• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5420

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Wordpress 3 Ultimate Security Connelly, Olly 9781849512107 Packt Publishing
Wordpress 3 Ultimate Security

ISBN: 9781849512107 / Angielski / Miękka / 408 str.

ISBN: 9781849512107/Angielski/Miękka/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Olly Connelly
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection...
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hun...
cena: 241,86

 Self-Learning Speaker Identification: A System for Enhanced Speech Recognition Herbig, Tobias 9783642198984 Springer
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition

ISBN: 9783642198984 / Angielski / Twarda / 172 str.

ISBN: 9783642198984/Angielski/Twarda/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tobias Herbig; Franz Gerl

Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal characteristics. This work develops an integrated approach for speech and speaker recognition in order to gain space for self-learning opportunities of the system. This work introduces a reliable speaker identification which enables the speech recognizer to create robust speaker dependent models In addition, this book gives a new approach to solve the reverse problem, how to improve speech recognition if speakers can be recognized. The speaker...

Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal charact...

cena: 407,25

 Secure Cloud Computing Sushil Jajodia Krishna Kant Pierangela Samarati 9781461492771 Springer
Secure Cloud Computing

ISBN: 9781461492771 / Angielski / Twarda / 343 str.

ISBN: 9781461492771/Angielski/Twarda/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Krishna Kant; Pierangela Samarati
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters...
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical consideratio...
cena: 407,25

 Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models Rehman, Rafeeq U. 9781492160366 Createspace
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models

ISBN: 9781492160366 / Angielski / Miękka / 152 str.

ISBN: 9781492160366/Angielski/Miękka/152 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rafeeq U. Rehman
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their...
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism a...
cena: 69,89

 Introduction to Computer Forensics: With 33 Real Life Cases MR Gordon E. Pelton 9781460970850 Createspace
Introduction to Computer Forensics: With 33 Real Life Cases

ISBN: 9781460970850 / Angielski / Miękka / 180 str.

ISBN: 9781460970850/Angielski/Miękka/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
MR Gordon E. Pelton
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensics but who desires to learn about it. The book is a quick read but covers the basics of computer forensics in a thorough and easily understood manner., The book does not disappoint the reader. It is punctuated throughout with fascinating real life anecdotes from real life court cases in which computer forensics proved instrumental in resolving a crime or an alleged civil wrongdoing. Beyond the basics, the book goes on to describe how computer...
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensic...
cena: 82,26

 Cyber Law MR Anupa P. Kumar 9781449977863 Createspace
Cyber Law

ISBN: 9781449977863 / Angielski / Miękka / 118 str.

ISBN: 9781449977863/Angielski/Miękka/118 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
MR Anupa P. Kumar
cena: 44,94

 Information Theoretic Security: 5th International Conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, Proceedings Fehr, Serge 9783642207273 Springer
Information Theoretic Security: 5th International Conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, Proceedings

ISBN: 9783642207273 / Angielski / Miękka / 227 str.

ISBN: 9783642207273/Angielski/Miękka/227 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Serge Fehr
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics,...
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlan...
cena: 203,61

 It-Notfallmanagement Mit System: Notfälle Bei Der Informationsverarbeitung Sicher Beherrschen Klett, Gerhard 9783834812889 Vieweg+Teubner
It-Notfallmanagement Mit System: Notfälle Bei Der Informationsverarbeitung Sicher Beherrschen

ISBN: 9783834812889 / Niemiecki / Miękka / 200 str.

ISBN: 9783834812889/Niemiecki/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerhard Klett; Klaus-Werner Schröder; Heinrich Kersten
Jedes Unternehmen und jede Behorde kann von IT-Notfallen betroffen sein und dadurch massive Verluste erleiden. Welche praventiven Manahmen auch immer ergriffen werden: Notfalle kann man prinzipiell nicht ausschlieen. Hierfur gilt es, eine schlagkraftige Notfallorganisation aufzubauen, Notfalltraining durchzufuhren und bei Eintritt eines Notfalls zielgerichtet und effektiv zu handeln. Im Buch werden nach einem Praxisbericht u. a. folgende Themen behandelt: Business Impact Analysis, Business Continuity nach ISO 27001, Notfallvorsorge nach IT-Grundschutz, Notfall-Leitlinie, Notfallorganisation,...
Jedes Unternehmen und jede Behorde kann von IT-Notfallen betroffen sein und dadurch massive Verluste erleiden. Welche praventiven Manahmen auch immer ...
cena: 209,31

 It-Sicherheit Zwischen Regulierung Und Innovation: Tagungsband Zur Zweiten Eict-Konferenz It-Sicherheit Bub, Udo 9783834817297 Vieweg+Teubner
It-Sicherheit Zwischen Regulierung Und Innovation: Tagungsband Zur Zweiten Eict-Konferenz It-Sicherheit

ISBN: 9783834817297 / Niemiecki / Miękka / 242 str.

ISBN: 9783834817297/Niemiecki/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
cena: 144,59

 Handbook of Face Recognition  9780857299314 Springer, Berlin
Handbook of Face Recognition

ISBN: 9780857299314 / Angielski / Twarda / 699 str.

ISBN: 9780857299314/Angielski/Twarda/699 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The history of computer-aided face recognition dates back to the 1960s, yet the problem of automatic face recognition a task that humans perform routinely and effortlessly in our daily lives still poses great challenges, especially in unconstrained conditions.

This highly anticipated new edition of the Handbook of Face Recognition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational face recognition systems. After a thorough introductory chapter, each of the following 26 chapters focus...

The history of computer-aided face recognition dates back to the 1960s, yet the problem of automatic face recognition a task that humans perform ro...

cena: 896,01

 Trust, Privacy, and Security in Digital Business: 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings Steven Furnell, Costas Lambrinoudakis, Javier López 9783642403422 Springer-Verlag Berlin and Heidelberg GmbH &
Trust, Privacy, and Security in Digital Business: 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings

ISBN: 9783642403422 / Angielski / Miękka / 199 str.

ISBN: 9783642403422/Angielski/Miękka/199 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Furnell;Costas Lambrinoudakis;Javier Lopez
This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive...
This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in P...
cena: 187,35

 Advances in Security of Information and Communication Networks: First International Conference, Secnet 2013, Cairo, Egypt, September 3-5, 2013. Procee Awad, Ali Ismail 9783642405969 Springer
Advances in Security of Information and Communication Networks: First International Conference, Secnet 2013, Cairo, Egypt, September 3-5, 2013. Procee

ISBN: 9783642405969 / Angielski / Miękka / 249 str.

ISBN: 9783642405969/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ali Ismael Awad; Aboul Ella Hassanien; Kensuke Baba

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.


This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, S...

cena: 203,61

 Science of Cybersecurity & a Roadmap to Research Benjamin J Colfer 9781612098265 Nova Science Publishers Inc
Science of Cybersecurity & a Roadmap to Research

ISBN: 9781612098265 / Angielski / Twarda / 198 str.

ISBN: 9781612098265/Angielski/Twarda/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Benjamin J Colfer
Examines the cybersecurity research roadmap in order to define a national R&D agenda that is required to enable us to get ahead of our adversaries and produce the technologies that can protect our information systems and networks into the future.
Examines the cybersecurity research roadmap in order to define a national R&D agenda that is required to enable us to get ahead of our adversaries and...
cena: 927,62

 Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers Lachlan MacKinnon 9783642257032 Springer-Verlag Berlin and Heidelberg GmbH &
Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

ISBN: 9783642257032 / Angielski / Miękka / 155 str.

ISBN: 9783642257032/Angielski/Miękka/155 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lachlan MacKinnon
This volume constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Dundee, UK, in June 2010.
This volume constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Du...
cena: 203,61

 Integrating Security and Software Engineering : Advances and Future Vision Mouratidis Haralambos Paolo Giorgini  9781599041483 IGI Publishing
Integrating Security and Software Engineering : Advances and Future Vision

ISBN: 9781599041483 / Angielski

ISBN: 9781599041483/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mouratidis Haralambos;Paolo Giorgini
Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. ""Integrating Security and Software Engineering: Advances and Future Vision"" discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and softw...
cena: 420,00

 Critical Infrastructure Security: Assessment, Prevention, Detection, Response Francesco Flammini 9781845645625 WIT Press
Critical Infrastructure Security: Assessment, Prevention, Detection, Response

ISBN: 9781845645625 / Angielski / Twarda / 326 str.

ISBN: 9781845645625/Angielski/Twarda/326 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Francesco Flammini
A comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, this text addresses both logical and physical aspects from an engineering point of view. Can be used as a self-contained reference handbook for practitioners and researchers or even as a textbook for master/doctoral degree students.
A comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, this text addresses both logical and physical aspe...
cena: 1235,90

 Computer Terrorism Douglas E Campbell, PH D 9781105222894 Lulu.com
Computer Terrorism

ISBN: 9781105222894 / Angielski / Miękka / 202 str.

ISBN: 9781105222894/Angielski/Miękka/202 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
PH D Douglas E Campbell
Nearly 20 years ago, in December 1992, I submitted this research in partial fulfillment of a requirement for my Doctor of Philosophy degree in Security Administration at Southwest University located in Kenner (New Orleans), LA. The title of my research was initially called "Terrorist and Hostile Intelligence Actions Against Computer Resources." Much of what I said 20 years ago still rings true today: the terrorists are getting smarter and the proliferation of viruses and their use by foreign countries and in wartime situations comes to mind. This book is basically divided into four sections:...
Nearly 20 years ago, in December 1992, I submitted this research in partial fulfillment of a requirement for my Doctor of Philosophy degree in Securit...
cena: 129,75

 Cyberlibel: Information Warfare in the 21st Century? David A Potts   9781552212035 Irwin Law
Cyberlibel: Information Warfare in the 21st Century?

ISBN: 9781552212035 / Angielski / Miękka / 517 str.

ISBN: 9781552212035/Angielski/Miękka/517 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David A Potts

Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus on how individuals and organizations can gain the upper hand in safeguarding - or restoring - their reputation once it's assaulted on the Internet.

The book examines caselaw from all common law jurisdictions including Canada, the US, the UK, and Australia and provides practical strategies that can be used in defamation actions related to the Internet.

Cyberlibel: Information Warfare in the 21st Century? includes the following topics in...

Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus...

cena: 234,41

 The Lottery Industry: : Cases, Problems & Preventable Incidents Delehanty, Herb 9781419606878 Booksurge Publishing
The Lottery Industry: : Cases, Problems & Preventable Incidents

ISBN: 9781419606878 / Angielski / Miękka / 156 str.

ISBN: 9781419606878/Angielski/Miękka/156 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Herb Delehanty
Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lottery Industry: Cases, Problems, and Preventable Incidents has something for you. From con artists to bogus drawings, from insider fraud to operational mishaps, and from dying satellites to rogue grandmothers-this book is packed with headaches faced by CEOs of lotteries around the world.
Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lotter...
cena: 41,19

 PRAGMATIC Security Metrics: Applying Metametrics to Information Security Brotby, W. Krag 9781439881521 Auerbach Publications
PRAGMATIC Security Metrics: Applying Metametrics to Information Security

ISBN: 9781439881521 / Angielski / Twarda / 512 str.

ISBN: 9781439881521/Angielski/Twarda/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. Krag Brotby; Gary Hinson

Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.

Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to...

Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, P...

cena: 698,25

Pierwsza Podprzednia  22  23  24  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia