• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5420

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Applied Quantum Cryptography Christian Kollmitzer, Mario Pivk 9783642262678 Springer-Verlag Berlin and Heidelberg GmbH &
Applied Quantum Cryptography

ISBN: 9783642262678 / Angielski / Miękka / 230 str.

ISBN: 9783642262678/Angielski/Miękka/230 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christian Kollmitzer;Mario Pivk
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography - or better Quantum Key Distribution - was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone...
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely ...
cena: 305,43

 Mehr It-Sicherheit Durch Pen-Tests: Optimierung Der It-Sicherheit Durch Gelenktes
Mehr It-Sicherheit Durch Pen-Tests: Optimierung Der It-Sicherheit Durch Gelenktes "Hacking" -- Von Der Planung Über Die Vertragsgestaltung Zur Realisi

ISBN: 9783322802583 / Niemiecki / Miękka / 218 str.

ISBN: 9783322802583/Niemiecki/Miękka/218 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Enno Rey; Michael Thumann; Dominick Baier
Methodisch sauber eingesetztes Hacker-Wissen, das die Informationssicherheit Ihres Unternehmens erhohen soll.
So beauftragen Sie den "Hacker" Ihrer Wahl, bevor es unerlaubt jemand anderes tut. Mit diesem Buch erfahren Sie, wie es geht. Die Realisierung von Pen-Tests, die systematische Schwachstellenanalyse, die Wahl geeigneter Werkzeuge. Damit Sie im Ernstfall nicht als Verlierer dastehen: Von der Planung uber die Vertragsgestaltung bis hin zur Realisierung.
Methodisch sauber eingesetztes Hacker-Wissen, das die Informationssicherheit Ihres Unternehmens erhohen soll.
So beauftragen Sie den "Hacker" Ihre...
cena: 285,43

 Policing Cyber Hate, Cyber Threats and Cyber Terrorism Imran Awan Brian Blakemore  9781409438168 Ashgate Publishing Limited
Policing Cyber Hate, Cyber Threats and Cyber Terrorism

ISBN: 9781409438168 / Angielski / Twarda / 216 str.

ISBN: 9781409438168/Angielski/Twarda/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Imran Awan;Brian Blakemore
What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities that can be defined as cyber threats. It also shows how this activity forms in our communities and what can be done to try to prevent individuals from becoming cyber terrorists. This text will be of interest to academics, professionals and practitioners involved in building social capital; engaging with hard to reach individuals and...
What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cy...
cena: 798,00

 Intelligent Systems for Security Informatics Christopher C. Yang Wenji Mao Xiaolong Zheng 9780124047020 Academic Press
Intelligent Systems for Security Informatics

ISBN: 9780124047020 / Angielski / Twarda / 205 str.

ISBN: 9780124047020/Angielski/Twarda/205 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher C. Yang; Wenji Mao; Xiaolong Zheng

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.

The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation...

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope i...

cena: 433,91

 Blackhatonomics: An Inside Look at the Economics of Cybercrime Will Gragido John Pirc Nick Selby 9781597497404 Syngress Publishing
Blackhatonomics: An Inside Look at the Economics of Cybercrime

ISBN: 9781597497404 / Angielski / Miękka / 216 str.

ISBN: 9781597497404/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Will Gragido; John Pirc; Nick Selby

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive...

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources...

cena: 149,57

 Security in Cyberspace: Select Assessments & Policy Considerations Martin E Owens, Deborah R Simpson 9781622573493 Nova Science Publishers Inc
Security in Cyberspace: Select Assessments & Policy Considerations

ISBN: 9781622573493 / Angielski / Twarda / 190 str.

ISBN: 9781622573493/Angielski/Twarda/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin E Owens;Deborah R Simpson
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially. In the first quarter of this year, security experts were seeing almost 67,000 new malware threats on the Internet every day. This means more than 45 new viruses, worms, spy-ware and other threats were being created every minute. As these threats grow, security policy, technology and procedures need to evolve even faster to stay ahead of the...
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cy...
cena: 797,95

 Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática Castro Reynoso, Sergio 9781479122998 Createspace Independent Publishing Platform
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática

ISBN: 9781479122998 / Hiszpański / Miękka / 116 str.

ISBN: 9781479122998/Hiszpański/Miękka/116 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sergio Castro Reynoso
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas rapido posible los datos de su empresa u organizacion, utilizando 27 controles criticos. Es una metodologia 100% practica y enfocada a obtener resultados inmediatos."
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas ra...
cena: 53,39

 Sicherheitsaspekte in Der Informationstechnik: Proceedings Der 1. Deutschen Konferenz Über Computersicherheit Cerny, Dietrich 9783528051570 Vieweg+teubner Verlag
Sicherheitsaspekte in Der Informationstechnik: Proceedings Der 1. Deutschen Konferenz Über Computersicherheit

ISBN: 9783528051570 / Angielski / Miękka / 270 str.

ISBN: 9783528051570/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dietrich Cerny
Vorwort Der vorliegende Band enthalt die Vortragsmanuskripte der 1. Deutschen Konferenz tiber Computersicherheit, die vom 15.-16.Mai 1990 in Bonn stattfand. Die zweitagige Konferenz - die erste ihrer Art in der Bundes republik - hatte zum Ziel, die Offentlichkeit ftir die Probleme der Sicherheit in der Informationstechnik zu sensibilisieren und tiber diesbeztigliche Entwicklungen und Initiativen in der Bundes republrk zu informieren. Die Konferenz wurde gemeinsam von der ZSI ( Zentralstelle fUr Sicherheit in der Informationstechnik ) und der AFCEA Bonn e.V., einem Fachverband ftir Elektronik,...
Vorwort Der vorliegende Band enthalt die Vortragsmanuskripte der 1. Deutschen Konferenz tiber Computersicherheit, die vom 15.-16.Mai 1990 in Bonn stat...
cena: 209,31

 Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers Andreas U. Schmidt, Giovanni Russello, Iovannis Krontiris, Shiguro Lian 9783642333910 Springer-Verlag Berlin and Heidelberg GmbH &
Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers

ISBN: 9783642333910 / Angielski / Miękka / 131 str.

ISBN: 9783642333910/Angielski/Miękka/131 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas U. Schmidt;Giovanni Russello;Iovannis Krontiris
Constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012.
Constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Informat...
cena: 203,61

 Computerviren und ihre Vermeidung: Ein übersichtlicher, praxisorientierter Leitfaden für jeden PC-Anwender Howard Fuhs 9783528053192 Springer Fachmedien Wiesbaden
Computerviren und ihre Vermeidung: Ein übersichtlicher, praxisorientierter Leitfaden für jeden PC-Anwender

ISBN: 9783528053192 / Niemiecki / Miękka / 175 str.

ISBN: 9783528053192/Niemiecki/Miękka/175 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Howard Fuhs
Dieses Buch solI weder eine streng wissenschaftliche Abhandlung uber das Thema Computerviren darstellen, noch solI es Wege auf zeigen, wie solche Viren zu programmieren sind. Es solI auch nicht den "Mythos Computervirus" weiter nfihren. Vielmehr solI dieses Buch relativ leicht verstWldlich Informationen zum Thema Computerviren bereithalten und den Leser so umfassend uber dieses Thema informieren, daB der weitverbreitete Mythos des Computervirus durch eine sinnvolle Aufklarung der PC-Anwender und der Offentlichkeit abgebaut werden kann. Dieses Buch ist ebenso als Mittler zwischen den...
Dieses Buch solI weder eine streng wissenschaftliche Abhandlung uber das Thema Computerviren darstellen, noch solI es Wege auf zeigen, wie solche Vire...
cena: 209,31

 Hacking analysis and protection: Hacking analysis and protection methods Koumourou, Xenophon 9781463764944 Createspace Independent Publishing Platform
Hacking analysis and protection: Hacking analysis and protection methods

ISBN: 9781463764944 / Angielski / Miękka / 74 str.

ISBN: 9781463764944/Angielski/Miękka/74 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xenophon Koumourou
Anybody that is using a computer, from home user to professional IT expert, once connected to the Internet, becomes automatically a hacker's potential target. In this book various attacking tools and methods commonly used by the attackers, to compromise your computer or network are being described and analyzed. Finally some countermeasures are introduced in order to avoid being a victim of any kind of attacker. All the demonstrated further examples are run by the author of the book.
Anybody that is using a computer, from home user to professional IT expert, once connected to the Internet, becomes automatically a hacker's potential...
cena: 82,26

 Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation Schuckers, Michael E. 9781447125662 Springer
Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation

ISBN: 9781447125662 / Angielski / Miękka / 317 str.

ISBN: 9781447125662/Angielski/Miękka/317 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael E. Schuckers
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of...
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across t...
cena: 610,90

 Transactions on Large-Scale Data- and Knowledge-Centered Systems VI: Special Issue on Database- and Expert-Systems Applications Abdelkader Hameurlain, Josef Küng, Roland Wagner, Stephen W. Liddle, Klaus-Dieter Schewe, Xiaofang Zhou 9783642341786 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Large-Scale Data- and Knowledge-Centered Systems VI: Special Issue on Database- and Expert-Systems Applications

ISBN: 9783642341786 / Angielski / Miękka / 259 str.

ISBN: 9783642341786/Angielski/Miękka/259 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelkader Hameurlain;Josef Kung;Roland Wagner
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high...
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge proce...
cena: 203,61

 The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules John J. Trincke 9781466507678 Auerbach Publications
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

ISBN: 9781466507678 / Angielski / Twarda / 472 str.

ISBN: 9781466507678/Angielski/Twarda/472 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John J. Trinckes Jr

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices.

The book is designed to assist you in reviewing the accessibility of electronic protected health information (EPHI) to make certain that it is not altered or destroyed in an unauthorized manner, and that it is available as needed only by authorized individuals...

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring complianc...

cena: 673,31

 Federal Cybersecurity Planning: Human Capital & Research & Development Kurk C Moore, Marion D Taylor 9781619427693 Nova Science Publishers Inc
Federal Cybersecurity Planning: Human Capital & Research & Development

ISBN: 9781619427693 / Angielski / Miękka / 100 str.

ISBN: 9781619427693/Angielski/Miękka/100 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kurk C Moore;Marion D Taylor
Edited, reformatted and augmented versions of two GAO reports from 2010-2011.
Edited, reformatted and augmented versions of two GAO reports from 2010-2011.
cena: 309,17

 It-Sicherheit Kompakt Und Verständlich: Eine Praxisorientierte Einführung Witt, Bernhard C. 9783834801401 Vieweg+teubner Verlag
It-Sicherheit Kompakt Und Verständlich: Eine Praxisorientierte Einführung

ISBN: 9783834801401 / Niemiecki / Miękka / 205 str.

ISBN: 9783834801401/Niemiecki/Miękka/205 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bernhard C. Witt
Das vorliegende Buch "IT-Sicherheit kompakt und verstandlich" basiert auf meiner Lehrveranstaltung zu den "Grundlagen des Datenschutzes und der IT-Sicherheit" im Hauptstudium der Inf- matik-Studiengange bzw. dem dazugehorigen Masterprogramm an der Universitat Ulm. Meine Lehrveranstaltung wie auch dieses Buch sollen dazu - fahigen, tagliche Anforderungen der Berufspraxis im Bereich der IT-Sicherheit meistern zu konnen. Da aktuelle Entwicklungen verschiedene zu bewaltigende Aufgaben stellen, wird ein f- diertes Uberblickswissen und die Kenntnis, grundlegende Met- den auf neue Probleme...
Das vorliegende Buch "IT-Sicherheit kompakt und verstandlich" basiert auf meiner Lehrveranstaltung zu den "Grundlagen des Datenschutzes und der IT-Sic...
cena: 133,18

 Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission Julie C Hartell 9781626183902 Nova Science Publishers Inc
Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission

ISBN: 9781626183902 / Angielski / Miękka / 81 str.

ISBN: 9781626183902/Angielski/Miękka/81 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Julie C Hartell
cena: 423,89

 Steganography & Watermarking Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang 9781626183131 Nova Science Publishers Inc
Steganography & Watermarking

ISBN: 9781626183131 / Angielski / Twarda / 363 str.

ISBN: 9781626183131/Angielski/Twarda/363 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ching-Nung Yang;Chia-Chen Lin;Chin-Chen Chang
cena: 1261,79

 Cyberspace and Security: A Fundamentally New Approach Victor Sheymov 9780985893002 Cyber Books Publishing
Cyberspace and Security: A Fundamentally New Approach

ISBN: 9780985893002 / Angielski / Miękka / 212 str.

ISBN: 9780985893002/Angielski/Miękka/212 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Victor Sheymov
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes us to catastrophic failure. This book clarifies shows how the security methods we have designed for the physical world are futile in cyberspace. If we want effective cybersecurity we need to understand the real and different nature of cyberspace, and the decision makers and security professionals have to understand the laws and rules of cyberspace and why and how they work in cybersecurity. Victor Sheymov's comprehensive multi-disciplinary...
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes...
cena: 115,46

 Comp Arch Security C Wang, Shuangbao Paul 9781118168813 John Wiley & Sons
Comp Arch Security C

ISBN: 9781118168813 / Angielski / Twarda / 360 str.

ISBN: 9781118168813/Angielski/Twarda/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shuangbao Wang; Robert S. Ledley; Shuangbao Paul Wang
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a...
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides...

cena: 611,13

Pierwsza Podprzednia  25  26  27  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia