• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5420

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Safe Comp 97: The 16th International Conference on Computer Safety, Reliability and Security Daniel, Peter 9783540761914 Springer
Safe Comp 97: The 16th International Conference on Computer Safety, Reliability and Security

ISBN: 9783540761914 / Angielski / Miękka / 381 str.

ISBN: 9783540761914/Angielski/Miękka/381 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
P. Daniel; Peter Daniel
Contains the proceedings of the 16th International Conference on Computer Safety, Reliability and Security. Topics included are: safe software; security; human factors; guidelines, standards and certification; applications and industrial experience; and testing, validation and verification.
Contains the proceedings of the 16th International Conference on Computer Safety, Reliability and Security. Topics included are: safe software; securi...
cena: 407,25

 Post-Quantum Cryptography: Third International Workshop, Pqcrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings Sendrier, Nicolas 9783642129285 Not Avail
Post-Quantum Cryptography: Third International Workshop, Pqcrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings

ISBN: 9783642129285 / Angielski / Miękka / 241 str.

ISBN: 9783642129285/Angielski/Miękka/241 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nicolas Sendrier
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor, Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer, SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary...
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. S...
cena: 203,61

 Building Secure Defenses Against Code-Reuse Attacks Lucas Davi Ahmad-Reza Sadeghi 9783319255446 Springer
Building Secure Defenses Against Code-Reuse Attacks

ISBN: 9783319255446 / Angielski / Miękka / 74 str.

ISBN: 9783319255446/Angielski/Miękka/74 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lucas Davi; Ahmad-Reza Sadeghi

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time...

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks an...

cena: 203,61

 A Pathology of Computer Viruses David Ferbrache 9783540196105 Springer
A Pathology of Computer Viruses

ISBN: 9783540196105 / Angielski / Miękka / 306 str.

ISBN: 9783540196105/Angielski/Miękka/306 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Ferbrache
The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS,...
The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The compu...
cena: 203,61

 Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information Rosenberg, John 9783540196464 Springer
Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information

ISBN: 9783540196464 / Angielski / Miękka / 394 str.

ISBN: 9783540196464/Angielski/Miękka/394 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Rosenberg; J. Leslie Keedy
During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture. Although we had previously worked together for more than a decade in Australia we had not seen each other for over a year, following my move to Bremen in 1988. Meanwhile John was spending a year on study leave at the University of St. Andrews in Scotland with Professor Ron Morrison and his persistent programming research group. From our conversations it was quite clear that John was having a most fruitful time in St. Andrews and was gaining valuable new insights into the...
During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture. Although we had previously...
cena: 203,61

 Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, Usa, 26 Thuraisingham, Bhavani 9783540198772 Springer
Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, Usa, 26

ISBN: 9783540198772 / Angielski / Miękka / 237 str.

ISBN: 9783540198772/Angielski/Miękka/237 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bhavani Thuraisingham; Ravi Sandhu; T. C. Ting
This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 September 1993. The workshop addressed the issue of how to introduce an acceptable level of security into object-oriented systems, as the use of such systems becomes increasingly widespread. The topic is approached from two different, but complementary, viewpoints: the incorporation of security into object-oriented systems, and the use of object-oriented design and modelling techniques for designing secure applications. The papers cover a variety of...
This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 Septembe...
cena: 203,61

 E-mail Security: A Pocket Guide It Governance Publishing 9781849280969 IT Governance
E-mail Security: A Pocket Guide

ISBN: 9781849280969 / Miękka / 118 str.

ISBN: 9781849280969/Miękka/118 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Furnell; Paul Dowland
This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of email.
This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial a...
cena: 70,06

 Security Sound Bites: Important Ideas About Security from Smart-Ass, Dumb-Ass, & Kick-Ass Quotations (2nd Edition) Johnston, Roger G. 9781460987384 Createspace
Security Sound Bites: Important Ideas About Security from Smart-Ass, Dumb-Ass, & Kick-Ass Quotations (2nd Edition)

ISBN: 9781460987384 / Angielski / Miękka / 224 str.

ISBN: 9781460987384/Angielski/Miękka/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roger G. Johnston
This is the revised and expanded 2nd edition of a book that Security Magazine called "fascinating" and "full of thought triggers." Security Sound Bites offers quotes, observations, and anecdotes about security that'll make you think and make you laugh. We hear from the likes of Britney Spears and Albert Einstein, B movie dialog through ancient Greek dead guys, John Locke to Dan Quayle. Whether you're a cop, security officer, IT professional, security sales person, technician, government employee, or security manager, you'll find food for thought in this unique book. These quirky quotations...
This is the revised and expanded 2nd edition of a book that Security Magazine called "fascinating" and "full of thought triggers." Security Sound Bite...
cena: 69,89

 Biometrics and ID Management: COST 2101 European Workshop, BioID 2011, Brandenburg (Havel), March 8-10, 2011, Proceedings Claus Vielhauer, Jana Dittmann, Andrzej Drygajlo, Niels Christian Juul, Michae Fairhurst 9783642195297 Springer-Verlag Berlin and Heidelberg GmbH &
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011, Brandenburg (Havel), March 8-10, 2011, Proceedings

ISBN: 9783642195297 / Angielski / Miękka / 299 str.

ISBN: 9783642195297/Angielski/Miękka/299 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claus Vielhauer;Jana Dittmann;Andrzej Drygajlo
This book constitutes the thoroughly refereed proceedings of the COST 2101 International Workshop, BIOID 2011, held in Brandenburg (Havel), Germany, in March 2011. The 25 revised full papers presented were carefully reviewed and selected from numerous submissions and are completed by an introduction on COST. The papers are organized in topical main sections on theory andsystems, handwriting authentication, speaker authentication, face recognition, multibiometric authentication, and on biometrics and forensics.
This book constitutes the thoroughly refereed proceedings of the COST 2101 International Workshop, BIOID 2011, held in Brandenburg (Havel), Germany, i...
cena: 203,61

 IBM Websphere Application Server V7.0 Security Siliceo, Omar 9781849681483 Packt Publishing
IBM Websphere Application Server V7.0 Security

ISBN: 9781849681483 / Angielski / Miękka / 312 str.

ISBN: 9781849681483/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Omar Siliceo
Secure your WebSphere applications with Java EE and JAAS security standardsDiscover the salient and new security features offered by WebSphere Application Server version 7.0 to create secure installationsExplore and learn how to secure Application Servers, Java Applications, and EJB Applications along with setting up user authentication and authorizationWith the help of extensive hands-on exercises and mini-projects, explore the various aspects needed to produce secure IBM WebSphere Application Server Network Deployment v7.0 infrastructuresA practical reference with ready-to-implement best...
Secure your WebSphere applications with Java EE and JAAS security standardsDiscover the salient and new security features offered by WebSphere Applica...
cena: 268,24

 Cloud Storage Forensics Choo, Raymond Quick, Darren Martini, Ben 9780124199705 Elsevier Science
Cloud Storage Forensics

ISBN: 9780124199705 / Angielski / Miękka / 189 str.

ISBN: 9780124199705/Angielski/Miękka/189 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing.

Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors...

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology ...

cena: 254,31

 Neuroimmunology of Sleep S. R. Pandi-Perumal Daniel P. Cardinali Georgios Chrousos 9781441943408 Not Avail
Neuroimmunology of Sleep

ISBN: 9781441943408 / Angielski / Miękka / 362 str.

ISBN: 9781441943408/Angielski/Miękka/362 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ed. S. R. Pandi-Perumal; Daniel P. Cardinali; Georgios Chrousos

This timely work reflects the growing importance of research into the nature of sleep and its medical aspects. One of the first of its kind, this work on the neuroimmunology of sleep provides an introduction to the interplay between these two key and interlinked areas. Written both from a basic and a clinical perspective, the volume is an invaluable information resource for biomedical professionals and students of the human biology.

Highly practical guide written from both a basic and clinical perspective.


This timely work reflects the growing importance of research into the nature of sleep and its medical aspects. One of the first of its kind, this w...

cena: 733,09

 A Bug Hunter's Diary Tobias Klein 9781593273859 No Starch Press,US
A Bug Hunter's Diary

ISBN: 9781593273859 / Angielski / Miękka / 200 str.

ISBN: 9781593273859/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tobias Klein
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.

A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs--or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical...

Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on...
cena: 208,66

 Application Security in the ISO 27001: 2013 Environment Vinod Vasudevan 9781849287678 Itgp
Application Security in the ISO 27001: 2013 Environment

ISBN: 9781849287678 / Angielski / Miękka / 262 str.

ISBN: 9781849287678/Angielski/Miękka/262 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vinod Vasudevan
Web application security as part of an ISO27001-compliant information security management system As cyber security threats proliferate and attacks escalate, and as applications play an increasingly critical role in business, organisations urgently need to focus on web application security to protect their customers, their interests and their assets. SMEs in particular should be very concerned about web application security: many use common, off-the-shelf applications and plugins - such as Internet Explorer, Java, Silverlight, and Adobe Reader and Flash Player - which often contain exploitable...
Web application security as part of an ISO27001-compliant information security management system As cyber security threats proliferate and attacks esc...
cena: 206,13

 Continuous Authentication Using Biometrics: Data, Models, and Metrics Traore, Issa 9781613501290 Information Science Publishing
Continuous Authentication Using Biometrics: Data, Models, and Metrics

ISBN: 9781613501290 / Angielski / Twarda / 296 str.

ISBN: 9781613501290/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Issa Traore; Ahmed Awad E. Ahmed
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the...
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services...
cena: 1018,47

 Network Control and Engineering for Qos, Security and Mobility, V: Ifip 19th World Computer Congress, Tc-6, 5th Ifip International Conference on Netwo Gaiti, Dominique 9781441941930 Springer
Network Control and Engineering for Qos, Security and Mobility, V: Ifip 19th World Computer Congress, Tc-6, 5th Ifip International Conference on Netwo

ISBN: 9781441941930 / Angielski / Miękka / 236 str.

ISBN: 9781441941930/Angielski/Miękka/236 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dominique Gaiti
The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of improvements in data transmission technologies with the intention of satisfying the increasing demand for bandwidth. So far as optical networking is concerned, WDM (Wavelength Division Multiplexing) appears as the main advance in the transmission area, because it allows transmission rates near to the theoretical limit of optical fibers, of the order of dozens of terabits a second 1]. An essential issue in optical network design is defining how...
The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of...
cena: 407,25

 Computational Intelligence in Security for Information Systems: 4th International Conference, Cisis 2011, Held at Iwann 2011, Torremolinos-Málaga, Spa Herrero, Álvaro 9783642213229 Not Avail
Computational Intelligence in Security for Information Systems: 4th International Conference, Cisis 2011, Held at Iwann 2011, Torremolinos-Málaga, Spa

ISBN: 9783642213229 / Angielski / Miękka / 310 str.

ISBN: 9783642213229/Angielski/Miękka/310 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lvaro Herrero; Emilio Corchado
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Malaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods...
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, ...
cena: 203,61

 Healthy Passwords: Learn to make strong passwords you can remember Klein, Ken S. 9780615456850 Sustainable Alternatives, LLC
Healthy Passwords: Learn to make strong passwords you can remember

ISBN: 9780615456850 / Angielski / Miękka / 152 str.

ISBN: 9780615456850/Angielski/Miękka/152 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ken S. Klein
Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingredient list then use it to assemble different passwords for different sites. - Learn a way to have unique passwords that regularly change for all your sites. It doesn't matter if you have a dozen or a hundred site passwords to remember. - Learn how to secure the devices you use. You will learn how to use your computers / devices in ways that make it difficult for others to capture your passwords. Learn how to harden your home network to keep...
Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingr...
cena: 37,07

 Privacy and Big Data: The Players, Regulators, and Stakeholders Craig, Terence 9781449305000 O'Reilly Media
Privacy and Big Data: The Players, Regulators, and Stakeholders

ISBN: 9781449305000 / Angielski / Miękka / 108 str.

ISBN: 9781449305000/Angielski/Miękka/108 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Terence Craig; Mary E. Ludloff

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.

Personal data is the hottest commodity on the market today--truly more valuable than gold. We are the asset that every company, industry, non-profit, and government...

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints th...

cena: 83,95

 The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Marcus Pinto 9781118026472 John Wiley & Sons Inc
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

ISBN: 9781118026472 / Angielski / Miękka / 912 str.

ISBN: 9781118026472/Angielski/Miękka/912 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcus Pinto
The highly successful security book returns with a new edition, completely updated

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new...

The highly successful security book returns with a new edition, completely updated

Web applications are the front door to most organizations...

cena: 204,20

Pierwsza Podprzednia  22  23  24  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia