• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5420

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Computer Security: 20 Things Every Employee Should Know Ben Rothke 9780072262827 0
Computer Security: 20 Things Every Employee Should Know

ISBN: 9780072262827 / Angielski / Miękka / 64 str.

ISBN: 9780072262827/Angielski/Miękka/64 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ben Rothke
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to keep corporate data and systems secure. This guide includes Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; and E-mail.
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to ke...
cena: 94,27

 Cyber Attacks: Protecting National Infrastructure Amoroso, Edward 9780123849175 0
Cyber Attacks: Protecting National Infrastructure

ISBN: 9780123849175 / Angielski / Twarda / 233 str.

ISBN: 9780123849175/Angielski/Twarda/233 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Edward Amoroso

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US...

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an int...

cena: 219,40

 Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development Kleidermacher, David 9780123868862 NEWNES
Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development

ISBN: 9780123868862 / Angielski / Miękka / 396 str.

ISBN: 9780123868862/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Kleidermacher

The ultimate resource for making embedded systems reliable, safe, and secure

Embedded Systems Security provides:

  • A broad understanding of security principles, concerns, and technologies
  • Proven techniques for the efficient development of safe and secure embedded software
  • A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems
  • Nuggets of practical advice and numerous case studies throughout
...

The ultimate resource for making embedded systems reliable, safe, and secure

Embedded Systems Security provides:

  • A broad un...
cena: 239,35

 Cyber Attacks: Protecting National Infrastructure Edward Amoroso 9780123918550 0
Cyber Attacks: Protecting National Infrastructure

ISBN: 9780123918550 / Angielski / Twarda / 319 str.

ISBN: 9780123918550/Angielski/Twarda/319 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Edward Amoroso

Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment.

In this edition, each principle is presented as a separate security...

Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national i...

cena: 254,31

 The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Winterfeld, Steve 9780124047372 0
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

ISBN: 9780124047372 / Angielski / Miękka / 150 str.

ISBN: 9780124047372/Angielski/Miękka/150 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steve Winterfeld

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks...

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book ex...

cena: 119,65

 Fisma Compliance Handbook: Second Edition Laura Taylor 9780124058712 0
Fisma Compliance Handbook: Second Edition

ISBN: 9780124058712 / Angielski / Miękka / 350 str.

ISBN: 9780124058712/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Laura Taylor

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a...

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition ...

cena: 274,26

 Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095045 Syngress Media,U.S.
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

ISBN: 9780124095045 / Angielski / Miękka / 32 str.

ISBN: 9780124095045/Angielski/Miękka/32 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they...

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.

cena: 115,98

 Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095052 Syngress Media,U.S.
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

ISBN: 9780124095052 / Angielski / Miękka / 48 str.

ISBN: 9780124095052/Angielski/Miękka/48 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find...

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Key...

cena: 115,98

 Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095069 Syngress Media,U.S.
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

ISBN: 9780124095069 / Angielski / Miękka / 28 str.

ISBN: 9780124095069/Angielski/Miękka/28 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate...

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard....

cena: 115,98

 Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Fiel Cameron Malin 9780124095076 0
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Fiel

ISBN: 9780124095076 / Angielski / Miękka / 134 str.

ISBN: 9780124095076/Angielski/Miękka/134 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cameron Malin
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to...
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in ...
cena: 69,77

 Business Continuity and Disaster Recovery Planning for IT Professionals Susan Snedaker (MCSE, MCT Founder, Virtual Team Consulting, Tucson, AZ, USA) 9780124105263 Syngress Media,U.S.
Business Continuity and Disaster Recovery Planning for IT Professionals

ISBN: 9780124105263 / Angielski / Miękka / 620 str.

ISBN: 9780124105263/Angielski/Miękka/620 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Virtual Team Consulting MCT Founder Susan Snedaker (MCSE

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The new 2nd Edition of Business Continuity and Disaster Recovery for IT Professionals gives you the most up-to-date planning and risk management techniques for business continuity and disaster recovery (BCDR). With distributed networks,...

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses...

cena: 390,87

 The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Patrick, Ph.D. (Dakota State University, Madison, SD, USA) Engebretson 9780124116443 0
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

ISBN: 9780124116443 / Angielski / Miękka / 225 str.

ISBN: 9780124116443/Angielski/Miękka/225 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA) E SD Madison Ph.D. (Dakota State University Patrick

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and...

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration te...

cena: 119,65

 Handbook on Securing Cyber-Physical Critical Infrastructure Sajal Das 9780124158153 0
Handbook on Securing Cyber-Physical Critical Infrastructure

ISBN: 9780124158153 / Angielski / Twarda / 848 str.

ISBN: 9780124158153/Angielski/Twarda/848 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sajal Das

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels),...

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructu...

cena: 344,09

 Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Andress, Jason 9780124166721 0
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

ISBN: 9780124166721 / Angielski / Miękka / 306 str.

ISBN: 9780124166721/Angielski/Miękka/306 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jason Andress

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to...

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, batt...

cena: 149,57

 Network and System Security John Vacca 9780124166899 0
Network and System Security

ISBN: 9780124166899 / Angielski / Miękka / 432 str.

ISBN: 9780124166899/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Vacca

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

...

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide...

cena: 234,36

 The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) Cappelli, Dawn 9780321812575 0
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

ISBN: 9780321812575 / Angielski / Twarda / 389 str.

ISBN: 9780321812575/Angielski/Twarda/389 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dawn Cappelli
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT(R) Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization.

The...
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed informat...
cena: 299,04

 Computer Forensics for Dummies Volonino, Linda 9780470371916 0
Computer Forensics for Dummies

ISBN: 9780470371916 / Angielski / Miękka / 384 str.

ISBN: 9780470371916/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Linda Volonino
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.

You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes,...

Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies Professional and ...
cena: 125,62

 Network Security Bible Eric Cole 9780470502495 0
Network Security Bible

ISBN: 9780470502495 / Angielski / Miękka / 936 str.

ISBN: 9780470502495/Angielski/Miękka/936 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Cole

The comprehensive A-to-Z guide on network security, fully revised and updated

Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.

Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security.

    ...

The comprehensive A-to-Z guide on network security, fully revised and updated

Network security is constantly evolving, and this comprehensiv...

cena: 235,58

 Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code [With DVD] Ligh, Michael 9780470613030 0
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code [With DVD]

ISBN: 9780470613030 / Angielski / Twarda / 752 str.

ISBN: 9780470613030/Angielski/Twarda/752 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Ligh
A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.

  • Security professionals face a constant...
A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ev...

cena: 249,38

 Unauthorised Access: Physical Penetration Testing For IT Security Teams Wil Allsopp 9780470747612 John Wiley & Sons Inc
Unauthorised Access: Physical Penetration Testing For IT Security Teams

ISBN: 9780470747612 / Angielski / Miękka / 308 str.

ISBN: 9780470747612/Angielski/Miękka/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Allsopp
The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any...

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on kee...

cena: 157,50

Pierwsza Podprzednia  28  29  30  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia