• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1823

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner 9783540410317 Springer-Verlag Berlin and Heidelberg GmbH &
Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings

ISBN: 9783540410317 / Angielski / Miękka / 330 str.

ISBN: 9783540410317/Angielski/Miękka/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frederic Cuppens;Yves Deswarte;Dieter Gollmann
his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.
The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in O...
cena: 200,77

 Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings Christianson, Bruce 9783540640400 Springer
Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings

ISBN: 9783540640400 / Angielski / Miękka / 220 str.

ISBN: 9783540640400/Angielski/Miękka/220 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Christianson; B. Crispo; M. Lomas
This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.
This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, ...
cena: 200,77

 Trust and Security in Collaborative Computing Zou, Xukai 9789812703682 World Scientific Publishing Company
Trust and Security in Collaborative Computing

ISBN: 9789812703682 / Angielski / Twarda / 248 str.

ISBN: 9789812703682/Angielski/Twarda/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xukal Zou; Yuan-Shun Dai; Yi Pan
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing -- one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing....
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full ut...
cena: 546,68

 Security and Software for Cybercafes Esharenana E. Adomi 9781599049038 Idea Group Reference
Security and Software for Cybercafes

ISBN: 9781599049038 / Angielski / Twarda / 360 str.

ISBN: 9781599049038/Angielski/Twarda/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Esharenana E. Adomi
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are...
cena: 909,96

 Info Security Risk Management Minoli, Daniel 9780471762546 Wiley-Interscience
Info Security Risk Management

ISBN: 9780471762546 / Angielski / Twarda / 448 str.

ISBN: 9780471762546/Angielski/Twarda/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Minoli; Jake Kouns
  • Discusses all types of corporate risks and practical means of defending against them.
  • Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations.
  • Offers an effective risk management program, which is the most critical function of an information security program.

  • Discusses all types of corporate risks and practical means of defending against them.
  • Security is currently identified as a critical...
cena: 514,09

 Cellular Authentication for Mobile and Internet Services Silke Holtmanns 9780470723173 John Wiley & Sons
Cellular Authentication for Mobile and Internet Services

ISBN: 9780470723173 / Angielski / Twarda / 212 str.

ISBN: 9780470723173/Angielski/Twarda/212 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Silke Holtmanns
An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure web browsing with a phone or PC, Single Sign-On (SSO), mobile broadcast content protection, secure location services, etc. The book discusses the Generic Authentication Architecture (GAA) of the mobile standardization body 3rd Generation Partnership Project (3GPP)...

An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks<...
cena: 386,79

 Sicherheit in Kommunikationsnetzen Christoph Sorge, Luigi Lo Iacono, Nils Gruschka 9783486720167 Walter de Gruyter
Sicherheit in Kommunikationsnetzen

ISBN: 9783486720167 / Niemiecki / Miękka / 274 str.

ISBN: 9783486720167/Niemiecki/Miękka/274 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christoph Sorge;Luigi Lo Iacono;Nils Gruschka
Fast taglich werden neue Angriffe auf IT-Systeme bekannt, bei denen sensible Daten entwendet werden. Das vorliegende Buch vermittelt die wesentlichen Grundlagen und Technologien, die zur Absicherung von Computernetzwerken benotigt werden. Stets legen die Autoren dabei Wert auf eine verstandliche Darstellung, die - soweit moglich - auf abstrakte Modelle und formalen Notationen verzichtet. Zu jedem Kapitel werden Aufgaben zur Kontrolle von Wissensstand und Verstandnis angeboten.
Fast taglich werden neue Angriffe auf IT-Systeme bekannt, bei denen sensible Daten entwendet werden. Das vorliegende Buch vermittelt die wesentlichen ...
cena: 126,97

 Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks Fry, Chris 9780596518165 O'Reilly Media
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

ISBN: 9780596518165 / Angielski / Miękka / 246 str.

ISBN: 9780596518165/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin Nystrom; Chris Fry

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.

Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help...

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrat...

cena: 183,28

 Coding and Cryptology - Proceedings of the First International Workshop Wang, Huaxiong 9789812832238 World Scientific Publishing Company
Coding and Cryptology - Proceedings of the First International Workshop

ISBN: 9789812832238 / Angielski / Twarda / 288 str.

ISBN: 9789812832238/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
C International Workshop on Coding and Cryptology (1st 2007
cena: 503,14

 The Myths of Security: What the Computer Security Industry Doesn't Want You to Know Viega, John 9780596523022 O'Reilly Media
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

ISBN: 9780596523022 / Angielski / Miękka / 264 str.

ISBN: 9780596523022/Angielski/Miękka/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue.

Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few...

If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime securi...

cena: 113,99

 E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development Kamel, Sherif 9781605663883 Information Science Publishing
E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development

ISBN: 9781605663883 / Angielski / Twarda / 390 str.

ISBN: 9781605663883/Angielski/Twarda/390 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sherif Kamel
Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role it plays in the diffusion of knowledge sharing, community development, and equality. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development provides comprehensive coverage and definitions of the most important issues, concepts, trends, and technologies related to the adoption, diffusion, and adaptation of national electronic strategies for ICTs in socioeconomic development. This book...
Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role...
cena: 909,96

 Hacking: The Next Generation Dhanjani, Nitesh 9780596154578 O'REILLY & ASSOC INC
Hacking: The Next Generation

ISBN: 9780596154578 / Angielski / Miękka / 298 str.

ISBN: 9780596154578/Angielski/Miękka/298 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nitesh Dhanjani

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social...

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a ...

cena: 152,00

 Computer and Network Technology - Proceedings of the International Conference on Iccnt 2009 Mahadevan, Venkatesh 9789814289672 World Scientific Publishing Company
Computer and Network Technology - Proceedings of the International Conference on Iccnt 2009

ISBN: 9789814289672 / Angielski / Miękka / 372 str.

ISBN: 9789814289672/Angielski/Miękka/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Venkatesh Mahadevan; Jianhong Zhou
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, and students from universities all around the world to present research and hence foster better research relations between universities and the computer and networking industry.
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for s...
cena: 532,17

 Serious Game Design and Development: Technologies for Training and Learning Cannon-Bowers, Jan 9781615207398 Not Avail
Serious Game Design and Development: Technologies for Training and Learning

ISBN: 9781615207398 / Angielski / Twarda / 384 str.

ISBN: 9781615207398/Angielski/Twarda/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Janis Cannon-Bowers; Clint Bowers
Serious Game Design and Development: Technologies for Training and Learning examines high-tech delivery of pedagogical content in a simulated environment that engenders a deeper learning in an entertaining manner.
Serious Game Design and Development: Technologies for Training and Learning examines high-tech delivery of pedagogical content in a simulated environm...
cena: 909,96

 Surviving Cyberwar Richard Stiennon 9781605906881 Government Institutes
Surviving Cyberwar

ISBN: 9781605906881 / Angielski / Miękka / 176 str.

ISBN: 9781605906881/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard Stiennon
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
cena: 246,73

 Pervasive Information Security and Privacy Developments: Trends and Advancements Nemati, Hamid 9781616920005 Information Science Publishing
Pervasive Information Security and Privacy Developments: Trends and Advancements

ISBN: 9781616920005 / Angielski / Twarda / 468 str.

ISBN: 9781616920005/Angielski/Twarda/468 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Nemati
Offers methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives.
Offers methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure i...
cena: 909,96

 ICT Acceptance, Investment and Organization: Cultural Practices and Values in the Arab World Abdallah, Salam 9781609600488 Information Science Publishing
ICT Acceptance, Investment and Organization: Cultural Practices and Values in the Arab World

ISBN: 9781609600488 / Angielski / Twarda / 280 str.

ISBN: 9781609600488/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Salam Abdallah; Fayez Albadri
This book is a unique source of information outlining the importance of Information Communication Technology (ICT) adoption and diffusion, covering the Arab world's strong need for access to information systems, while still paying close attention to their culture and localization of practices -- Provided by publisher.
This book is a unique source of information outlining the importance of Information Communication Technology (ICT) adoption and diffusion, covering th...
cena: 909,96

 Swanson on Internal Auditing: Raising the Bar It Governance Publishing 9781849280679 IT Governance
Swanson on Internal Auditing: Raising the Bar

ISBN: 9781849280679 / Miękka / 341 str.

ISBN: 9781849280679/Miękka/341 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
D Swanson
A wealth of knowledge on internal auditing all in one place ... A must-read for corporate executives, IT staff, board members, security and auditing practitioners, and more.
A wealth of knowledge on internal auditing all in one place ... A must-read for corporate executives, IT staff, board members, security and auditing p...
cena: 199,35

 Microsoft Windows Intune 2.0: QuickStart Administration Overton, David 9781849682961 COMPUTER BOOKSHOPS
Microsoft Windows Intune 2.0: QuickStart Administration

ISBN: 9781849682961 / Angielski / Miękka / 312 str.

ISBN: 9781849682961/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
D Overton
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7 so your computers and users can operate at peak performance all the time. This step-by-step guide will show you how to plan, set up and maintain Windows Intune, showing you how to manage a group of PCs (either 1 business or several if a partner) from the base operating system, through to the patches, anti-malware solution and deployed software and policies from a central console, using the Windows Intune service. This book...
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud se...
cena: 234,10

 Digital Identity and Access Management: Technologies and Frameworks Sharman, Raj 9781613504987 Business Science Reference
Digital Identity and Access Management: Technologies and Frameworks

ISBN: 9781613504987 / Angielski / Twarda / 428 str.

ISBN: 9781613504987/Angielski/Twarda/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raj Sharman;Sanjukta Das Smith;Manish Gupta
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of...
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm ident...
cena: 985,79

Pierwsza Podprzednia  43  44  45  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia