• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5420

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Software Similarity and Classification Silvio Cesare Yang Xiang 9781447129080 Springer
Software Similarity and Classification

ISBN: 9781447129080 / Angielski / Miękka / 88 str.

ISBN: 9781447129080/Angielski/Miękka/88 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Silvio Cesare; Yang Xiang
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each...
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft...
cena: 203,61

 Step by Step Procedure: A little Handbook for System Administrator Kalingaraj, S. 9781461068303 Createspace
Step by Step Procedure: A little Handbook for System Administrator

ISBN: 9781461068303 / Angielski / Miękka / 368 str.

ISBN: 9781461068303/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Kalingaraj
How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students. Which might be really very helpful while they are sinking under pressure, this book includes with most common features which consists with four chapters. Chapter 01 includes Microsoft Windows default support tools and some third party tools used by a System administrator. Chapter 02 includes with most common windows boot errors and problems which we face today. Here I've explained you how to fix them and their causes to prevent it, with simple...
How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students...
cena: 144,32

 Cloud-Computing-Security Tiberiu Tajts 9781461194064 Createspace
Cloud-Computing-Security

ISBN: 9781461194064 / Angielski / Miękka / 354 str.

ISBN: 9781461194064/Angielski/Miękka/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tiberiu Tajts
Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * Proposed Cloud Computing Security Requirements Baseline * Reporting and Continuous Monitoring * Assessment and Authorization Process * Tools of Cloud Computing Risk Assessment * Conclusion * Abbreviations, Glossary and References
Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * ...
cena: 164,89

 Quantitative Security Risk Assessment of Enterprise Networks Xinming Ou Anoop Singhal 9781461418597 Springer
Quantitative Security Risk Assessment of Enterprise Networks

ISBN: 9781461418597 / Angielski / Miękka / 28 str.

ISBN: 9781461418597/Angielski/Miękka/28 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xinming Ou; Anoop Singhal
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "are we more secure than yesterday" or "how does the security of one network configuration compare with another one." In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring...
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of t...
cena: 203,61

 Spyware John M. Harkins 9781466221680 Createspace
Spyware

ISBN: 9781466221680 / Angielski / Miękka / 92 str.

ISBN: 9781466221680/Angielski/Miękka/92 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John M. Harkins
Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general, spyware comes secretly bundled within freeware and shareware software that is downloaded from the Internet. Spyware programs work in the background without your knowledge and collect essential information related to you. This may include your usernames, passwords, bank account numbers, and any other personal and confidential information. This information is usually sent to external sources for malicious purposes. Unlike viruses, spyware...
Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general...
cena: 82,34

 Disruptive Technologies, Innovation and Global Redesign: Emerging Implications Ekekwe, Ndubuisi 9781466601345 Information Science Reference
Disruptive Technologies, Innovation and Global Redesign: Emerging Implications

ISBN: 9781466601345 / Angielski / Twarda / 604 str.

ISBN: 9781466601345/Angielski/Twarda/604 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ndubuisi Ekekwe; Nazrul Islam
In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace affects the others. New technologies have emerged, transforming the ways we do business and, consequently, redesigning the world. Innovation in disruptive technologies pushes new and more agile firms to set new benchmarks and forces established companies to revisit existing models or re-invent themselves to stay competitive. Disruptive Technologies, Innovation and Global Redesign: Emerging Implications provides case studies as well as practical...
In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace ...
cena: 940,13

 Crime Prevention Technologies and Applications for Advancing Criminal Investigation Chang-Tsun Li 9781466617582 Information Science Reference
Crime Prevention Technologies and Applications for Advancing Criminal Investigation

ISBN: 9781466617582 / Angielski / Twarda / 350 str.

ISBN: 9781466617582/Angielski/Twarda/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chang-Tsun Li
The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer...
The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the m...
cena: 1018,47

 Ethical Impact of Technological Advancements and Applications in Society Rocci Luppicini 9781466617735 Information Science Reference
Ethical Impact of Technological Advancements and Applications in Society

ISBN: 9781466617735 / Angielski / Twarda / 358 str.

ISBN: 9781466617735/Angielski/Twarda/358 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rocci Luppicini
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer...
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, g...
cena: 1018,47

 Web and Information Security Elena Ferrari Bhavani Thuraisingham 9781591405887 IRM Press
Web and Information Security

ISBN: 9781591405887 / Angielski / Twarda / 318 str.

ISBN: 9781591405887/Angielski/Twarda/318 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elena Ferrari; Bhavani Thuraisingham
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. Web and Information Security is valuable as a...
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaini...
cena: 467,25

 Steganography Karen Bailey Kevin Curran 9781594576676 Booksurge Publishing
Steganography

ISBN: 9781594576676 / Angielski / Miękka / 120 str.

ISBN: 9781594576676/Angielski/Miękka/120 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karen Bailey; Kevin Curran
Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process which can be used for example by civil rights organizations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to...
Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be se...
cena: 41,19

 Software Security Engineering: Design & Applications Muthu Ramachandran 9781614701286 Nova Science Publishers Inc
Software Security Engineering: Design & Applications

ISBN: 9781614701286 / Angielski / Twarda / 272 str.

ISBN: 9781614701286/Angielski/Twarda/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Muthu Ramachandran
Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics as: systematic approaches to engineering; building and assuring software security throughout software lifecycle; software security based requirements engineering; and, design for software security.
Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics...
cena: 508,67

 Strategies for Trusted Identities & Infrastructure in Cyberspace Robert J Kask 9781614701743 Nova Science Publishers Inc
Strategies for Trusted Identities & Infrastructure in Cyberspace

ISBN: 9781614701743 / Angielski / Twarda / 147 str.

ISBN: 9781614701743/Angielski/Twarda/147 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert J Kask
Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the national strategies for cyberspace policy review and trusted identities in cyberspace striving to enhance online choice, efficiency, security and privacy.
Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the nationa...
cena: 673,26

 Cryptography: Protocols, Design & Applications Kamol Lek, Naruemol Rajapakse 9781621007791 Nova Science Publishers Inc
Cryptography: Protocols, Design & Applications

ISBN: 9781621007791 / Angielski / Twarda / 242 str.

ISBN: 9781621007791/Angielski/Twarda/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kamol Lek;Naruemol Rajapakse
cena: 1023,70

 Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings John S. Baras, Jonathan Katz, Eitan Altman 9783642252792 Springer-Verlag Berlin and Heidelberg GmbH &
Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings

ISBN: 9783642252792 / Angielski / Miękka / 259 str.

ISBN: 9783642252792/Angielski/Miękka/259 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John S. Baras;Jonathan Katz;Eitan Altman
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in ...
cena: 203,61

 Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP Eric Quinton 9781785482281 Iste Press - Elsevier
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP

ISBN: 9781785482281 / Angielski / Twarda / 224 str.

ISBN: 9781785482281/Angielski/Twarda/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Quinton

Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common...

Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science stude...

cena: 448,88

 Security for Mobility  9780863413377 Institution of Engineering and Technology
Security for Mobility

ISBN: 9780863413377 / Angielski / Twarda / 466 str.

ISBN: 9780863413377/Angielski/Twarda/466 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blurred, the security both of the information handled by these devices and the devices themselves becomes increasingly important. The book covers many aspects of security for mobility including current developments, underlying technologies, network security, mobile code issues, application security and the future.
As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blu...
cena: 578,55

 Error-Correcting Codes, Finite Geometries and Cryptography  9780821849569 American Mathematical Society
Error-Correcting Codes, Finite Geometries and Cryptography

ISBN: 9780821849569 / Angielski / Miękka / 244 str.

ISBN: 9780821849569/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are new contributions on privacy reconciliation, resilient functions, cryptographic hash functions, and new work on quantum coins. Related original work in finite geometries concerns two-weight codes coming from partial spreads, (0,1) matrices with forbidden configurations, AndrU embeddings, and...
The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block desi...
cena: 553,61

 
Applied Cryptology, Cryptographic Protocols, and Computer Security Models

ISBN: 9780821800416 / Angielski / Miękka / 192 str.

ISBN: 9780821800416/Angielski/Miękka/192 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
cena: 533,66

 Non-commutative Cryptography and Complexity of Group-theoretic Problems  9780821853603 American Mathematical Society
Non-commutative Cryptography and Complexity of Group-theoretic Problems

ISBN: 9780821853603 / Angielski / Twarda / 413 str.

ISBN: 9780821853603/Angielski/Twarda/413 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. In particular, a lot...
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, ...
cena: 548,63

 Principles of Memory Dump Analysis: The Collected Seminars  9781906717667 Opentask
Principles of Memory Dump Analysis: The Collected Seminars

ISBN: 9781906717667 / Angielski / Miękka / 284 str.

ISBN: 9781906717667/Angielski/Miękka/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This is a collection of Software Diagnostics Services webinar transcripts about memory dump analysis methodology developed by Software Diagnostics Institute. Includes 6 seminars on physical memory dump analysis, cloud memory dump analysis, patterns, tools, processes and best practices for software trace and memory dump analysis, pattern-oriented software forensics, a pattern language for memory forensics, and mobile software diagnostics.
This is a collection of Software Diagnostics Services webinar transcripts about memory dump analysis methodology developed by Software Diagnostics Ins...
cena: 439,82

Pierwsza Podprzednia  25  26  27  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia