TakeBooks.com TakeBooks.com TakeBooks.com
TakeBooks.com
TakeBooks.com
  Каталог> Знания и навыки> Компьютерная литература>

Информационная безопасность

TakeBooks.com
TakeBooks.com
 Каталог
:: Java книги
:: Авто
:: Астрология
:: Аудио книги
:: Биографии и Мемуары
:: В мире животных
:: Гуманитарные и общественные науки
:: Детские книги
:: Для взрослых
:: Для детей
:: Дом, дача
:: Журналы
:: Зарубежная литература
:: Знания и навыки
   :Бизнес-книги
   :Компьютерная литература
     :Базы данных
     :Зарубежная компьютерная литература
     :Интернет
     :Информационная безопасность
     :Книги о компьютерах
     :Компьютерное железо
     :Ос и сети
     :Программирование
     :Программы
   :Научно-популярная литература
   :Словари, справочники
   :Учебная и научная литература
:: Издательские решения
:: Искусство
:: История
:: Компьютеры
:: Кулинария
:: Культура
:: Легкое чтение
:: Медицина и человек
:: Менеджмент
:: Наука и образование
:: Оружие
:: Программирование
:: Психология
:: Психология, мотивация
:: Публицистика и периодические издания
:: Разное
:: Религия
:: Родителям
:: Серьезное чтение
:: Спорт
:: Спорт, здоровье, красота
:: Справочники
:: Техника и конструкции
:: Учебная и научная литература
:: Фен-Шуй
:: Философия
:: Хобби, досуг
:: Художественная лит-ра
:: Эзотерика
:: Экономика и финансы
:: Энциклопедии
:: Юриспруденция и право
:: Языки
 Новинки
Nissan Frontier (D40) c 2005 по 2008 год, руководство по ремонту и эксплуатации в электронном виде (4 части на английском языке)
Nissan Frontier (D40) c 2005 по 2008 год, руководство по ремонту и эксплуатации в электронном виде (4 части на английском языке)
 
 
 Информационная безопасность
    Наименование 
 Security Patterns
427977
 Security Patterns

 Автор: Frank Buschmann

  Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process. Essential for
...
 Innocent Code
427976
 Innocent Code

 Автор: Группа авторов

  This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them Based on real-world situations taken from the author's experiences of tracking coding mistakes at major financial institutions Covers SQL injection attacks, cross-site scripting, data manipulation in order to bypass authorization, and other
...
 Cryptology Unlocked
427975
 Cryptology Unlocked

 Автор: Reinhard Wobst

  Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highligh
...


 Applied Cryptanalysis
427974
 Applied Cryptanalysis

 Автор: Mark Stamp

  The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use th
...
 Secrets and Lies
427890
 Secrets and Lies

 Автор: Группа авторов

  Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers
...
 Information Security Governance
427889
 Information Security Governance

 Автор: Группа авторов

  The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asse
...
 Hacking Point of Sale
427783
 Hacking Point of Sale

 Автор: Группа авторов

  Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail –
...
 Computer Security and Cryptography
427782
 Computer Security and Cryptography

 Автор: Группа авторов

  Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn
...
 Cryptography and Public Key Infrastructure on the Internet
427500
 Cryptography and Public Key Infrastructure on the Internet

 Автор: Группа авторов

  A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP protocols). * Details what the risks on the inte
...
Показано 316 - 324 (всего 423 позиций)
Страницы: [<< Предыдущая]   [Следующая >>] 
31 32 33 34 35 36 37 38 39 40
Отзывы 
125 развивающих игр для детей до 1 года
Полезная книга, особенно для молодых родителей, которые в пе ..
5 из 5 звёзд!
 Рекомендуем
Oracle PL/SQL Programming
Oracle PL/SQL Programming
 Информация 
Свяжитесь с нами
Как скачать и чем читать
 
  Quiero dinero © 2007