![]() |
Wordpress 3 Ultimate Security
ISBN: 9781849512107 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection...
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hun...
|
cena:
241,86 |
![]() |
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition
ISBN: 9783642198984 / Angielski / Twarda / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal characteristics. This work develops an integrated approach for speech and speaker recognition in order to gain space for self-learning opportunities of the system. This work introduces a reliable speaker identification which enables the speech recognizer to create robust speaker dependent models In addition, this book gives a new approach to solve the reverse problem, how to improve speech recognition if speakers can be recognized. The speaker... Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal charact... |
cena:
407,25 |
![]() |
Secure Cloud Computing
ISBN: 9781461492771 / Angielski / Twarda / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters...
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical consideratio...
|
cena:
407,25 |
![]() |
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models
ISBN: 9781492160366 / Angielski / Miękka / 152 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their...
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism a...
|
cena:
69,89 |
![]() |
Introduction to Computer Forensics: With 33 Real Life Cases
ISBN: 9781460970850 / Angielski / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensics but who desires to learn about it. The book is a quick read but covers the basics of computer forensics in a thorough and easily understood manner., The book does not disappoint the reader. It is punctuated throughout with fascinating real life anecdotes from real life court cases in which computer forensics proved instrumental in resolving a crime or an alleged civil wrongdoing. Beyond the basics, the book goes on to describe how computer...
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensic...
|
cena:
82,26 |
![]() |
Cyber Law
ISBN: 9781449977863 / Angielski / Miękka / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
44,94 |
![]() |
Information Theoretic Security: 5th International Conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, Proceedings
ISBN: 9783642207273 / Angielski / Miękka / 227 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics,... This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlan...
|
cena:
203,61 |
![]() |
It-Notfallmanagement Mit System: Notfälle Bei Der Informationsverarbeitung Sicher Beherrschen
ISBN: 9783834812889 / Niemiecki / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Jedes Unternehmen und jede Behorde kann von IT-Notfallen betroffen sein und dadurch massive Verluste erleiden. Welche praventiven Manahmen auch immer ergriffen werden: Notfalle kann man prinzipiell nicht ausschlieen. Hierfur gilt es, eine schlagkraftige Notfallorganisation aufzubauen, Notfalltraining durchzufuhren und bei Eintritt eines Notfalls zielgerichtet und effektiv zu handeln. Im Buch werden nach einem Praxisbericht u. a. folgende Themen behandelt: Business Impact Analysis, Business Continuity nach ISO 27001, Notfallvorsorge nach IT-Grundschutz, Notfall-Leitlinie, Notfallorganisation,...
Jedes Unternehmen und jede Behorde kann von IT-Notfallen betroffen sein und dadurch massive Verluste erleiden. Welche praventiven Manahmen auch immer ...
|
cena:
209,31 |
![]() |
It-Sicherheit Zwischen Regulierung Und Innovation: Tagungsband Zur Zweiten Eict-Konferenz It-Sicherheit
ISBN: 9783834817297 / Niemiecki / Miękka / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
144,59 |
![]() |
Handbook of Face Recognition
ISBN: 9780857299314 / Angielski / Twarda / 699 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The history of computer-aided face recognition dates back to the 1960s, yet the problem of automatic face recognition a task that humans perform routinely and effortlessly in our daily lives still poses great challenges, especially in unconstrained conditions. This highly anticipated new edition of the Handbook of Face Recognition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational face recognition systems. After a thorough introductory chapter, each of the following 26 chapters focus... The history of computer-aided face recognition dates back to the 1960s, yet the problem of automatic face recognition a task that humans perform ro... |
cena:
896,01 |
![]() |
Trust, Privacy, and Security in Digital Business: 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings
ISBN: 9783642403422 / Angielski / Miękka / 199 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive...
This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in P...
|
cena:
187,35 |
![]() |
Advances in Security of Information and Communication Networks: First International Conference, Secnet 2013, Cairo, Egypt, September 3-5, 2013. Procee
ISBN: 9783642405969 / Angielski / Miękka / 249 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, S... |
cena:
203,61 |
![]() |
Science of Cybersecurity & a Roadmap to Research
ISBN: 9781612098265 / Angielski / Twarda / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Examines the cybersecurity research roadmap in order to define a national R&D agenda that is required to enable us to get ahead of our adversaries and produce the technologies that can protect our information systems and networks into the future.
Examines the cybersecurity research roadmap in order to define a national R&D agenda that is required to enable us to get ahead of our adversaries and...
|
cena:
927,62 |
![]() |
Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
ISBN: 9783642257032 / Angielski / Miękka / 155 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Dundee, UK, in June 2010.
This volume constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Du...
|
cena:
203,61 |
![]() |
Integrating Security and Software Engineering : Advances and Future Vision
ISBN: 9781599041483 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. ""Integrating Security and Software Engineering: Advances and Future Vision"" discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and softw...
|
cena:
420,00 |
![]() |
Critical Infrastructure Security: Assessment, Prevention, Detection, Response
ISBN: 9781845645625 / Angielski / Twarda / 326 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, this text addresses both logical and physical aspects from an engineering point of view. Can be used as a self-contained reference handbook for practitioners and researchers or even as a textbook for master/doctoral degree students.
A comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, this text addresses both logical and physical aspe...
|
cena:
1235,90 |
![]() |
Computer Terrorism
ISBN: 9781105222894 / Angielski / Miękka / 202 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Nearly 20 years ago, in December 1992, I submitted this research in partial fulfillment of a requirement for my Doctor of Philosophy degree in Security Administration at Southwest University located in Kenner (New Orleans), LA. The title of my research was initially called "Terrorist and Hostile Intelligence Actions Against Computer Resources." Much of what I said 20 years ago still rings true today: the terrorists are getting smarter and the proliferation of viruses and their use by foreign countries and in wartime situations comes to mind. This book is basically divided into four sections:...
Nearly 20 years ago, in December 1992, I submitted this research in partial fulfillment of a requirement for my Doctor of Philosophy degree in Securit...
|
cena:
129,75 |
![]() |
Cyberlibel: Information Warfare in the 21st Century?
ISBN: 9781552212035 / Angielski / Miękka / 517 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus on how individuals and organizations can gain the upper hand in safeguarding - or restoring - their reputation once it's assaulted on the Internet. The book examines caselaw from all common law jurisdictions including Canada, the US, the UK, and Australia and provides practical strategies that can be used in defamation actions related to the Internet. Cyberlibel: Information Warfare in the 21st Century? includes the following topics in... Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus... |
cena:
234,41 |
![]() |
The Lottery Industry: : Cases, Problems & Preventable Incidents
ISBN: 9781419606878 / Angielski / Miękka / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lottery Industry: Cases, Problems, and Preventable Incidents has something for you. From con artists to bogus drawings, from insider fraud to operational mishaps, and from dying satellites to rogue grandmothers-this book is packed with headaches faced by CEOs of lotteries around the world.
Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lotter...
|
cena:
41,19 |
![]() |
PRAGMATIC Security Metrics: Applying Metametrics to Information Security
ISBN: 9781439881521 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to...Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, P... |
cena:
698,25 |