• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5420

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Critical Infrastructure System Security and Resiliency Betty Biringer Eric Vugrin Drake Warren 9781466557505 CRC Press
Critical Infrastructure System Security and Resiliency

ISBN: 9781466557505 / Angielski / Twarda / 229 str.

ISBN: 9781466557505/Angielski/Twarda/229 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Betty Biringer; Eric Vugrin; Drake Warren

Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.

Developed at Sandia National Labs, the authors' analytical approach...

Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an inte...

cena: 773,06

 Transactions on Large-Scale Data- and Knowledge-Centered Systems VII Abdelkader Hameurlain, Josef Küng, Roland Wagner 9783642353314 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Large-Scale Data- and Knowledge-Centered Systems VII

ISBN: 9783642353314 / Angielski / Miękka / 171 str.

ISBN: 9783642353314/Angielski/Miękka/171 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelkader Hameurlain;Josef Kung;Roland Wagner
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high...
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge proce...
cena: 203,61

 Nmap 6: Network Exploration and Security Auditing Cookbook Paulino Calderon Pale 9781849517485 Packt
Nmap 6: Network Exploration and Security Auditing Cookbook

ISBN: 9781849517485 / Angielski / Miękka / 318 str.

ISBN: 9781849517485/Angielski/Miękka/318 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paulino Calderon Pale
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the...
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to...
cena: 215,47

 Datenschutz Bei Wearable Computing: Eine Juristische Analyse Am Beispiel Von Schutzanzügen Roßnagel, Alexander 9783834825544 Springer, Berlin
Datenschutz Bei Wearable Computing: Eine Juristische Analyse Am Beispiel Von Schutzanzügen

ISBN: 9783834825544 / Niemiecki / Miękka / 180 str.

ISBN: 9783834825544/Niemiecki/Miękka/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Ein wichtiges Anwendungsfeld des Ubiquitous Computing ist das Wearable Computing Miniaturisierte elektronische Gerate in der Kleidung, Brillen oder Schmuckstucken konnen die Sicherheit des Nutzers erhohen und seine Arbeit erleichtern. Allgegenwartige Datenverarbeitung ermoglicht allerdings nicht nur neue Formen der Interessendurchsetzung oder des Datenmissbrauchs, sondern verandert die Interaktion des Menschen mit der Informationstechnik grundsatzlich. Im Rahmen eines Rechtsgutachtens fur die Bundesanstalt fur Arbeitsschutz und Arbeitsmedizin prufen die Autoren am Beispiel...

Ein wichtiges Anwendungsfeld des Ubiquitous Computing ist das Wearable Computing Miniaturisierte elektronische Gerate in der Kleidung...

cena: 255,00

 Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures Johnson, Neil F. 9781461369677 Springer
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures

ISBN: 9781461369677 / Angielski / Miękka / 137 str.

ISBN: 9781461369677/Angielski/Miękka/137 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Neil F. Johnson; Zoran Duric; Sushil Jajodia
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking).
Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital...
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferati...
cena: 407,25

 Arquitectura de Seguridad Informática: Un manual para gerentes, directores y consultores Castro Reynoso, Sergio 9781482069976 Createspace
Arquitectura de Seguridad Informática: Un manual para gerentes, directores y consultores

ISBN: 9781482069976 / Hiszpański / Miękka / 126 str.

ISBN: 9781482069976/Hiszpański/Miękka/126 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sergio Castro Reynoso
La funcion de gerente o director de seguridad informatica es dificil. Uno es responsable de salvaguardar la informacion de una red en constante cambio y crecimiento, en contra de todo tipo de ataques. Para hacer esto, se tiene una variedad extensa de posibles soluciones, y varias metodologias. A veces parece que la velocidad de cambio de nuestro medio ambiente de red es tal que no nos podemos mantener al dia. Y para complicar las cosas, los auditores quieren cada proceso y control documentado y mantenido al dia. El objetivo de este libro es darle al arquitecto de seguridad informatica una...
La funcion de gerente o director de seguridad informatica es dificil. Uno es responsable de salvaguardar la informacion de una red en constante cambio...
cena: 53,39

 Microsoft Forefront Uag Mobile Configuration Starter Fabrizio Volpe 9781849688789
Microsoft Forefront Uag Mobile Configuration Starter

ISBN: 9781849688789 / Angielski / Miękka / 86 str.

ISBN: 9781849688789/Angielski/Miękka/86 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fabrizio Volpe
cena: 131,90

 C(I)SO - And Now What?: How to Successfully Build Security by Design Oberlaender, Michael S. 9781480237414 Createspace
C(I)SO - And Now What?: How to Successfully Build Security by Design

ISBN: 9781480237414 / Angielski / Miękka / 102 str.

ISBN: 9781480237414/Angielski/Miękka/102 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael S. Oberlaender
Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design." The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org chart variances. It then leads you to define security architecture, addressing a secure development...
Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and l...
cena: 153,55

 Access Control: Understanding Information Sensitivity Marcus R. Greening 9781530480142 Createspace Independent Publishing Platform
Access Control: Understanding Information Sensitivity

ISBN: 9781530480142 / Angielski / Miękka / 164 str.

ISBN: 9781530480142/Angielski/Miękka/164 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcus R. Greening
cena: 148,44

 Cybersecurity Lexicon Luis Ayala 9781484220672 Apress
Cybersecurity Lexicon

ISBN: 9781484220672 / Angielski / Miękka / 200 str.

ISBN: 9781484220672/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Luis Ayala

Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.

Buildings today are automated because the systems are complicated and so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS all can be hacked....

Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical term...

cena: 154,73

 Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and Response Guide Ayala, Luis 9781484220641 Apress
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and Response Guide

ISBN: 9781484220641 / Angielski / Miękka / 159 str.

ISBN: 9781484220641/Angielski/Miękka/159 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Luis Ayala

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet.

Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you...

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause buildi...

cena: 264,71

 Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012) Clarke, Nathan 9781841023175 University of Plymouth
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)

ISBN: 9781841023175 / Angielski / Miękka / 224 str.

ISBN: 9781841023175/Angielski/Miękka/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
y ofA
cena: 87,87

 Self-Learning Speaker Identification: A System for Enhanced Speech Recognition Herbig, Tobias 9783642268809 Springer
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition

ISBN: 9783642268809 / Angielski / Miękka / 172 str.

ISBN: 9783642268809/Angielski/Miękka/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tobias Herbig; Franz Gerl; Wolfgang Minker

Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal characteristics. This work develops an integrated approach for speech and speaker recognition in order to gain space for self-learning opportunities of the system. This work introduces a reliable speaker identification which enables the speech recognizer to create robust speaker dependent models In addition, this book gives a new approach to solve the reverse problem, how to improve speech recognition if speakers can be recognized. The speaker...

Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal charact...

cena: 407,25

 Computer Security Handbook Bosworth, Seymour 9781118127063 John Wiley & Sons
Computer Security Handbook

ISBN: 9781118127063 / Angielski / Miękka / 2000 str.

ISBN: 9781118127063/Angielski/Miękka/2000 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Seymour Bosworth; Michel E. Kabay; Eric Whyne

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded...

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have r...

cena: 918,75

 Transactions on Large-Scale Data- and Knowledge-Centered Systems VIII: Special Issue on Advances in Data Warehousing and Knowledge Discovery Abdelkader Hameurlain, Josef Küng, Roland Wagner, Alfredo Cuzzocrea, Umeshwar Dayal 9783642375736 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Large-Scale Data- and Knowledge-Centered Systems VIII: Special Issue on Advances in Data Warehousing and Knowledge Discovery

ISBN: 9783642375736 / Angielski / Miękka / 197 str.

ISBN: 9783642375736/Angielski/Miękka/197 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelkader Hameurlain;Josef Kung;Roland Wagner
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high...
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge proce...
cena: 203,61

 Informed Watermarking Joachim Eggers Bernd Girod 9781461353201 Springer
Informed Watermarking

ISBN: 9781461353201 / Angielski / Miękka / 182 str.

ISBN: 9781461353201/Angielski/Miękka/182 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joachim Eggers; Bernd Girod
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic has a long history, but before 1995 publications in scientific literature were almost absent. From 1995 onwards however the number of publications on watermarking has been steadily increasing. Today a number of workshops and conferences on this topic exist; also a number of scientific journals on watermarking have been published. This renewed scientific interest in...
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in ...
cena: 407,25

 Datenschutz Und Datensicherung in Klein- Und Mittelbetrieben Harry Mucksch 9783824400058 Deutscher Universit'ats-Verlag
Datenschutz Und Datensicherung in Klein- Und Mittelbetrieben

ISBN: 9783824400058 / Niemiecki / Miękka / 269 str.

ISBN: 9783824400058/Niemiecki/Miękka/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harry Mucksch
cena: 266,42

 Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World Joel Brenner 9780143122111 Penguin Books
Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

ISBN: 9780143122111 / Angielski / Miękka / 320 str.

ISBN: 9780143122111/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joel Brenner
A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Like the rest of us, governments and corporations inhabit glass houses, all but transparent to a new generation of spies who operate remotely from such places...
A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner ...
cena: 94,25

 Botnets Heli Tiirmaa-Klaar Jan Gassen Elmar Gerhards-Padilla 9781447152156 Springer
Botnets

ISBN: 9781447152156 / Angielski / Miękka / 97 str.

ISBN: 9781447152156/Angielski/Miękka/97 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Heli Tiirmaa-Klaar; Jan Gassen; Elmar Gerhards-Padilla

Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary...

Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the globa...

cena: 203,61

 Mobile Device Security: Threats & Controls Willliam R O'Connor 9781624172540 Nova Science Publishers Inc
Mobile Device Security: Threats & Controls

ISBN: 9781624172540 / Angielski / Miękka / 107 str.

ISBN: 9781624172540/Angielski/Miękka/107 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willliam R O'Connor
cena: 423,89

Pierwsza Podprzednia  28  29  30  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia