• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1823

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Optimizing Information Security and Advancing Privacy Assurance: New Technologies Nemati, Hamid 9781466600263 Idea Group,U.S.
Optimizing Information Security and Advancing Privacy Assurance: New Technologies

ISBN: 9781466600263 / Angielski / Twarda / 340 str.

ISBN: 9781466600263/Angielski/Twarda/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Nemati
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary...
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amoun...
cena: 985,79

 The Death of the Internet Markus Jakobsson 9781118062418 IEEE Computer Society Press
The Death of the Internet

ISBN: 9781118062418 / Angielski / Miękka / 386 str.

ISBN: 9781118062418/Angielski/Miękka/386 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Markus Jakobsson
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue,...
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or ...
cena: 378,67

 Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions Gupta, Manish 9781466601970 Information Science Reference
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

ISBN: 9781466601970 / Angielski / Twarda / 492 str.

ISBN: 9781466601970/Angielski/Twarda/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manish Gupta; John Walp; Raj Sharman
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering co...
cena: 985,79

 Internet and Wireless Security  9780852961971 Institution of Engineering and Technology
Internet and Wireless Security

ISBN: 9780852961971 / Angielski / Twarda / 302 str.

ISBN: 9780852961971/Angielski/Twarda/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses.
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-co...
cena: 530,83

 Managerial Guide for Handling Cyber-Terrorism and Information Warfare Janczewski 9781591405832 IGI Publishing
Managerial Guide for Handling Cyber-Terrorism and Information Warfare

ISBN: 9781591405832 / Angielski / Twarda / 250 str.

ISBN: 9781591405832/Angielski/Twarda/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling...
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and ho...
cena: 429,45

 Privacy Solutions and Security Frameworks in Information Protection Hamid Nemati 9781466620506 Information Science Reference
Privacy Solutions and Security Frameworks in Information Protection

ISBN: 9781466620506 / Angielski / Twarda / 308 str.

ISBN: 9781466620506/Angielski/Twarda/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Nemati
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional...
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of t...
cena: 985,79

 Penetration Testing: Protecting Networks and Systems Henry, Kevin M. 9781849283717 Itgp
Penetration Testing: Protecting Networks and Systems

ISBN: 9781849283717 / Angielski / Miękka / 211 str.

ISBN: 9781849283717/Angielski/Miękka/211 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin M. Henry
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
cena: 159,60

 Implementación de Calidad de Servicio basado en ISO/IEC 20000 - Guía de Gestión Kunas, Michael 9781849283533 Itgp
Implementación de Calidad de Servicio basado en ISO/IEC 20000 - Guía de Gestión

ISBN: 9781849283533 / Hiszpański / Miękka / 118 str.

ISBN: 9781849283533/Hiszpański/Miękka/118 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Kunas
ISO/IEC 20000 es un estandar internacional importante para los proveedores de servicios de TI. La implementacion y certificacion segun esta norma mejorara sus procesos y practicas de negocio, y dara a sus clientes la confianza de que su empresa sea eficiente y fiable. Los clientes volveran porque saben por experiencia que su servicio es insuperable. Los clientes potenciales buscaran a los proveedores con la norma ISO/IEC 20000 por la tranquilidad que proporciona. Este libro le guiara a traves de la implementacion y certificacion, lo que le permitira agilizar sus procesos de gestion y ofrecer...
ISO/IEC 20000 es un estandar internacional importante para los proveedores de servicios de TI. La implementacion y certificacion segun esta norma mejo...
cena: 127,67

 Hackers and Hacking: A Reference Handbook Thomas J. Holt Bernadette H. Schell 9781610692762 ABC-CLIO
Hackers and Hacking: A Reference Handbook

ISBN: 9781610692762 / Angielski / Twarda / 354 str.

ISBN: 9781610692762/Angielski/Twarda/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas J. Holt; Bernadette H. Schell

What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.

Rather than presenting an overly technical discussion of the phenomenon of hacking, this work...

What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? ...

cena: 229,16

 The Legal Challenges of Global Cyberspace: Why National Regulations Fail to Protect Digital Assets on Cyberspace Dr Tilahun Mishago 9781478393412 Createspace
The Legal Challenges of Global Cyberspace: Why National Regulations Fail to Protect Digital Assets on Cyberspace

ISBN: 9781478393412 / Angielski / Miękka / 316 str.

ISBN: 9781478393412/Angielski/Miękka/316 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tilahun Mishago
This book examines legal and cybersecurity challenges resulting from malicious activities on global cyberspace and proposes feasible regulatory, and policy based solutions to address these challenges. Global cyberspace has become an enormous challenge from the security perspective partly due to complications in enforcing security and regulatory efforts of national jurisdictions. This book presents more practical solutions to counteract these and other security threats posed by private and state-sponsored actors. Illicit events on cyberspace become increasingly complex as cyber technology...
This book examines legal and cybersecurity challenges resulting from malicious activities on global cyberspace and proposes feasible regulatory, and p...
cena: 59,66

 Ceh Certified Ethical Hacker All-In-One Exam Guide, Third Edition [With Access Code] Matt Walker 9781259836558 McGraw-Hill Education
Ceh Certified Ethical Hacker All-In-One Exam Guide, Third Edition [With Access Code]

ISBN: 9781259836558 / Angielski / Miękka / 464 str.

ISBN: 9781259836558/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Walker

Fully up-to-date coverage of every topic on the CEH v9 certification exam

Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.

An integrated study system based on...

Fully up-to-date coverage of every topic on the CEH v9 certification exam

Thoroughly revised for current exam objec...

cena: 173,15

 The Pretext Playbook: Instruction Manual for Intentional Misleading Fabrication O'Reilly, James 9781482392272 Createspace
The Pretext Playbook: Instruction Manual for Intentional Misleading Fabrication

ISBN: 9781482392272 / Angielski / Miękka / 102 str.

ISBN: 9781482392272/Angielski/Miękka/102 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James O'Reilly
What exactly is pretexting anyway? A pretext is a carefully manipulated act to gain factual evidence that you would not otherwise be able to naturally discover. Some investigators call it a gag or a scam. The purpose of this book is to bring a wide variety of pretext ideas that work in today's working class age of internet connectivity with overall scam awareness in the general public. Used by law enforcement, investigators and other professions that need to find out things about people. "A major part of skip tracing includes some type of pretext styled to fit the target's circumstances. We...
What exactly is pretexting anyway? A pretext is a carefully manipulated act to gain factual evidence that you would not otherwise be able to naturally...
cena: 63,82

 Anonymizing Health Data: Case Studies and Methods to Get You Started Emam, Khaled El 9781449363079 John Wiley & Sons
Anonymizing Health Data: Case Studies and Methods to Get You Started

ISBN: 9781449363079 / Angielski / Miękka / 228 str.

ISBN: 9781449363079/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Khaled El Emam; Luk Arbuckle

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to de-identify hundreds of datasets.

Clinical data is valuable for research and other types of analytics, but making it anonymous without compromising data quality is tricky. This book demonstrates techniques for handling different data types, based on the authors'...

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningf...

cena: 142,54

 Defending an Open, Global, Secure, and Resilient Internet John D. Negroponte Samuel J. Palmisano Adam Segal 9780876095591 Council on Foreign Relations Press
Defending an Open, Global, Secure, and Resilient Internet

ISBN: 9780876095591 / Angielski / Miękka / 126 str.

ISBN: 9780876095591/Angielski/Miękka/126 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John D. Negroponte; Samuel J. Palmisano; Adam Segal
The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks. To support security, innovation, growth, and the free flow of information, the Task Force recommends that the United States and its partners work to build a cyber alliance, make the free flow of information a part of all future trade agreements, and articulate an inclusive and robust vision of Internet governance. The Task Force is...
The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services bec...
cena: 86,12

 It Security Metrics: A Practical Framework for Measuring Security & Protecting Data Hayden, Lance 9780071713405 0
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data

ISBN: 9780071713405 / Angielski / Miękka / 396 str.

ISBN: 9780071713405/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lance Hayden
Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts...

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats...

cena: 247,07

 Computer Forensics InfoSec Pro Guide David Cowen 9780071742450 0
Computer Forensics InfoSec Pro Guide

ISBN: 9780071742450 / Angielski / Miękka / 344 str.

ISBN: 9780071742450/Angielski/Miękka/344 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Cowen
Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.

You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from...

Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to...

cena: 167,24

 Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet Casey, Eoghan 9780123742681 ACADEMIC PRESS
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet

ISBN: 9780123742681 / Angielski / Twarda / 807 str.

ISBN: 9780123742681/Angielski/Twarda/807 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eoghan Casey

Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation.

It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.

This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital...

Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any...

cena: 266,04

 The Basics of Web Hacking: Tools and Techniques to Attack the Web Pauli, Josh 9780124166004 0
The Basics of Web Hacking: Tools and Techniques to Attack the Web

ISBN: 9780124166004 / Angielski / Miękka / 160 str.

ISBN: 9780124166004/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josh Pauli

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these...

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No pr...

cena: 116,06

 Gfi Network Security and PCI Compliance Power Tools Posey, Brien 9781597492850 0
Gfi Network Security and PCI Compliance Power Tools

ISBN: 9781597492850 / Angielski / Miękka / 488 str.

ISBN: 9781597492850/Angielski/Miękka/488 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Posey
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard...
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the chal...
cena: 224,96

 Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Lee Allen 9781849517744 0
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide

ISBN: 9781849517744 / Angielski / Miękka / 414 str.

ISBN: 9781849517744/Angielski/Miękka/414 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lee Allen
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration...
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and ...
cena: 280,93

Pierwsza Podprzednia  43  44  45  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia