• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1825

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Building Internet Firewalls Elizabeth D. Zwicky Simon Cooper D. Brent Chapman 9781565928718 O'Reilly Media
Building Internet Firewalls

ISBN: 9781565928718 / Angielski / Miękka / 896 str.

ISBN: 9781565928718/Angielski/Miękka/896 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elizabeth D. Zwicky; Simon Cooper; D. Brent Chapman

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have...

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong i...

cena: 233,60 zł

 De-mystifying the IPsec Puzzle Shiela Frankel 9781580530798 Artech House Publishers
De-mystifying the IPsec Puzzle

ISBN: 9781580530798 / Angielski / Twarda / 296 str.

ISBN: 9781580530798/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shiela Frankel
This innovative, new book offers professionals a global, integrated approach to providing Internet Security at the network layer. It provides a detailed presentation of the revolutionary IPsec technology used to create Virtual Private Networks and, in the near future, will be used to protect the infrastructure of the Internet itself.
This innovative, new book offers professionals a global, integrated approach to providing Internet Security at the network layer. It provides a detail...
cena: 480,19 zł

 Internet and Intranet Security Rolf Oppliger 9781580531665 Artech House Publishers
Internet and Intranet Security

ISBN: 9781580531665 / Angielski / Twarda / 432 str.

ISBN: 9781580531665/Angielski/Twarda/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rolf Oppliger
This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enhances the ability to create and deploy secure architectures. It gives users the knowledge needed for improved productivity, whether setting up commerce on line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks.
This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enh...
cena: 544,20 zł

 Understanding Voice Over IP Security Alan B. Johnston David M. Piscitello 9781596930506 Artech House Publishers
Understanding Voice Over IP Security

ISBN: 9781596930506 / Angielski / Twarda / 261 str.

ISBN: 9781596930506/Angielski/Twarda/261 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alan B. Johnston; David M. Piscitello
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest topic with engineers in the field is how to secure these networks. The book teaches practitioners how to design a highly secure VoIP network, explains Internet security basics, such as attack types and methods, and more.
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest top...
cena: 562,50 zł

 Dr. Tom Shinder's ISA Server 2006 Migration Guide Thomas W. Shinder 9781597491990 Syngress Publishing
Dr. Tom Shinder's ISA Server 2006 Migration Guide

ISBN: 9781597491990 / Angielski / Miękka / 637 str.

ISBN: 9781597491990/Angielski/Miękka/637 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dr. Thomas W. Shinder
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.

* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
* Learn to Publish Exchange...

Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA ...
cena: 180,06 zł

 Cyber Terrorism: Political and Economic Implications Colarik, Andrew M. 9781599040219 IGI Global
Cyber Terrorism: Political and Economic Implications

ISBN: 9781599040219 / Angielski / Twarda / 194 str.

ISBN: 9781599040219/Angielski/Twarda/194 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew M. Colarik
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global...
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objec...
cena: 434,20 zł

 Secure E-Government Web Services Mitrakas, Andreas 9781599041384 IGI Global
Secure E-Government Web Services

ISBN: 9781599041384 / Angielski / Twarda / 335 str.

ISBN: 9781599041384/Angielski/Twarda/335 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Mitrakas; Pim Hengeveld; Despina Polemi
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and service providers. The increasingly widespread use of Web services facilitates the exchange of data among various e-government applications, and paves the way for enhanced service delivery. Secure E-Government Web Services addresses various aspects of building secure e-government architectures and services, and presents the views of experts from academia, policy, and the industry to conclude that secure e-government Web services can be deployed in an...
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and servi...
cena: 507,28 zł

 Handbook of Research on Wireless Security: 2 V Zhang 9781599048994 Information Science Reference
Handbook of Research on Wireless Security: 2 V

ISBN: 9781599048994 / Angielski / Twarda / 934 str.

ISBN: 9781599048994/Angielski/Twarda/934 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yan Zhang; Jun Zheng; Miao Ma
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. Handbook of Research on Wireless Security combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless...
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and servic...
cena: 2659,36 zł

 SpamAssassin: A practical guide to integration and configuration McDonald, Alistair 9781904811121 Packt Publishing
SpamAssassin: A practical guide to integration and configuration

ISBN: 9781904811121 / Angielski / Miękka / 240 str.

ISBN: 9781904811121/Angielski/Miękka/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alistair McDonald
In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business requirements .Learn how to detect and prevent spam .Optimize SpamAssassin for all major mail servers and clients .Discover how to use SpamAssassin as a service Free to use, flexible, and effective, SpamAssassin has become the most popular Open Source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network. As a system administrator,...
In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business require...
cena: 189,34 zł

 Secure Internet Programming: Security Issues for Mobile and Distributed Objects Vitek, Jan 9783540661306 Springer
Secure Internet Programming: Security Issues for Mobile and Distributed Objects

ISBN: 9783540661306 / Angielski / Miękka / 506 str.

ISBN: 9783540661306/Angielski/Miękka/506 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Vitek; Christian D. Jensen; J. Vitek
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic...
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components ori...
cena: 201,72 zł

 Security in Distributed and Networking Systems Xiao, Yang 9789812708076 World Scientific Publishing Company
Security in Distributed and Networking Systems

ISBN: 9789812708076 / Angielski / Twarda / 512 str.

ISBN: 9789812708076/Angielski/Twarda/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yang Xiao;Yi Pan
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing.
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems includin...
cena: 778,85 zł

 Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions Subramanian, Ramesh 9781599048048 IRM Press
Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions

ISBN: 9781599048048 / Angielski / Twarda / 358 str.

ISBN: 9781599048048/Angielski/Twarda/358 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ramesh Subramanian
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a...
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms,...
cena: 510,87 zł

 Multimedia Forensics and Security Chang-Tsun Li 9781599048697 Information Science Reference
Multimedia Forensics and Security

ISBN: 9781599048697 / Angielski / Twarda / 418 str.

ISBN: 9781599048697/Angielski/Twarda/418 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chang-Tsun Li
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. "Multimedia Forensics and Security" provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright...
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication network...
cena: 920,01 zł

 Handbook of Research on Information Security and Assurance Jatinder N D Gupta                       Sushil K Sharma                          Jatinder N. D. Gupta 9781599048550 Information Science Reference
Handbook of Research on Information Security and Assurance

ISBN: 9781599048550 / Angielski / Twarda / 586 str.

ISBN: 9781599048550/Angielski/Twarda/586 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jatinder N D Gupta;Sushil K Sharma; Jatinder N. D. Gupta
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. The Handbook of Research on Information Security and Assurance offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities as...
cena: 1354,47 zł

 Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast Hope, Paco 9780596514839 O'Reilly Media
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

ISBN: 9780596514839 / Angielski / Miękka / 314 str.

ISBN: 9780596514839/Angielski/Miękka/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

Recipes cover the basics from observing messages between clients and servers to multi-phase...

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in ...

cena: 153,68 zł

 Cybercrime: Secure It or Lose It Chatam, Denise M. 9780595481705 IUNIVERSE.COM
Cybercrime: Secure It or Lose It

ISBN: 9780595481705 / Angielski / Miękka / 200 str.

ISBN: 9780595481705/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Denise M Chatam
"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.
"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information ...
cena: 68,99 zł

 Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities Stephen Thomas 9783836464963 VDM Verlag
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities

ISBN: 9783836464963 / Angielski / Miękka / 80 str.

ISBN: 9783836464963/Angielski/Miękka/80 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Thomas
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software security practitioners, a solution for correctly removing SQLIVs that does not require security expertise is desirable. In this paper, an automated fix generation algorithm for removing SQLIVs by replacing SQL statements with prepared SQL statements is described. Automated fix generation is a type of automated code generation that analyzes project artifacts containing faults and uses the analysis to generate fault free alternative or replacement...
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software se...
cena: 227,78 zł

 IPv6 Security Scott Hogg Eric Vyncke 9781587055942 Cisco Press
IPv6 Security

ISBN: 9781587055942 / Angielski / Miękka / 576 str.

ISBN: 9781587055942/Angielski/Miękka/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Scott Hogg; Eric Vyncke
IPv6 Security

Protection measures for the next Internet Protocol

As the world s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today s best solutions.

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component...
IPv6 Security

Protection measures for the next Internet Protocol

As the world s networks migrate to the IPv6 protocol, netwo...
cena: 275,47 zł

 Computer Security - Esorics 94: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings Gollmann, Dieter 9783540586180 Springer
Computer Security - Esorics 94: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings

ISBN: 9783540586180 / Angielski / Twarda / 474 str.

ISBN: 9783540586180/Angielski/Twarda/474 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dieter Gollmann
This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.
This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
Th...
cena: 201,72 zł

 Handbook of Security and Networks Xiao, Yang 9789814273039 World Scientific Publishing Company
Handbook of Security and Networks

ISBN: 9789814273039 / Angielski / Twarda / 576 str.

ISBN: 9789814273039/Angielski/Twarda/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yang Xiao; Frank H. Li; Hui Chen
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style;...
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recogniz...
cena: 885,94 zł

Pierwsza Podprzednia  1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia