![]() |
Applied Quantum Cryptography
ISBN: 9783642262678 / Angielski / Miękka / 230 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography - or better Quantum Key Distribution - was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone...
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely ...
|
cena:
305,43 |
![]() |
Mehr It-Sicherheit Durch Pen-Tests: Optimierung Der It-Sicherheit Durch Gelenktes "Hacking" -- Von Der Planung Über Die Vertragsgestaltung Zur Realisi
ISBN: 9783322802583 / Niemiecki / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Methodisch sauber eingesetztes Hacker-Wissen, das die Informationssicherheit Ihres Unternehmens erhohen soll.
So beauftragen Sie den "Hacker" Ihrer Wahl, bevor es unerlaubt jemand anderes tut. Mit diesem Buch erfahren Sie, wie es geht. Die Realisierung von Pen-Tests, die systematische Schwachstellenanalyse, die Wahl geeigneter Werkzeuge. Damit Sie im Ernstfall nicht als Verlierer dastehen: Von der Planung uber die Vertragsgestaltung bis hin zur Realisierung. Methodisch sauber eingesetztes Hacker-Wissen, das die Informationssicherheit Ihres Unternehmens erhohen soll.
So beauftragen Sie den "Hacker" Ihre... |
cena:
285,43 |
![]() |
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
ISBN: 9781409438168 / Angielski / Twarda / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities that can be defined as cyber threats. It also shows how this activity forms in our communities and what can be done to try to prevent individuals from becoming cyber terrorists. This text will be of interest to academics, professionals and practitioners involved in building social capital; engaging with hard to reach individuals and...
What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cy...
|
cena:
798,00 |
![]() |
Intelligent Systems for Security Informatics
ISBN: 9780124047020 / Angielski / Twarda / 205 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation... The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope i... |
cena:
433,91 |
![]() |
Blackhatonomics: An Inside Look at the Economics of Cybercrime
ISBN: 9781597497404 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive... Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources... |
cena:
149,57 |
![]() |
Security in Cyberspace: Select Assessments & Policy Considerations
ISBN: 9781622573493 / Angielski / Twarda / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially. In the first quarter of this year, security experts were seeing almost 67,000 new malware threats on the Internet every day. This means more than 45 new viruses, worms, spy-ware and other threats were being created every minute. As these threats grow, security policy, technology and procedures need to evolve even faster to stay ahead of the...
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cy...
|
cena:
797,95 |
![]() |
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática
ISBN: 9781479122998 / Hiszpański / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas rapido posible los datos de su empresa u organizacion, utilizando 27 controles criticos. Es una metodologia 100% practica y enfocada a obtener resultados inmediatos."
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas ra...
|
cena:
53,39 |
![]() |
Sicherheitsaspekte in Der Informationstechnik: Proceedings Der 1. Deutschen Konferenz Über Computersicherheit
ISBN: 9783528051570 / Angielski / Miękka / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Vorwort Der vorliegende Band enthalt die Vortragsmanuskripte der 1. Deutschen Konferenz tiber Computersicherheit, die vom 15.-16.Mai 1990 in Bonn stattfand. Die zweitagige Konferenz - die erste ihrer Art in der Bundes republik - hatte zum Ziel, die Offentlichkeit ftir die Probleme der Sicherheit in der Informationstechnik zu sensibilisieren und tiber diesbeztigliche Entwicklungen und Initiativen in der Bundes republrk zu informieren. Die Konferenz wurde gemeinsam von der ZSI ( Zentralstelle fUr Sicherheit in der Informationstechnik ) und der AFCEA Bonn e.V., einem Fachverband ftir Elektronik,...
Vorwort Der vorliegende Band enthalt die Vortragsmanuskripte der 1. Deutschen Konferenz tiber Computersicherheit, die vom 15.-16.Mai 1990 in Bonn stat...
|
cena:
209,31 |
![]() |
Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers
ISBN: 9783642333910 / Angielski / Miękka / 131 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012.
Constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Informat...
|
cena:
203,61 |
![]() |
Computerviren und ihre Vermeidung: Ein übersichtlicher, praxisorientierter Leitfaden für jeden PC-Anwender
ISBN: 9783528053192 / Niemiecki / Miękka / 175 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dieses Buch solI weder eine streng wissenschaftliche Abhandlung uber das Thema Computerviren darstellen, noch solI es Wege auf zeigen, wie solche Viren zu programmieren sind. Es solI auch nicht den "Mythos Computervirus" weiter nfihren. Vielmehr solI dieses Buch relativ leicht verstWldlich Informationen zum Thema Computerviren bereithalten und den Leser so umfassend uber dieses Thema informieren, daB der weitverbreitete Mythos des Computervirus durch eine sinnvolle Aufklarung der PC-Anwender und der Offentlichkeit abgebaut werden kann. Dieses Buch ist ebenso als Mittler zwischen den...
Dieses Buch solI weder eine streng wissenschaftliche Abhandlung uber das Thema Computerviren darstellen, noch solI es Wege auf zeigen, wie solche Vire...
|
cena:
209,31 |
![]() |
Hacking analysis and protection: Hacking analysis and protection methods
ISBN: 9781463764944 / Angielski / Miękka / 74 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Anybody that is using a computer, from home user to professional IT expert, once connected to the Internet, becomes automatically a hacker's potential target. In this book various attacking tools and methods commonly used by the attackers, to compromise your computer or network are being described and analyzed. Finally some countermeasures are introduced in order to avoid being a victim of any kind of attacker. All the demonstrated further examples are run by the author of the book.
Anybody that is using a computer, from home user to professional IT expert, once connected to the Internet, becomes automatically a hacker's potential...
|
cena:
82,26 |
![]() |
Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation
ISBN: 9781447125662 / Angielski / Miękka / 317 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of...
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across t...
|
cena:
610,90 |
![]() |
Transactions on Large-Scale Data- and Knowledge-Centered Systems VI: Special Issue on Database- and Expert-Systems Applications
ISBN: 9783642341786 / Angielski / Miękka / 259 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high...
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge proce...
|
cena:
203,61 |
![]() |
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules
ISBN: 9781466507678 / Angielski / Twarda / 472 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices. The book is designed to assist you in reviewing the accessibility of electronic protected health information (EPHI) to make certain that it is not altered or destroyed in an unauthorized manner, and that it is available as needed only by authorized individuals... The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring complianc... |
cena:
673,31 |
![]() |
Federal Cybersecurity Planning: Human Capital & Research & Development
ISBN: 9781619427693 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Edited, reformatted and augmented versions of two GAO reports from 2010-2011.
Edited, reformatted and augmented versions of two GAO reports from 2010-2011.
|
cena:
309,17 |
![]() |
It-Sicherheit Kompakt Und Verständlich: Eine Praxisorientierte Einführung
ISBN: 9783834801401 / Niemiecki / Miękka / 205 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das vorliegende Buch "IT-Sicherheit kompakt und verstandlich" basiert auf meiner Lehrveranstaltung zu den "Grundlagen des Datenschutzes und der IT-Sicherheit" im Hauptstudium der Inf- matik-Studiengange bzw. dem dazugehorigen Masterprogramm an der Universitat Ulm. Meine Lehrveranstaltung wie auch dieses Buch sollen dazu - fahigen, tagliche Anforderungen der Berufspraxis im Bereich der IT-Sicherheit meistern zu konnen. Da aktuelle Entwicklungen verschiedene zu bewaltigende Aufgaben stellen, wird ein f- diertes Uberblickswissen und die Kenntnis, grundlegende Met- den auf neue Probleme...
Das vorliegende Buch "IT-Sicherheit kompakt und verstandlich" basiert auf meiner Lehrveranstaltung zu den "Grundlagen des Datenschutzes und der IT-Sic...
|
cena:
133,18 |
![]() |
Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission
ISBN: 9781626183902 / Angielski / Miękka / 81 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
423,89 |
![]() |
Steganography & Watermarking
ISBN: 9781626183131 / Angielski / Twarda / 363 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1261,79 |
![]() |
Cyberspace and Security: A Fundamentally New Approach
ISBN: 9780985893002 / Angielski / Miękka / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes us to catastrophic failure. This book clarifies shows how the security methods we have designed for the physical world are futile in cyberspace. If we want effective cybersecurity we need to understand the real and different nature of cyberspace, and the decision makers and security professionals have to understand the laws and rules of cyberspace and why and how they work in cybersecurity. Victor Sheymov's comprehensive multi-disciplinary...
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes...
|
cena:
115,46 |
![]() |
Comp Arch Security C
ISBN: 9781118168813 / Angielski / Twarda / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first book to introduce computer architecture for security and provide the tools to implement secure computer systems
This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems
This book provides... |
cena:
611,13 |