292 rezultatov
-
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f69,74 €
CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORY
Digital Forensics with Open Source Tools
Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f
Zaloga po trgovinah
Rezultati:
-
-
-
Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.64,30 €
OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
Keys to the Kingdom
Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
Zaloga po trgovinah
Rezultati:
-
BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARDBTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.62,70 €
ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARD
BTEC Level 3 National IT Student Book 1
BTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.
Zaloga po trgovinah
Rezultati:
-
Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a30,31 €
ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)
Basics of Cyber Warfare
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a
Zaloga po trgovinah
Rezultati:
-
TCP/IP Sockets in C(2009) DONAHOO, MICHAEL J. (BAYLOR UNIVERSITY, WACO, TX, USA),CALVERT, KENNETH L. (UNIVERSITY OF KENTUCKY, LEXINGTON, KY, USA)Helps you to gain the knowledge and skills needed to develop web-based applications. This book features tutorial-based approach that enables the reader to master the tasks and techniques essential to the various client-server projects using sockets in C.40,18 €
DONAHOO, MICHAEL J. (BAYLOR UNIVERSITY, WACO, TX, USA),CALVERT, KENNETH L. (UNIVERSITY OF KENTUCKY, LEXINGTON, KY, USA)
TCP/IP Sockets in C
Helps you to gain the knowledge and skills needed to develop web-based applications. This book features tutorial-based approach that enables the reader to master the tasks and techniques essential to the various client-server projects using sockets in C.
Zaloga po trgovinah
Rezultati:
-
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots(2022) HUANG ET ALVezava: Mehka135,80 €
HUANG ET AL
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots
Zaloga po trgovinah
Rezultati:
-
Future Telco - Successful Positioning of Network Operators in the Digital Age(2018)This book examines the extensive changes in markets, technologies and value chains that telecommunication companies are currently confronted with.71,55 €
Future Telco - Successful Positioning of Network Operators in the Digital Age
This book examines the extensive changes in markets, technologies and value chains that telecommunication companies are currently confronted with.
Zaloga po trgovinah
Rezultati:
-
BTEC Nationals Information Technology Student Book + Activebook(2016) PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID56,64 €
PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID
BTEC Nationals Information Technology Student Book + Activebook
Zaloga po trgovinah
Rezultati:
-
Marx and the Robots - Networked Production, AI and Human Labour(2022) FLORIAN BUTOLLOVezava: Mehka34,44 €
FLORIAN BUTOLLO
Marx and the Robots - Networked Production, AI and Human Labour
Zaloga po trgovinah
Rezultati:
-
-
-
Exploring Malicious Hacker Communities - Toward Proactive Cyber-Defense(2021) MARIN, ERICSSON (CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA),ALMUKAYNIZI, MOHAMMED (KING SAUD UNIVERSITY, SAUDI ARABIA),SARKAR, SOUMAJYOTI (ARIZONA STATE UNIVERSITY),NUNES, ERIC (ARIZONA STATE UNIVERSITY),SHAKARIAN, JANA,SHAKARIAN, PAULOAs cyber threats become ever more frequent, a proactive defense that shifts attention from the defender to the attacker environment is key to designing better attack prediction systems. This book offers models to analyze threat intelligence mined from mal91,58 €
MARIN, ERICSSON (CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA),ALMUKAYNIZI, MOHAMMED (KING SAUD UNIVERSITY, SAUDI ARABIA),SARKAR, SOUMAJYOTI (ARIZONA STATE UNIVERSITY),NUNES, ERIC (ARIZONA STATE UNIVERSITY),SHAKARIAN, JANA,SHAKARIAN, PAULO
Exploring Malicious Hacker Communities - Toward Proactive Cyber-Defense
As cyber threats become ever more frequent, a proactive defense that shifts attention from the defender to the attacker environment is key to designing better attack prediction systems. This book offers models to analyze threat intelligence mined from mal
Zaloga po trgovinah
Rezultati:
-
-
Security Issues for Wireless Sensor Networks(2022) VERMA, PARAG,DUMKA, ANKUR,BHARDWAJ, ANUJ,KAUR, NAVNEET,ASHOK, ALAKNANDA (PANTNAGAR, COLLEGE OF TECHNOLOGY, G.B. PANT UNIVERSITY OF AGRICULTURE AND TECHNOLOGY, RUDRAPUI, UTTARAKHAND, INDIA),BISHT, ANIL KUMAR,GANGWAR, RAKSH PAL SINGHThis book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor network133,86 €
VERMA, PARAG,DUMKA, ANKUR,BHARDWAJ, ANUJ,KAUR, NAVNEET,ASHOK, ALAKNANDA (PANTNAGAR, COLLEGE OF TECHNOLOGY, G.B. PANT UNIVERSITY OF AGRICULTURE AND TECHNOLOGY, RUDRAPUI, UTTARAKHAND, INDIA),BISHT, ANIL KUMAR,GANGWAR, RAKSH PAL SINGH
Security Issues for Wireless Sensor Networks
This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor network
Zaloga po trgovinah
Rezultati:
-
Information Security Policies, Procedures, and Standards(2020) LANDOLL, DOUGLAS J. (LANTEGO, LLC, AUSTIN, TEXAS, USA)This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting55,11 €
LANDOLL, DOUGLAS J. (LANTEGO, LLC, AUSTIN, TEXAS, USA)
Information Security Policies, Procedures, and Standards
This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting
Zaloga po trgovinah
Rezultati:
-
Internet of Mechanical Things(2022) HAJJAJ, SAMI SALAMA HUSSEN (UNIVERSITY TENAGA NASIONAL (UNITEN), MALAYSIA),GSANGAYA, KISHEEN RAO (UNIVERSITI TENAGA NASIONAL (UNITEN), SELANGOR, MALAYSIA)This book provides knowledge, skills, and strategies an engineer requires to effectively integrate IoT into the field of mechanical engineering. Divided into three sections as IoT strategies, foundation topics, and system development, it covers basics, co133,86 €
HAJJAJ, SAMI SALAMA HUSSEN (UNIVERSITY TENAGA NASIONAL (UNITEN), MALAYSIA),GSANGAYA, KISHEEN RAO (UNIVERSITI TENAGA NASIONAL (UNITEN), SELANGOR, MALAYSIA)
Internet of Mechanical Things
This book provides knowledge, skills, and strategies an engineer requires to effectively integrate IoT into the field of mechanical engineering. Divided into three sections as IoT strategies, foundation topics, and system development, it covers basics, co
Zaloga po trgovinah
Rezultati:
-
Dimensions of Uncertainty in Communication Engineering(2022) BIGLIERI, EZIO (UNIVERSITAT POMPEU FABRA, BARCELONA, SPAIN.)132,23 €
BIGLIERI, EZIO (UNIVERSITAT POMPEU FABRA, BARCELONA, SPAIN.)
Dimensions of Uncertainty in Communication Engineering
Zaloga po trgovinah
Rezultati:
-
Advanced Antenna Systems for 5G Network Deployments(2020) ASPLUND, HENRIK (MASTER RESEARCHER IN ANTENNAS AND PROPAGATION, ERICSSON AB, STOCKHOLM, SWEDEN),KARLSSON, JONAS (EXPERT IN MULTI ANTENNA SYSTEMS, ERICSSON AB, STOCKHOLM, SWEDEN),KRONESTEDT, FREDRIC (EXPERT IN RADIO NETWORK DEPLOYMENT STRATEGIES, ERICSSON AB, STOCKHOLM, SWEDEN),LARSSON, ERIK (RESEARCHER IN MULTI-ANTENNA SYSTEMS, ERICSSON AB, STOCKHOLM, SWEDEN),ASTELY, DAVID (PRINCIPAL RESEARCHER, ERICSSON AB, STOCKHOLM, SWEDEN),BUTOVITSCH, PETER VON (TECHNOLOGY MANAGER, ERICSSON AB, STOCKHOLM, SWEDEN),CHAPMAN, THOMAS (3GPP STANDARDISATION DELEGATE, ERICSSON AB, STOCKHOLM, SWEDEN),FRENNE, MATTIAS (PRINCIPAL RESEARCHER, ERICSSON AB, STOCKHOLM, SWEDEN),GHASEMZADEH, FARSHID (EXPERT IN RADIO PERFORMANCE, ERICSSON AB, STOCKHOLM, SWEDEN),HAGSTROM, MANS (SENIOR RADIO SYSTEMS ARCHITECT, ERICSSON AB, STOCKHOLM, SWEDEN)152,09 €
ASPLUND, HENRIK (MASTER RESEARCHER IN ANTENNAS AND PROPAGATION, ERICSSON AB, STOCKHOLM, SWEDEN),KARLSSON, JONAS (EXPERT IN MULTI ANTENNA SYSTEMS, ERICSSON AB, STOCKHOLM, SWEDEN),KRONESTEDT, FREDRIC (EXPERT IN RADIO NETWORK DEPLOYMENT STRATEGIES, ERICSSON AB, STOCKHOLM, SWEDEN),LARSSON, ERIK (RESEARCHER IN MULTI-ANTENNA SYSTEMS, ERICSSON AB, STOCKHOLM, SWEDEN),ASTELY, DAVID (PRINCIPAL RESEARCHER, ERICSSON AB, STOCKHOLM, SWEDEN),BUTOVITSCH, PETER VON (TECHNOLOGY MANAGER, ERICSSON AB, STOCKHOLM, SWEDEN),CHAPMAN, THOMAS (3GPP STANDARDISATION DELEGATE, ERICSSON AB, STOCKHOLM, SWEDEN),FRENNE, MATTIAS (PRINCIPAL RESEARCHER, ERICSSON AB, STOCKHOLM, SWEDEN),GHASEMZADEH, FARSHID (EXPERT IN RADIO PERFORMANCE, ERICSSON AB, STOCKHOLM, SWEDEN),HAGSTROM, MANS (SENIOR RADIO SYSTEMS ARCHITECT, ERICSSON AB, STOCKHOLM, SWEDEN)
Advanced Antenna Systems for 5G Network Deployments
Zaloga po trgovinah
Rezultati: