• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1822

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Computer Forensics and Digital Investigation with EnCase Forensic v7 Suzanne Widup 9780071807913 0
Computer Forensics and Digital Investigation with EnCase Forensic v7

ISBN: 9780071807913 / Angielski / Miękka / 448 str.

ISBN: 9780071807913/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Suzanne Widup
Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample...

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital inve...

cena: 234,42

 Hacking Exposed Mobile: Security Secrets & Solutions Bergman, Neil 9780071817011 0
Hacking Exposed Mobile: Security Secrets & Solutions

ISBN: 9780071817011 / Angielski / Miękka / 320 str.

ISBN: 9780071817011/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joel Scambray
Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior...

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The autho...

cena: 234,42

 Practical Anonymity: Hiding in Plain Sight Online Pete Loshin 9780124104044 0
Practical Anonymity: Hiding in Plain Sight Online

ISBN: 9780124104044 / Angielski / Miękka / 130 str.

ISBN: 9780124104044/Angielski/Miękka/130 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pete Loshin

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be...

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activis...

cena: 102,18

 From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line J David Quilter 9780124115941 0
From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line

ISBN: 9780124115941 / Angielski / Miękka / 148 str.

ISBN: 9780124115941/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J David Quilter

In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. Having transitioned into the private sector from a long career in public service with the DEA, Quilter offers valuable perspective on the differences in culture and priorities between the public and private sectors, and how those differences can affect efforts in organizational security. Readers will benefit from the author's insights on researching and joining a new organization, exploring a business' structure and culture, and getting to know...

In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. H...

cena: 126,51

 Business Continuity: Playbook Bob Hayes 9780124116481 0
Business Continuity: Playbook

ISBN: 9780124116481 / Angielski / Miękka / 98 str.

ISBN: 9780124116481/Angielski/Miękka/98 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bob Hayes

The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization's business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after a crisis.

This playbook guides the security leader through the development, implementation, and maintenance of a successful BCP. The text begins with a detailed description of the concept and value of business continuity planning,...

The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization's business c...

cena: 194,66

 Radius: Securing Public Access to Private Resources Hassell, Jonathan 9780596003227 0
Radius: Securing Public Access to Private Resources

ISBN: 9780596003227 / Angielski / Miękka / 208 str.

ISBN: 9780596003227/Angielski/Miękka/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan Hassell

The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. Originally developed for dial-up remote access, RADIUS is now used by virtual private network (VPN) servers, wireless access points, authenticating Ethernet switches,...

The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to anot...

cena: 136,25

 Advances in Cyber Security: Technology, Operations, and Experiences Hsu, D. Frank 9780823244577 0
Advances in Cyber Security: Technology, Operations, and Experiences

ISBN: 9780823244577 / Angielski / Miękka / 272 str.

ISBN: 9780823244577/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
D Frank Hsu
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat.

The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge...

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. ...
cena: 107,05

 E-Discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support Schuler, Karen A. 9781597492966 0
E-Discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

ISBN: 9781597492966 / Angielski / Miękka / 302 str.

ISBN: 9781597492966/Angielski/Miękka/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Schuler
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2 billion industry, a 60% increase from 2004, projected to double by 2009. The core reason for the explosion of e-discovery is sheer volume; evidence is digital and 75% of modern day lawsuits entail e-discovery.

A recent survey reports that U.S. companies face an average of 305 pending lawsuits...

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respo...
cena: 277,42

 Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting Hoopes, John 9781597493055 0
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

ISBN: 9781597493055 / Angielski / Miękka / 357 str.

ISBN: 9781597493055/Angielski/Miękka/357 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hoopes
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of...
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice...
cena: 214,14

 Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization Reich, Pauline C. 9781615208319 0
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization

ISBN: 9781615208319 / Angielski / Twarda / 514 str.

ISBN: 9781615208319/Angielski/Twarda/514 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pauline C Reich
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of...
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical system...
cena: 917,20

 E-Safety for the i-Generation: Combating the Misuse and Abuse of Technology in Schools Watson, Nikki 9781849059442 0
E-Safety for the i-Generation: Combating the Misuse and Abuse of Technology in Schools

ISBN: 9781849059442 / Angielski / Miękka / 144 str.

ISBN: 9781849059442/Angielski/Miękka/144 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikki Giant
How can you protect young people from the dangers of the internet, now that they are living increasingly hidden lives online? Cyber bullying, sexual harassment, cyber stalking - these are all risks that young people may face every day, and effective e-safety is more important than ever. This practical, hands-on resource will help you understand issues such as cyber bullying and sexual dangers online, what e-safety is, how to adopt a whole school approach to e-safety, how to involve parents and carers in e-safety, and responding to incidents. It also covers how to implement an e-safety policy,...
How can you protect young people from the dangers of the internet, now that they are living increasingly hidden lives online? Cyber bullying, sexual h...
cena: 128,05

 Net Neutrality: Towards a Co-Regulatory Solution Marsden, Christopher T. 9781849660068 0
Net Neutrality: Towards a Co-Regulatory Solution

ISBN: 9781849660068 / Angielski / Twarda / 208 str.

ISBN: 9781849660068/Angielski/Twarda/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher T Marsden

Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user's ISP (or another ISP) blocks that access in part or whole. The suggestion has been that the problem can be resolved by either introducing greater competition, or closely policing conditions for vertically integrated service, such as VOIP. However, that is not the whole story, and ISPs, as a whole, have incentives to discriminate between content for matters such as network management of spam, to secure...

Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discr...

cena: 535,46

 Microsoft System Center 2012 Endpoint Protection Cookbook A Plue 9781849683906 0
Microsoft System Center 2012 Endpoint Protection Cookbook

ISBN: 9781849683906 / Angielski / Miękka / 208 str.

ISBN: 9781849683906/Angielski/Miękka/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A Plue
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems against threats with leading malware detection technologies. Built on Configuration Manager, it provides a unified infrastructure for client security and compliance management and "Microsoft System Center 2012 Endpoint Protection Cookbook" will help you get to grips with vital tasks for implementing this security tool. With the release of System Center 2012 Endpoint Protection, Microsoft is continuing its commitment to offering a cutting edge,...
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems...
cena: 210,86

 Microsoft Forefront Identity Manager 2010 R2 Handbook Kent Nordstrom 9781849685368 0
Microsoft Forefront Identity Manager 2010 R2 Handbook

ISBN: 9781849685368 / Angielski / Miękka / 446 str.

ISBN: 9781849685368/Angielski/Miękka/446 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kent Nordstrom
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems. The "Microsoft Forefront Identity Manager 2010 R2 Handbook" is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting. Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for...
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastru...
cena: 262,51

 Cloud Computing Protected: Security Assessment Handbook Rhoton, John 9780956355621 Recursive Press
Cloud Computing Protected: Security Assessment Handbook

ISBN: 9780956355621 / Angielski / Miękka / 391 str.

ISBN: 9780956355621/Angielski/Miękka/391 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Rhoton; Jan de Clercq; David Graves
"Cloud Computing Protected" describes the most important security challenges that organizations face by adopting public cloud services and implementing cloud-based infrastructure.
"Cloud Computing Protected" describes the most important security challenges that organizations face by adopting public cloud services and implementin...
cena: 153,53

 The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk Carl Young 9780124200562 ELSEVIER
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk

ISBN: 9780124200562 / Angielski / Miękka / 492 str.

ISBN: 9780124200562/Angielski/Miękka/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carl Young

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical,...

Scientists with little or no background in security and security professionals with little or no background in science and technology often have di...

cena: 233,60

 The Nsa Report: Liberty and Security in a Changing World President's Review Group on Intelligence 9780691163208 John Wiley & Sons
The Nsa Report: Liberty and Security in a Changing World

ISBN: 9780691163208 / Angielski / Miękka / 288 str.

ISBN: 9780691163208/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard Clarke

"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA Report


This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA...

"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will de...

cena: 72,96

 Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Bryan Parno   9781627054775 ACM Books
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

ISBN: 9781627054775 / Angielski / Miękka / 207 str.

ISBN: 9781627054775/Angielski/Miękka/207 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bryan Parno
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. I argue that we can resolve the tension between security and features by leveraging the...
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections f...
cena: 253,12

 Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements Brian S McWilliams   9781491913710 O'Reilly Media
Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements

ISBN: 9781491913710 / Angielski / Miękka / 372 str.

ISBN: 9781491913710/Angielski/Miękka/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brian S McWilliams

"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings, an investigative look into the shady world of email spammers and the people trying to stop them.

This compelling expose explores the shadowy world of the people responsible for today's junk-email epidemic. Investigative journalist Brian McWilliams delivers a fascinating account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and anti-spam activists.

McWilliams chronicles the activities of several...

"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings

cena: 96,03

 Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance Julia Angwin 9781250060860 St. Martin's Griffin
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

ISBN: 9781250060860 / Angielski / Miękka / 320 str.

ISBN: 9781250060860/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Julia Angwin


An inside look at who's watching you, what they know and why it matters. We are being watched.
We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
In "Dragnet Nation," award-winning investigative journalist Julia Angwin reports from the front lines...


An inside look at who's watching you, what they know and why it matters. We are being watched.
We see online ads from websites we've visite...

cena: 92,19

Pierwsza Podprzednia  73  74  75  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia