• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1817

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 SuperVision: An Introduction to the Surveillance Society Gilliom, John 9780226924434 University of Chicago Press
SuperVision: An Introduction to the Surveillance Society

ISBN: 9780226924434 / Angielski / Twarda / 200 str.

ISBN: 9780226924434/Angielski/Twarda/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Gilliom; Torin Monahan

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and assessed and often in ways that are imperceptible to us. The first general introduction to the growing field of surveillance studies, "SuperVision" uses examples drawn from everyday technologies to show how surveillance is used, who is using it, and how it affects our world.Beginning with a look at the activities and technologies that connect most people to the surveillance matrix, from identification cards to GPS devices in our cars to Facebook,...

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and ass...

cena: 389,42

 SuperVision: An Introduction to the Surveillance Society Gilliom, John 9780226924441 University of Chicago Press
SuperVision: An Introduction to the Surveillance Society

ISBN: 9780226924441 / Angielski / Miękka / 200 str.

ISBN: 9780226924441/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Gilliom; Torin Monahan

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and assessed-and often in ways that are imperceptible to us. The first general introduction to the growing field of surveillance studies, "SuperVision" uses examples drawn from everyday technologies to show how surveillance is used, who is using it, and how it affects our world. Beginning with a look at the activities and technologies that connect most people to the surveillance matrix, from identification cards to GPS devices in our cars to Facebook,...

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and ass...

cena: 117,85

 Security Engineering for Cloud Computing: Approaches and Tools Rosado, David G. 9781466621251 Information Science Reference
Security Engineering for Cloud Computing: Approaches and Tools

ISBN: 9781466621251 / Angielski / Twarda / 258 str.

ISBN: 9781466621251/Angielski/Twarda/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David G. Rosado; Mario Piattini; D. Mellado
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.
Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tool...
cena: 991,23

 Advances in Cyber Security: Technology, Operations, and Experiences Hsu, D. Frank 9780823244560 Fordham University Press
Advances in Cyber Security: Technology, Operations, and Experiences

ISBN: 9780823244560 / Angielski / Twarda / 272 str.

ISBN: 9780823244560/Angielski/Twarda/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
D. Frank Hsu; Dorothy Marinucci
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on...
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. ...
cena: 423,50

 Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection Laing, Christopher 9781466626591 Information Science Reference
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

ISBN: 9781466626591 / Angielski / Twarda / 452 str.

ISBN: 9781466626591/Angielski/Twarda/452 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Laing; Atta Badii; Paul Vickers
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these...
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environme...
cena: 991,23

 Social Network Engineering for Secure Web Data and Services Luca Caviglione Mauro Coccoli Alessio Merlo 9781466639263 Information Science Reference
Social Network Engineering for Secure Web Data and Services

ISBN: 9781466639263 / Angielski / Twarda / 324 str.

ISBN: 9781466639263/Angielski/Twarda/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Luca Caviglione; Mauro Coccoli; Alessio Merlo
While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the internet; these platforms are not only used for content sharing purposes. They are also used to support and develop new services and applications. Social Network Engineering for Secure Web Data and Services provides empirical research on the engineering of social network infrastructures, the development of novel applications, and the impact of social network- based services over the internet. This comprehensive collection highlights issues and...
While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the intern...
cena: 991,23

 Internet and Surveillance: The Challenges of Web 2.0 and Social Media Fuchs, Christian 9780415633642
Internet and Surveillance: The Challenges of Web 2.0 and Social Media

ISBN: 9780415633642 / Angielski / Miękka / 332 str.

ISBN: 9780415633642/Angielski/Miękka/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Griffiths
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of Web 2.0, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state...
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and comm...
cena: 243,34

 Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World Joel Brenner 9780143122111 Penguin Books
Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

ISBN: 9780143122111 / Angielski / Miękka / 320 str.

ISBN: 9780143122111/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joel Brenner
A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Like the rest of us, governments and corporations inhabit glass houses, all but transparent to a new generation of spies who operate remotely from such places...
A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner ...
cena: 91,73

 Online File Sharing: Innovations in Media Consumption Andersson Schwarz, Jonas 9780415854306 Routledge
Online File Sharing: Innovations in Media Consumption

ISBN: 9780415854306 / Angielski / Twarda / 236 str.

ISBN: 9780415854306/Angielski/Twarda/236 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonas Andersson Schwarz

It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, "piracy," and (not least) policy issues regarding these practices. Andersson Schwartz critically engages with the justificatory discourses of the actual file-sharers, taking Sweden as a geographic focus. By focusing on the example of Sweden-home to both The Pirate Bay and Spotify-he provides a unique insight into a mentality...

It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides...

cena: 462,39

 Oracle Weblogic Server 12c Advanced Administration Cookbook Iwazaki, Dalton 9781849686846 Packt Publishing
Oracle Weblogic Server 12c Advanced Administration Cookbook

ISBN: 9781849686846 / Angielski / Miękka / 284 str.

ISBN: 9781849686846/Angielski/Miękka/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dalton Iwazaki
Oracle WebLogic Server is the core application server product of the Oracle Fusion Middleware platform. It is the premier application server for enterprise applications and has now been updated to 12C. If your company or client uses Oracle technology then you must know how to administer the Oracle WebLogic Server Oracle WebLogic Server 12c Advanced Administration Cookbook guides you through 70 recipes covering from the basics of WebLogic 12c installation, and passing through JDBC, JMS, cluster configuration and tuning. The book covers the day-by-day tasks of a WebLogic Administrator, enhanced...
Oracle WebLogic Server is the core application server product of the Oracle Fusion Middleware platform. It is the premier application server for enter...
cena: 235,39

 Reverse Deception: Organized Cyber Threat Counter-Exploitation Sean Bodmer 9780071772495 0
Reverse Deception: Organized Cyber Threat Counter-Exploitation

ISBN: 9780071772495 / Angielski / Miękka / 464 str.

ISBN: 9780071772495/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Bodmer

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and...

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in t...

cena: 198,74

 Hacking Exposed 7 George Kurtz 9780071780285 McGraw-Hill Education - Europe
Hacking Exposed 7

ISBN: 9780071780285 / Angielski / Miękka / 768 str.

ISBN: 9780071780285/Angielski/Miękka/768 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Kurtz

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment

"Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the...

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s...

cena: 233,14

 The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk McCarthy, N. K. 9780071790390 0
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

ISBN: 9780071790390 / Angielski / Miękka / 240 str.

ISBN: 9780071790390/Angielski/Miękka/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
N K McCarthy

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis....

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in ...

cena: 279,01

 Malware, Rootkits & Botnets Elisan, Christopher 9780071792066 0
Malware, Rootkits & Botnets

ISBN: 9780071792066 / Angielski / Miękka / 432 str.

ISBN: 9780071792066/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Elisan
Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for...

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the m...

cena: 198,74

 Anti-Hacker Tool Kit, Fourth Edition Mike Shema 9780071800143 0
Anti-Hacker Tool Kit, Fourth Edition

ISBN: 9780071800143 / Angielski / Miękka / 624 str.

ISBN: 9780071800143/Angielski/Miękka/624 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Shema
Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,...

cena: 210,21

 Computer Forensics and Digital Investigation with EnCase Forensic v7 Suzanne Widup 9780071807913 0
Computer Forensics and Digital Investigation with EnCase Forensic v7

ISBN: 9780071807913 / Angielski / Miękka / 448 str.

ISBN: 9780071807913/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Suzanne Widup
Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample...

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital inve...

cena: 233,14

 Hacking Exposed Mobile: Security Secrets & Solutions Bergman, Neil 9780071817011 0
Hacking Exposed Mobile: Security Secrets & Solutions

ISBN: 9780071817011 / Angielski / Miękka / 320 str.

ISBN: 9780071817011/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joel Scambray
Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior...

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The autho...

cena: 233,14

 Practical Anonymity: Hiding in Plain Sight Online Pete Loshin 9780124104044 0
Practical Anonymity: Hiding in Plain Sight Online

ISBN: 9780124104044 / Angielski / Miękka / 130 str.

ISBN: 9780124104044/Angielski/Miękka/130 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pete Loshin

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be...

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activis...

cena: 102,18

 From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line J David Quilter 9780124115941 0
From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line

ISBN: 9780124115941 / Angielski / Miękka / 148 str.

ISBN: 9780124115941/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J David Quilter

In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. Having transitioned into the private sector from a long career in public service with the DEA, Quilter offers valuable perspective on the differences in culture and priorities between the public and private sectors, and how those differences can affect efforts in organizational security. Readers will benefit from the author's insights on researching and joining a new organization, exploring a business' structure and culture, and getting to know...

In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. H...

cena: 126,51

 Business Continuity: Playbook Bob Hayes 9780124116481 0
Business Continuity: Playbook

ISBN: 9780124116481 / Angielski / Miękka / 98 str.

ISBN: 9780124116481/Angielski/Miękka/98 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bob Hayes

The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization's business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after a crisis.

This playbook guides the security leader through the development, implementation, and maintenance of a successful BCP. The text begins with a detailed description of the concept and value of business continuity planning,...

The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization's business c...

cena: 194,66

Pierwsza Podprzednia  73  74  75  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia