![]() |
Critical Infrastructure System Security and Resiliency
ISBN: 9781466557505 / Angielski / Twarda / 229 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events. Developed at Sandia National Labs, the authors' analytical approach... Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an inte... |
cena:
773,06 |
![]() |
Transactions on Large-Scale Data- and Knowledge-Centered Systems VII
ISBN: 9783642353314 / Angielski / Miękka / 171 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high...
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge proce...
|
cena:
203,61 |
![]() |
Nmap 6: Network Exploration and Security Auditing Cookbook
ISBN: 9781849517485 / Angielski / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the...
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to...
|
cena:
215,47 |
![]() |
Datenschutz Bei Wearable Computing: Eine Juristische Analyse Am Beispiel Von Schutzanzügen
ISBN: 9783834825544 / Niemiecki / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Ein wichtiges Anwendungsfeld des Ubiquitous Computing ist das Wearable Computing Miniaturisierte elektronische Gerate in der Kleidung, Brillen oder Schmuckstucken konnen die Sicherheit des Nutzers erhohen und seine Arbeit erleichtern. Allgegenwartige Datenverarbeitung ermoglicht allerdings nicht nur neue Formen der Interessendurchsetzung oder des Datenmissbrauchs, sondern verandert die Interaktion des Menschen mit der Informationstechnik grundsatzlich. Im Rahmen eines Rechtsgutachtens fur die Bundesanstalt fur Arbeitsschutz und Arbeitsmedizin prufen die Autoren am Beispiel... Ein wichtiges Anwendungsfeld des Ubiquitous Computing ist das Wearable Computing Miniaturisierte elektronische Gerate in der Kleidung... |
cena:
255,00 |
![]() |
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
ISBN: 9781461369677 / Angielski / Miękka / 137 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking).
Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital... Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferati...
|
cena:
407,25 |
![]() |
Arquitectura de Seguridad Informática: Un manual para gerentes, directores y consultores
ISBN: 9781482069976 / Hiszpański / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. La funcion de gerente o director de seguridad informatica es dificil. Uno es responsable de salvaguardar la informacion de una red en constante cambio y crecimiento, en contra de todo tipo de ataques. Para hacer esto, se tiene una variedad extensa de posibles soluciones, y varias metodologias. A veces parece que la velocidad de cambio de nuestro medio ambiente de red es tal que no nos podemos mantener al dia. Y para complicar las cosas, los auditores quieren cada proceso y control documentado y mantenido al dia. El objetivo de este libro es darle al arquitecto de seguridad informatica una...
La funcion de gerente o director de seguridad informatica es dificil. Uno es responsable de salvaguardar la informacion de una red en constante cambio...
|
cena:
53,39 |
![]() |
Microsoft Forefront Uag Mobile Configuration Starter
ISBN: 9781849688789 / Angielski / Miękka / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
131,90 |
![]() |
C(I)SO - And Now What?: How to Successfully Build Security by Design
ISBN: 9781480237414 / Angielski / Miękka / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design." The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org chart variances. It then leads you to define security architecture, addressing a secure development...
Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and l...
|
cena:
153,55 |
![]() |
Access Control: Understanding Information Sensitivity
ISBN: 9781530480142 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
148,44 |
| |
Cybersecurity Lexicon
ISBN: 9781484220672 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry. Buildings today are automated because the systems are complicated and so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS all can be hacked.... Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical term... |
cena:
154,73 |
![]() |
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and Response Guide
ISBN: 9781484220641 / Angielski / Miękka / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you... This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause buildi... |
cena:
264,71 |
![]() |
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
ISBN: 9781841023175 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
87,87 |
![]() |
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition
ISBN: 9783642268809 / Angielski / Miękka / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal characteristics. This work develops an integrated approach for speech and speaker recognition in order to gain space for self-learning opportunities of the system. This work introduces a reliable speaker identification which enables the speech recognizer to create robust speaker dependent models In addition, this book gives a new approach to solve the reverse problem, how to improve speech recognition if speakers can be recognized. The speaker... Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal charact... |
cena:
407,25 |
![]() |
Computer Security Handbook
ISBN: 9781118127063 / Angielski / Miękka / 2000 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded... Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have r... |
cena:
918,75 |
![]() |
Transactions on Large-Scale Data- and Knowledge-Centered Systems VIII: Special Issue on Advances in Data Warehousing and Knowledge Discovery
ISBN: 9783642375736 / Angielski / Miękka / 197 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high...
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge proce...
|
cena:
203,61 |
![]() |
Informed Watermarking
ISBN: 9781461353201 / Angielski / Miękka / 182 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic has a long history, but before 1995 publications in scientific literature were almost absent. From 1995 onwards however the number of publications on watermarking has been steadily increasing. Today a number of workshops and conferences on this topic exist; also a number of scientific journals on watermarking have been published. This renewed scientific interest in...
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in ...
|
cena:
407,25 |
![]() |
Datenschutz Und Datensicherung in Klein- Und Mittelbetrieben
ISBN: 9783824400058 / Niemiecki / Miękka / 269 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
266,42 |
![]() |
Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World
ISBN: 9780143122111 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace. Like the rest of us, governments and corporations inhabit glass houses, all but transparent to a new generation of spies who operate remotely from such places... A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner ... |
cena:
94,25 |
![]() |
Botnets
ISBN: 9781447152156 / Angielski / Miękka / 97 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary... Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the globa... |
cena:
203,61 |
![]() |
Mobile Device Security: Threats & Controls
ISBN: 9781624172540 / Angielski / Miękka / 107 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
423,89 |