• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1825

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance Mather, Tim 9780596802769 0
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance

ISBN: 9780596802769 / Angielski / Miękka / 338 str.

ISBN: 9780596802769/Angielski/Miękka/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tim Mather

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.

Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security...

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is?...

cena: 143,42 zł

 Web Application Defender's Cookbook: Battling Hackers and Protecting Users Barnett, Ryan C. 9781118362181 0
Web Application Defender's Cookbook: Battling Hackers and Protecting Users

ISBN: 9781118362181 / Angielski / Miękka / 560 str.

ISBN: 9781118362181/Angielski/Miękka/560 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ryan C Barnett

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.

...

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed ho...

cena: 192,15 zł

 Android Hacker's Handbook Georg Wicherski 9781118608647 John Wiley & Sons Inc
Android Hacker's Handbook

ISBN: 9781118608647 / Angielski / Miękka / 576 str.

ISBN: 9781118608647/Angielski/Miękka/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Georg Wicherski

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed...

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to in...

cena: 199,84 zł

 Google Hacking for Penetration Testers, Volume 2 Johnny Long 9781597491761 0
Google Hacking for Penetration Testers, Volume 2

ISBN: 9781597491761 / Angielski / Miękka / 560 str.

ISBN: 9781597491761/Angielski/Miękka/560 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Johnny Long
This book helps people find sensitive information on the Web.

Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system...

This book helps people find sensitive information on the Web.

Google is one of the 5 most popular sites on the internet with more than 380 million...

cena: 232,32 zł

 Social Media Security: Leveraging Social Networking While Mitigating Risk Michael Cross 9781597499866 0
Social Media Security: Leveraging Social Networking While Mitigating Risk

ISBN: 9781597499866 / Angielski / Miękka / 328 str.

ISBN: 9781597499866/Angielski/Miękka/328 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Cross

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter);...

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro...

cena: 194,66 zł

 Nagios Core Administrators Cookbook Tom Ryder 9781849515566 0
Nagios Core Administrators Cookbook

ISBN: 9781849515566 / Angielski / Miękka / 366 str.

ISBN: 9781849515566/Angielski/Miękka/366 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tom Ryder
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major functions on a regular basis. "Nagios Core Administrators Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administrators Guide introduces the reader to methods of extending Nagios Core into a network monitoring solution. The book begins by covering the basic structure of hosts, services, and contacts...
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major funct...
cena: 236,69 zł

 Mobile Security: How to Secure, Privatize and Recover Your Devices Speed, Timothy 9781849693608 Packt Publishing
Mobile Security: How to Secure, Privatize and Recover Your Devices

ISBN: 9781849693608 / Angielski / Miękka / 242 str.

ISBN: 9781849693608/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Timothy Speed; Darla Nykamp; Joseph Anderson
The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don t manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security...
The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your p...
cena: 210,86 zł

 The Internet Police: How Crime Went Online--And the Cops Followed Anderson, Nate 9780393349450 WW Norton & Co
The Internet Police: How Crime Went Online--And the Cops Followed

ISBN: 9780393349450 / Angielski / Miękka / 320 str.

ISBN: 9780393349450/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nate Anderson
With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road.

Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too.

In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find...

With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road....
cena: 66,56 zł

 Cuckoo Malware Analysis Digit Oktavianto Iqbal Muhardianto 9781782169239 Packt Publishing
Cuckoo Malware Analysis

ISBN: 9781782169239 / Angielski / Miękka / 142 str.

ISBN: 9781782169239/Angielski/Miękka/142 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Digit Oktavianto; Iqbal Muhardianto
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
cena: 180,74 zł

 Vmware Vcloud Security Sarkar, Prasenjit 9781782170969 Packt Publishing
Vmware Vcloud Security

ISBN: 9781782170969 / Angielski / Miękka / 114 str.

ISBN: 9781782170969/Angielski/Miękka/114 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Prasenjit Sarkar
Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own hardware and software. The alternative is to deploy the services you need on a public cloud infrastructure provided by an external supplier such as Amazon Web Services, Rackspace Cloud, or HP Public Cloud. While a public cloud can afford greater flexibility, a private cloud gives you the advantage of greater control over the entire stack. "VMware vCloud Security" focuses on some critical security risks, such as the application level firewall...
Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own...
cena: 224,84 zł

 The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online Denny Cherry 9780128000113 Syngress Publishing
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online

ISBN: 9780128000113 / Angielski / Miękka / 152 str.

ISBN: 9780128000113/Angielski/Miękka/152 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Denny Cherry

Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.

The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal...

Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat o...

cena: 102,18 zł

 Pond of Scams Tolu Ayoade 9781532985805 Createspace Independent Publishing Platform
Pond of Scams

ISBN: 9781532985805 / Angielski / Miękka / 90 str.

ISBN: 9781532985805/Angielski/Miękka/90 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tolu Ayoade
cena: 36,11 zł

 Cybersecurity and Applied Mathematics Leigh Metcalf 9780128044520 Elsevier Science & Technology
Cybersecurity and Applied Mathematics

ISBN: 9780128044520 / Angielski / Miękka / 240 str.

ISBN: 9780128044520/Angielski/Miękka/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Leigh Metcalf

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is...

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking...

cena: 248,21 zł

 Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control Cerrato, Paul 9780128043929 Elsevier Science & Technology
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control

ISBN: 9780128043929 / Angielski / Miękka / 162 str.

ISBN: 9780128043929/Angielski/Miękka/162 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul Cerrato

Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes.

Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization's information risk level. After this assessment is complete, the book...

Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tight...

cena: 170,32 zł

 Hacking: Basic Security, Penetration Testing and How to Hack Isaac Sharpe 9781329463158 Lulu.com
Hacking: Basic Security, Penetration Testing and How to Hack

ISBN: 9781329463158 / Angielski / Twarda / 148 str.

ISBN: 9781329463158/Angielski/Twarda/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Isaac Sharpe
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? . This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Within this book's pages, you'll find the answers to these questions and more. Just some of the questions and topics covered include: Penetration Testing Grey Hat Hacking Basic Security Guidelines General Tips Of Computer Safety How to Hack This book...
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking...
cena: 154,78 zł

 Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications Rawat                                    Danda B. Rawat Bhed B. Bista 9781466646919 Information Science Reference
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

ISBN: 9781466646919 / Angielski / Twarda / 577 str.

ISBN: 9781466646919/Angielski/Twarda/577 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rawat; Danda B. Rawat; Bhed B. Bista
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current...
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
cena: 996,68 zł

 Internet Censorship: A Reference Handbook Schell, Bernadette H. 9781610694810 ABC-CLIO
Internet Censorship: A Reference Handbook

ISBN: 9781610694810 / Angielski / Miękka / 333 str.

ISBN: 9781610694810/Angielski/Miękka/333 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bernadette H. Schell

Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In "Internet Censorship: A Reference Handbook," experts help readers understand these diverse views on Internet access and content viewing, revealing how both groups do what they do and why.

The handbook shares key events associated...

Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two...

cena: 230,58 zł

 Read Me First: Password Protection and Identity Theft Prevention (2nd Edition) Newton Lee 9781490988870 Createspace
Read Me First: Password Protection and Identity Theft Prevention (2nd Edition)

ISBN: 9781490988870 / Angielski / Miękka / 40 str.

ISBN: 9781490988870/Angielski/Miękka/40 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Newton Lee
More than 1 billion online usernames and passwords have been stolen by cybercriminals. Chances are that some of your passwords are already in the wrong hands. Password protection is more than meets the eye. This booklet offers you step-by-step instructions in creating strong passwords that are easy for you to remember but difficult for hackers to crack. It also tells you how to properly handle password security questions as well as smartphone and WiFi security. The booklet also reveals the most effective method for identity theft prevention. Every year, more than 12 million Americans have...
More than 1 billion online usernames and passwords have been stolen by cybercriminals. Chances are that some of your passwords are already in the wron...
cena: 28,20 zł

 Getting Started with Fortigate Volpe, Fabrizio 9781782178200 Packt Publishing
Getting Started with Fortigate

ISBN: 9781782178200 / Angielski / Miękka / 126 str.

ISBN: 9781782178200/Angielski/Miękka/126 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fabrizio Volpe; Fabbri Rosato
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
cena: 141,99 zł

 Corporate Cyberwar Dr Michael Teng 9789810897574 Corporate Turnaround Centre Pte Ltd
Corporate Cyberwar

ISBN: 9789810897574 / Angielski / Miękka / 60 str.

ISBN: 9789810897574/Angielski/Miękka/60 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Teng
cena: 80,70 zł

Pierwsza Podprzednia  4  5  6  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia