial services firms out of millions of dollars. For the first time, look inside the world of the new generation cyber criminal with detailed descriptions of modern phishing toolkits, Trojans, pump and dump schemes and advanced malware distribution systems. Follow the author on a trip through the cyber criminal underground and understand how they find and attack a...
In this one of a kind book, the author exposes the who, what, why and how of today's professional hackers as they attempt and often succeed in stealin...
cena: 60,98

 A Guide to Kernel Exploitation: Attacking the Core Massimiliano (Security Consultant, Emaze Networks) Oldani 9781597494861 Syngress Media,U.S.
A Guide to Kernel Exploitation: Attacking the Core

ISBN: 9781597494861 / Angielski / Miękka / 442 str.

ISBN: 9781597494861/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Emaze Networks) Oldani Massimiliano (Security Consultant
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.
The book is...
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel...
cena: 198,25

 Dynamic Police Training Ann R Bumbak   9781439815878 Taylor and Francis
Dynamic Police Training

ISBN: 9781439815878 / Angielski / Miękka / 182 str.

ISBN: 9781439815878/Angielski/Miękka/182 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ann R Bumbak;¬Abar;¬Abar

As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation for police work has traditionally been conducted on the job. Dynamic Police Training partners the experienced law enforcement officer s "street-smart" perspective of what makes training work with a professional educator s "book-smart" approach to writing curriculum to achieve the best results in police training programs.

A results-oriented handbook for police trainers seeking clear and definitive information on...

As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation...

cena: 416,39

 It Induction and Information Security Awareness It Governance Publishing 9781849280334 It Governance Ltd
It Induction and Information Security Awareness

ISBN: 9781849280334 / Angielski / Miękka / 54 str.

ISBN: 9781849280334/Angielski/Miękka/54 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
It Governance Publishing
A pocket guide that puts forward the case for an organisation-wide, and fully supported IT Induction and Information Security Awareness Programme. It intends to provide clarity of purpose, equate the programme to organisational roles and offer practical assistance in the development and delivery of an IT Induction programme.
A pocket guide that puts forward the case for an organisation-wide, and fully supported IT Induction and Information Security Awareness Programme. It ...
cena: 77,26

 Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation Schuckers, Michael E. 9781849962018 Not Avail
Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation

ISBN: 9781849962018 / Angielski / Twarda / 317 str.

ISBN: 9781849962018/Angielski/Twarda/317 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael E. Schuckers
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of...
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across t...
cena: 609,48

 Certification and Security in Health-Related Web Applications: Concepts and Solutions Chryssanthou, Anargyros 9781616928957 Medical Information Science Reference
Certification and Security in Health-Related Web Applications: Concepts and Solutions

ISBN: 9781616928957 / Angielski / Twarda / 354 str.

ISBN: 9781616928957/Angielski/Twarda/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anargyros Chryssanthou; Ioannis Apostolakis; Iraklis Varlamis
This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications--Provided by publisher.
This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and...
cena: 1262,51

 Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings Micciancio, Daniele 9783642117985 Springer
Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings

ISBN: 9783642117985 / Angielski / Miękka / 610 str.

ISBN: 9783642117985/Angielski/Miękka/610 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniele Micciancio
TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInternationalAssociationofCryptologicResearch(IACR)andwasorganized in cooperation with the Information Security and Cryptography group at ETH Zurich.The GeneralChairsof the conferencewereMartin Hirt andUeli Maurer. The conference received 100 submissions, of which the Program Committee selected 33 for presentation at the conference. The Best Student Paper Award was given to Kai-Min Chung and Feng-Hao Liu for their paper "ParallelRepe- tion Theorems...
TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInter...
cena: 406,31

 Securing the Smart Grid: Next Generation Power Grid Security Flick, Tony 9781597495707 Syngress
Securing the Smart Grid: Next Generation Power Grid Security

ISBN: 9781597495707 / Angielski / Miękka / 290 str.

ISBN: 9781597495707/Angielski/Miękka/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Flick Ford

Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers.

The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and...

Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats an...

cena: 173,47

 Information Security Risk Management for ISO 27001/Iso27002 It Governance Publishing 9781849280433 It Governance Ltd
Information Security Risk Management for ISO 27001/Iso27002

ISBN: 9781849280433 / Angielski / Miękka / 198 str.

ISBN: 9781849280433/Angielski/Miękka/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alan Calder; Steve G. Watkins
Expert guidance on planning and implementing a risk assessment and protecting your business information. In the knowledge economy, organisations have to be able to protect their information assets. Information security management has, therefore, become a critical corporate discipline. The international code of practice for an information security management system (ISMS) is ISO27002. As the code of practice explains, information security management enables organisations to ensure business continuity, minimise business risk, and maximise return on investments and business opportunities . ISMS...
Expert guidance on planning and implementing a risk assessment and protecting your business information. In the knowledge economy, organisations have ...
cena: 186,93

 Progress in Cryptology--AFRICACRYPT 2010 Bernstein, Daniel J. 9783642126772 Not Avail
Progress in Cryptology--AFRICACRYPT 2010

ISBN: 9783642126772 / Angielski / Miękka / 436 str.

ISBN: 9783642126772/Angielski/Miękka/436 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel J. Bernstein; Tanja Lange
Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting...
Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chai...
cena: 203,13

 The Illusion of Due Diligence: Notes from the CISO Underground Rothke, Ben 9781451566031 Createspace
The Illusion of Due Diligence: Notes from the CISO Underground

ISBN: 9781451566031 / Angielski / Miękka / 214 str.

ISBN: 9781451566031/Angielski/Miękka/214 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeffrey S. Bardin; Ben Rothke
As a CISO, my job is to protect corporate information assets while ensuring security obligations are met for the business. My job is to ensure shareholders, investors, employees, our customers and their interests are protected. My job is to provide the appropriate level of security for data and data transactions in preventing, detecting and responding to breaches. Regulations have brought information security issues to the forefront expanding funding for technologies, staffing and training. More and more we see exposure of data and leakage of sensitive information. Do corporate boards and the...
As a CISO, my job is to protect corporate information assets while ensuring security obligations are met for the business. My job is to ensure shareho...
cena: 56,91

 IP Address Management Rooney, Timothy 9780470585870
IP Address Management

ISBN: 9780470585870 / Angielski / Twarda / 448 str.

ISBN: 9780470585870/Angielski/Twarda/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Timothy Rooney;¬Abar;¬Abar
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send...
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management ...
cena: 605,08

 Computer Security Dieter (Technical University of Hamburg-Harburg) Gollmann 9780470741153 John Wiley & Sons Inc
Computer Security

ISBN: 9780470741153 / Angielski / Miękka / 464 str.

ISBN: 9780470741153/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dieter (Technical University of Hamburg-Harburg) Gollmann
A completely up-to-date resource on computer security

Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of...

A completely up-to-date resource on computer security

Assuming no previous experience in the field of computer security, this must-have book...

cena: 281,54

 Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier Gilbert, Henri 9783642131899 Not Avail
Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier

ISBN: 9783642131899 / Angielski / Miękka / 712 str.

ISBN: 9783642131899/Angielski/Miękka/712 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Henri Gilbert
These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques. The conference was sponsored by the International Association for Cryptologic Research and held on the French Riviera, May 30 June 3, 2010. A total of 191 papers were received of which 188 were retained as valid submissions. These were each assigned to at least three Program Committee members and a total of 606 review reports were produced. The printed record of the reviews and extensive online discussions that followed would be almost as...
These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques....
cena: 203,13

 Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers Hong, Seokhie 9783642138577 Not Avail
Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers

ISBN: 9783642138577 / Angielski / Miękka / 385 str.

ISBN: 9783642138577/Angielski/Miękka/385 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Seokhie Hong; Tetsu Iwata
Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2002, theFSE workshophasbeensponsoredbythe InternationalAssociationfor Cryptologic Research (IACR). The ?rst FSE workshop was held in Cambridge, UK (1993), followed by workshops in Leuven, Belgium (1994), Cambridge, UK (1996), Haifa, Israel(1997), Paris, France(1998), Rome, Italy(1999), NewYork, USA (2000), Yokohama, Japan (2001), Leuven, Belgium (2002), Lund, Sweden (2003), New Delhi, India (2004), Paris, France (2005), Graz, Austria (2006),...
Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2...
cena: 203,13

 Digital Forensics and Cyber Crime: 4th International Conference, Icdf2c 2012, Lafayette, In, Usa, October 25-26, 2012, Revised Selected Papers Rogers, Marcus K. 9783642398902 Springer
Digital Forensics and Cyber Crime: 4th International Conference, Icdf2c 2012, Lafayette, In, Usa, October 25-26, 2012, Revised Selected Papers

ISBN: 9783642398902 / Angielski / Miękka / 329 str.

ISBN: 9783642398902/Angielski/Miękka/329 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcus K. Rogers; Kathryn C. Seigfried-Spellar
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA. The 20 papers in this volume are grouped in the following topical sections: cloud investigation; malware; behavioral; law; mobile device forensics; and cybercrime investigations.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber ...
cena: 203,13

 Security in Computing and Communications: International Symposium, Sscc 2013, Mysore, India, August 22-24, 2013. Proceedings Thampi, Sabu M. 9783642405754 Springer
Security in Computing and Communications: International Symposium, Sscc 2013, Mysore, India, August 22-24, 2013. Proceedings

ISBN: 9783642405754 / Angielski / Miękka / 404 str.

ISBN: 9783642405754/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sabu M. Thampi; Pradeep K. Atrey; Chun I. Fan
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, ...
cena: 203,13

 ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider 9783658033705 Springer Fachmedien Wiesbaden
ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference

ISBN: 9783658033705 / Angielski / Miękka / 282 str.

ISBN: 9783658033705/Angielski/Miękka/282 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Helmut Reimer;Norbert Pohlmann;Wolfgang Schneider

This book presents the most interesting talks given at ISSE 2013 the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:

- Cloud Security, Trust Services, eId & Access Management

- Human Factors, Awareness & Privacy, Regulations and Policies

- Security Management

- Cyber Security, Cybercrime, Critical Infrastructures

- Mobile Security & Applications

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective...

This book presents the most interesting talks given at ISSE 2013 the forum for the inter-disciplinary discussion of how to adequately secure electr...

cena: 203,13

Pierwsza Podprzednia  19  20  21  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia