![]() |
VPN-Server Komplett-Anleitung: Erstellen Sie Ihr eigenes VPN in der Cloud
ISBN: 9781970482010 / Niemiecki Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
85,10 |
![]() |
Pki: Implementing & Managing E-Security
ISBN: 9780072131239 / Angielski / Miękka / 513 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-by-step plan which addresses planning, deploying and cost of ownership with PKI.
This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-b...
|
cena:
231,86 |
![]() |
Computers, Ethics, and Society
ISBN: 9780195143027 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's world, computers can have complex and contradictory effects on human life. They can enhance our quality of life by creating access to previously unimagined worlds. On the other hand, as computers become increasingly important in our everyday lives, their potential to strip away our privacy and autonomy increases exponentially. Computers, Ethics, and Society, now in its third edition, offers a comprehensive, interdisciplinary set of readings on the ethical and social implications of computer technology. Taking into account technological, social, and philosophical issues,...
In today's world, computers can have complex and contradictory effects on human life. They can enhance our quality of life by creating access to previ...
|
cena:
581,01 |
![]() |
Load Balancing Servers, Firewalls, and Caches
ISBN: 9780471415503 / Angielski / Twarda / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From an industry insider--a close look at high-performance, end-to-end switching solutions
Load balancers are fast becoming an indispensable solution for handling the huge traffic demands of the Web. Their ability to solve a multitude of network and server bottlenecks in the Internet age ranges from dramatic improvements in server farm scalability to removing the firewall as a network bottleneck. This book provides a detailed, up-to-date, technical discussion of this fast-growing, multibillion dollar market, covering the full spectrum of topics--from server and firewall load balancing... From an industry insider--a close look at high-performance, end-to-end switching solutions
Load balancers are fast becoming an indispensable sol... |
cena:
292,82 |
![]() |
Secure Communications: Applications and Management
ISBN: 9780471499046 / Angielski / Twarda / 346 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you need to know more about communication's security management, this is the perfect book for you...
Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission... If you need to know more about communication's security management, this is the perfect book for you...
Secure Communications confronts t... |
cena:
666,87 |
![]() |
Financial Privacy & Electronic Commerce: Who's in My Business
ISBN: 9780595130467 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
49,22 |
![]() |
Cobb's Guide to PC and LAN Security
ISBN: 9780595181506 / Angielski / Miękka / 736 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
159,45 |
![]() |
Digital Identity: Unmasking Identity Management Architecture (Ima)
ISBN: 9780596008789 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with... The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. ... |
cena:
132,85 |
![]() |
HTML & Xhtml: The Definitive Guide: The Definitive Guide
ISBN: 9780596527327 / Angielski / Miękka / 680 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ..".lucid, in-depth descriptions of the behavior of every HTML tag on every major browser and platform, plus enough dry humor to make the book a pleasure to read." "When they say 'definitive' they're not kidding." Put everthing you need to know about HTML & XHTML at your fingertips. For nearly a decade, hundreds of thousands of web developers have turned to HTML & XHTML: The Definitive Guide to master standards-based web development. Truly a definitive guide, the book combines a... ..".lucid, in-depth descriptions of the behavior of every HTML tag on every major browser and platform, plus enough dry humor to make the book a... |
cena:
190,01 |
![]() |
Network Security Hacks: Tips & Tools for Protecting Your Privacy
ISBN: 9780596527631 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security... In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, netw... |
cena:
152,00 |
![]() |
Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn to Use the Internet Safely and Responsibly
ISBN: 9780787994174 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Essential strategies to keep children and teens safe online
As our children and teens race down the onramp to the Information Superhighway, many parents feel left behind in the dust. News stories about online sexual predators, child pornography, cyberbullies, hate groups, gaming addiction, and other dangers that lurk in the online world make us feel increasingly concerned about what our children are doing (and with whom) in cyberspace. In Cyber-Safe Kids, Cyber-Savvy Teens, Internet safety expert Nancy Willard provides you with need-to-know information about those online dangers,... Essential strategies to keep children and teens safe online
As our children and teens race down the onramp to the Information Superhighwa... |
cena:
64,43 |
![]() |
The Center for Democracy and Technology and Internet Privacy in the U.S.: Lessons of the First Five Years
ISBN: 9780810844421 / Angielski / Twarda / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data,...
The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communi...
|
cena:
420,89 |
![]() |
Hacker Culture
ISBN: 9780816633463 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Thomas studies novels and films (Neuromancer, WarGames, Hackers, and The Matrix) and reveals contemporary views of hackers as technological wizards, high-tech pranksters, and virtual criminals. Thomas then examines the court cases of Kevin Mitnick and Chris Lamprecht to determine how hackers are defined as criminals. Thomas finds that popular hacker stereotypes express the... Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed fi... |
cena:
96,71 |
![]() |
Multimedia Watermarking Techniques and Applications
ISBN: 9780849372131 / Angielski / Twarda / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
cena:
604,74 |
![]() |
Secure Electronic Transactions Introduction and Technical Reference
ISBN: 9780890069929 / Angielski / Twarda / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll...
This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical ins...
|
cena:
384,47 |
![]() |
Privacy Protection for E-Services
ISBN: 9781591409144 / Angielski / Twarda / 303 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material, such as: consumer empowerment, assessing privacy risks, security technologies needed for privacy protection, systems for privacy policy enforcement, and even methods for assessing privacy technologies. Privacy Protection for E-Services is a...
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy pre...
|
cena:
478,70 |
![]() |
Hacking: The Art of Exploitation, 2nd Edition
ISBN: 9781593271442 / Angielski / Miękka / 488 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming...
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl...
|
cena:
240,93 |
![]() |
Configuring Ipcop Firewalls: Closing Borders with Open Source
ISBN: 9781904811367 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would...
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style tha...
|
cena:
187,27 |
![]() |
SAP Security: SAP Security Essentials
ISBN: 9781933804026 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text is a collection of references that every SAP security consultant should have at the ready. (Careers)
This text is a collection of references that every SAP security consultant should have at the ready. (Careers)
|
cena:
149,98 |
![]() |
Elementos Esenciales de Seguridad de SAP
ISBN: 9781933804811 / Hiszpański / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. La guia esencial para Seguridad y conceptos de auditoria SAP Con 75 elementos esenciales de seguridad, preguntas frecuentes y ejemplos guiados paso a paso. Es clara ya que la seguridad y la auditoria estan entre las areas mas desafiantes en SAP Aprenderlo puede ser dificil, los elementos de seguridad SAP son una respuesta directa a la necesidad de informacion de seguridad practica para los usuarios de SAP, asesores y administradores. Desde las contrasenas por default a los perfiles de autorizacion, los elementos esenciales de seguridad SAP lo colocaran a Ud. en el camino de entender lo que...
La guia esencial para Seguridad y conceptos de auditoria SAP Con 75 elementos esenciales de seguridad, preguntas frecuentes y ejemplos guiados paso a ...
|
cena:
149,98 |