Multimedia Forensics and Security
ISBN: 9781599048697 / Angielski / Twarda / 418 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. "Multimedia Forensics and Security" provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright...
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication network...
|
|
cena:
1028,11 zł |
Handbook of Research on Information Security and Assurance
ISBN: 9781599048550 / Angielski / Twarda / 586 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. The Handbook of Research on Information Security and Assurance offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities as...
|
|
cena:
1513,60 zł |
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
ISBN: 9780596514839 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in ... |
|
cena:
170,64 zł |
Cybercrime: Secure It or Lose It
ISBN: 9780595481705 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.
"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information ...
|
|
cena:
77,09 zł |
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
ISBN: 9783836464963 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software security practitioners, a solution for correctly removing SQLIVs that does not require security expertise is desirable. In this paper, an automated fix generation algorithm for removing SQLIVs by replacing SQL statements with prepared SQL statements is described. Automated fix generation is a type of automated code generation that analyzes project artifacts containing faults and uses the analysis to generate fault free alternative or replacement...
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software se...
|
|
cena:
254,54 zł |
Computer Security - Esorics 94: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings
ISBN: 9783540586180 / Angielski / Twarda / 474 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures. This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
Th... |
|
cena:
194,97 zł |
Handbook of Security and Networks
ISBN: 9789814273039 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style;...
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recogniz...
|
|
cena:
922,25 zł |
Cyberpower and National Security
ISBN: 9781597974233 / Angielski / Miękka / 664 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.
The first section provides a broad foundation and overview of the subject by... The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The ...
|
|
cena:
171,57 zł |
Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Fir
ISBN: 9781600051326 / Angielski / Miękka / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.
Modern corporations do their best to hammer home the message of security through training, communications, and outright begging. The message often falls on deaf ears, not because employees want to make their workplaces unsafe, but rather, because... The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who ...
|
|
cena:
95,96 zł |
The Truth about the Internet and Online Predators
ISBN: 9780816076482 / Angielski / Twarda / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. To help readers avoid and recognize risky behaviors, The Truth About the Internet and Online Predators explains many of the dangers associated with the Internet. The A-to-Z entries detail the social, legal, and personal risks of Internet use, while personal testimonies and question-and-answer sections provide readers with an inside look at common issues online.
Entries include: Bullies and cyberbullying Characteristics of online predators Chat rooms and instant messaging Internet safety Parental control Peers and peer pressure Phishing and pharming Privacy... To help readers avoid and recognize risky behaviors, The Truth About the Internet and Online Predators explains many of the dangers associated with th...
|
|
cena:
186,43 zł |
Dnssec Specifications
ISBN: 9780979034275 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the...
|
|
cena:
108,51 zł |
Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives
ISBN: 9781615209019 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-maintenance, and trust-destroying practices in the context of technology. It presents research positioned at the intersection of the issues of trust within and between individuals, and organizations, and technology under...
In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquit...
|
|
cena:
1028,11 zł |
Spam 2 Scam How 2 B E-Safe
ISBN: 9781440424618 / Angielski / Miękka / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a book about SPAM, e-SCAMs and how to be safe from them. Here is a book written in a simple style and straight forward language to suit every reader irrespective of his/her background. Plenty of information is already available on 'what' ranging from advisories to blogs to actual, published works. There are commercial products offering varying degrees of security too. However, the efficacy of those solutions depends on the 'awareness' of the user concerned, because you have to take the call ultimately on what is a real deal and what is a potentially fraudulent product or service. This...
This is a book about SPAM, e-SCAMs and how to be safe from them. Here is a book written in a simple style and straight forward language to suit every ...
|
|
cena:
112,51 zł |
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption
ISBN: 9781615207374 / Angielski / Twarda / 598 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study. "
"Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed s...
|
|
cena:
1028,11 zł |
Internet Security For Parents: Discover The Hidden Dangers That You And Your Children Face Online
ISBN: 9781438244716 / Angielski / Miękka / 106 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book will show parents the hidden dangers online that pose a great threat to both their kids and the parents themselves. Inside this book you will learn why most kids are at risk to online predators, why parents are at risk to identity theft, the one activity kids do online that is costing parents thousands of dollars in lawsuits, and many more hidden dangers that no one has ever revealed to parents who have kids using the Internet. This book is written with the busy parent in mind that doesn't understand much about the computer except how to turn one on and use the Internet. If you have...
This book will show parents the hidden dangers online that pose a great threat to both their kids and the parents themselves. Inside this book you wil...
|
|
cena:
53,89 zł |
Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management
ISBN: 9781615208913 / Angielski / Twarda / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications, very little is written about the issues and techniques one must consider when creating, deploying, interacting within, and managing them securely. Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning,...
Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environm...
|
|
cena:
1028,11 zł |
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
ISBN: 9781609601232 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational an...
|
|
cena:
1028,11 zł |
Security and Privacy Assurance in Advancing Technologies: New Developments
ISBN: 9781609602000 / Angielski / Twarda / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
|
|
cena:
1028,11 zł |
Trustworthy Internet
ISBN: 9788847018174 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "Trustworthy Internet." The workshop provided a lively discussion on the challenges involved in reshaping the Internet into a trustworthy reality, articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things, supported by the Network Infrastructure foundation. The papers have been revised after the workshop to take account of feedbacks received...
This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and ...
|
|
cena:
585,00 zł |
Moodle 1.9 Top Extensions Cookbook
ISBN: 9781849512169 / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Moodle is growing at a seemingly unstoppable rate. One of the key reasons for its popularity lies in its potential to extend with modules, thus making the site easier to administer, add new features, and completely change the way it looks. This book finds you the best Moodle modules, teaches you how to install them, and helps you to master their configuration. There are hundreds of Moodle modules available. Find out which you can trust and how to put them to work. This practical book gives you hands-on experience on using and managing Moodle modules, thus making your learning website...
Moodle is growing at a seemingly unstoppable rate. One of the key reasons for its popularity lies in its potential to extend with modules, thus making...
|
|
cena:
235,63 zł |