libristo network aware security for group communications 1382305

- znaleziono 9 produktów w 4 sklepach

Spalona Żywcem Wyd. Kieszonkowe - Souad - 2854922647

11,15 zł

Spalona Żywcem Wyd. Kieszonkowe - Souad

Książki & Multimedia > Książki

Opis - Pierwsze na świecie świadectwo ofiary zbrodni honorowej. Miała siedemnaście lat i zakochała się: zhańbiła rodzinę. Więc rodzina wydała na nią wyrok śmierci... Pokochała go pierwszą miłością. Myślała, że się z nią ożeni. Ale ukochany zniknął, a ona odkryła, że jest w ciąży. A w jej świecie to najcięższa zbrodnia... W zapomnianej przez Boga wiosce w Cisjordanii kobiety są warte mniej niż zwierzęta domowe. Tu mężczyzna jest panem życia i śmierci żony, córki, siostry. Brat może bezkarnie zabić siostrę, matka - córkę, kolejną bezużyteczną dziewczynkę, jaka się urodzi. Tu kobiecie odbiera się godność, a nawet życie zgodnie z odwiecznym obyczajem i uświęconą tradycją. A śmierć jest karą dla dziewczyny, która zhańbi rodzinę. Tak jak Souad. Wyrok wydaje jej ojciec. Szwagier dokonuje egzekucji. Oblewa Souad benzyną i podpala... SOUAD przeżyła - cudem, ale rodzina usiłowała zabić ją nawet w szpitalu. Na zawsze jednak pozostanie straszliwie okaleczona - na ciele i duszy. I wciąż musi się ukrywać; dopóki żyje, jej rodzinę okrywa hańba. Spalona żywcem, opublikowana pod pseudonimem szokująca opowieść o piekle, jakim było jej dzieciństwo i młodość, stała się międzynarodowym bestsellerem. Wydana w 37 w krajach książka przerywa tabu milczenia wobec istniejącej nadal w krajach muzułmańskich barbarzyńskiej tradycji. Nieludzkiego obyczaju, prawa mężczyzn, na mocy którego co najmniej pięć tysięcy kobiet pada co roku ofiarą zbrodni honorowej. Nazwa - Spalona Żywcem Wyd. Kieszonkowe Autor - Souad Oprawa - Miękka Wydawca - Amber Kod ISBN - 9788324159406 Kod EAN - 9788324159406 Wydanie - 1 Rok wydania - 2016 Tłumacz - 31182,maria rostworowska; Format - 110 x 175 x 14 Ilość stron - 224 Podatek VAT - 5% Premiera - 2016-06-23

Sklep: InBook.pl

Network Security with OpenSSL - 2826911093

158,87 zł

Network Security with OpenSSL O'Reilly Media

Książki / Literatura obcojęzyczna

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications. The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively.In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included. OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.

Sklep: Libristo.pl

Python for Graph and Network Analysis - 2878440063

813,51 zł

Python for Graph and Network Analysis Springer International Publishing AG

Książki / Literatura obcojęzyczna

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego, group, and community. They will be able to analyse militant and revolutionary networks and candidate networks during elections. For instance, they will learn how the Ebola virus spread through communities. Practically, the book is suitable for courses on social network analysis in all disciplines that use social methodology. In the study of social networks, social network analysis makes an interesting interdisciplinary research area, where computer scientists and sociologists bring their competence to a level that will enable them to meet the challenges of this fast-developing field. Computer scientists have the knowledge to parse and process data while sociologists have the experience that is required for efficient data editing and interpretation. Social network analysis has successfully been applied in different fields such as health, cyber security, business, animal social networks, information retrieval, and communications.

Sklep: Libristo.pl

Computer and Information Security Handbook - 2878624375

660,86 zł

Computer and Information Security Handbook Elsevier Books

Książki / Literatura obcojęzyczna

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.Online chapters can also be found on the book companion website:by leaders in the fieldComprehensive and up-to-date coverage of the latest security technologies, issues, and best practicesPresents methods for analysis, along with problem-solving techniques for implementing practical solutions

Sklep: Libristo.pl

6G Enabled Fog Computing in IoT - 2878085388

917,12 zł

6G Enabled Fog Computing in IoT Springer, Berlin

Książki / Literatura obcojęzyczna

Over the past few years, the demand for data traffic has experienced explosive growth thanks to the increasing need to stay online. New applications of communications, such as wearable devices, autonomous systems, drones, and the Internet of Things (IoT), continue to emerge and generate even more data traffic with vastly different performance requirements. With the COVID-19 pandemic, the need to stay online has become even more crucial, as most of the fields, would they be industrial, educational, economic, or service-oriented, had to go online as best as they can. As the data traffic is expected to continuously strain the capacity of future communication networks, these networks need to evolve consistently in order to keep up with the growth of data traffic. Thus, more intelligent processing, operation, and optimization will be needed for tomorrow's communication networks. The Sixth Generation (6G) technology is latest approach for mobile systems or edge devices in terms of reduce traffic congestions, energy consumption blending with IoT devices applications.  The 6G network works beyond the 5G (B5G), where we can use various platforms as an application e.g. fog computing enabled IoT networks, Intelligent techniques for SDN network, 6G enabled healthcare industry, energy aware location management. Still this technology must resolve few challenges like security, IoT enabled trust network.This book will focus on the use of AI/ML-based techniques to solve issues related to 6G enabled networks, their layers, as well as their applications. It will be a collection of original contributions regarding state-of-the-art AI/ML-based solutions for signal detection, channel modeling, resource optimization, routing protocol design, transport layer optimization, user/application behavior prediction 6G enabled software-defined networking, congestion control, communication network optimization, security, and anomaly detection. The proposed edited book emphasis on the 6G network blended with Fog-IoT networks to introduce its applications and future perspectives that helps the researcher to apply this technique in their domain and it may also helpful to resolve the challenges and future opportunities with 6G networks.

Sklep: Libristo.pl

Wi-Fi Home Networking - 2822223615

90,81 zł

Wi-Fi Home Networking McGraw-Hill

Medycyna > English Division

This book: describes the costs, benefits and necessity of networking; reviews software networking tools that save money for small-time operators; summarizes business expenses and savings to help a prospective user choose their office setup; offers criteria for deciding on distribution media; compares wireless versus wired connections; and includes important, practical information about security, viruses, and backing up. Booking a new career Ojai man, laid off after 25 years by Verizon, becomes author By Roger Harris, harris@insidevc.com For 18 months, Ray Smith had way too much time to smell the pink and red roses growing in his Ojai back yard. Like thousands of other telecommunications workers across the country who were laid off by struggling telecom companies, Smith was out of work. A veteran network engineer with more than 25 years of experience, Smith hated being jobless. He looked for work constantly after being let go by Verizon Communications in January 2001. He made a million phone calls and knocked on a like number of doors. Or so it seemed. Too often he heard the words that every 50-something job hunter learns to hate: "You're overqualified." No nibbles. No offers. "I was desperate," said Smith, 55. So with his back to the wall, Smith tried something new -- he wrote a book. Other than the Christmas letters he writes instead of sending cards, Smith was a novice writer. But he knows computer networking. With the help of a good editor and his patient and supportive wife, Jade, he began writing last June. Six months later, Smith delivered the last pages of WiFi Home Networking to his publisher. In the process, he rediscovered himself and put those pesky out-of-work blues into the closet. Seeing his book on the shelf at Barnes & Noble for the first time was "an out-of-body experience almost," Smith said. "Suddenly, I was somebody again." His book was published by McGraw Hill, one of the largest publishing houses in the country. The 347-page book details how to build a wireless network for your home. WiFi is short for "wireless fidelity," the radio frequency technology used to connect computers. Step by step, Smith outlines everything from the history of WiFi and the benefits of a wireless network to choosing the right equipment and setting up the network. The book, which sells for $29.95 and includes a CD version, is aimed primarily at small-office/home-office users. There are several advantages of a wireless network, said Smith, who found in researching the book that more than 20 million U.S. households have more than one computer. With a WiFi home network, several computers can share the same high-speed wireless Internet connection and the same printer. If you have a laptop computer, you can work anywhere in the house or even the back yard -- because there are no wires to trip over. Wireless networks make it easy to share files between computers and remotely control one computer with another computer. And, homeowners don't have to knock holes in walls like they would when running cable for a wired network. Smith said a wireless network makes working from home easier and more productive. Real estate agents, for example, can connect a WiFi camera to their computer and show out-of-town home buyers photos of houses, and a salesperson could sit in their home office and use the technology to video conference with field engineers. How it happened In the last few months, interest in wireless networking has taken off. In addition to being a useful tool for home offices, wireless networks are cropping up in coffee shops, airports and hotels. "Ray has a real knack of seeing things before they become popular," said Jade, who works for Verizon's DSL division. "... A lot of families have more than one computer, and (WiFi) is a way to get them to talk to each other. It's the next logical step." Although Smith never wrote a book before, his longtime friend David Leathers, a Videography magazine editor and president of Eye Square Productions, a video and film production company in Culver City, didn't hesitate to recommend Smith when McGraw-Hill was looking for a WiFi writer. "I knew he knew the subject matter because he had been directly involved in it a very long time," said Leathers, who has written technical books for McGraw-Hill. "I've not been particularly impressed with some of the technical writing I see. Some of it looks like somebody took some downloads from the Net, some press releases and rescrambled it and then called it an article. But I knew Ray would take it seriously and do original work on it." Smith's serious work-ethic impressed his editor at McGraw-Hill. "He did a great job of researching and getting enough information from the vendors," said Judy Bass, senior editor with McGraw-Hill. Smith accepted criticism without complaint and quickly learned the style preferred by McGraw-Hill's Professional Book Group, which publishes hundreds of titles a year. "He really went out and learned about the market and in the process marketed himself really well," Bass said. Unlike many how-to technical books, Smith writes in a manner understandable by both novices and tech-savvy readers. The book is sprinkled with interesting tidbits. For instance, the first wireless communication was in 1880 when Alexander Graham Bell invented the photophone, which used a beam of light to carry a voice message between buildings in Washington, D.C. The Ventura County Star 20030608

Sklep: Ksiazki-medyczne.eu

ZyWALL USG 300 Firewall 200xVPN 7x1GBE - 2824921830

4484,98 zł

ZyWALL USG 300 Firewall 200xVPN 7x1GBE ZyXEL

Sieć > Firewalle

Opis:   Performance and Capacity SPI Firewall Throughput: 200Mbps IPSec VPN (AES) Throughput: 100Mbps Maximum Concurrent NAT Sessions: 60,000 Maximum IPSec VPN Tunnels: 200 Maximum SSL VPN Tunnels: 10 New Session Rate: 2,000 (sessions/sec) Gateway Anti-Virus Stream-Based Gateway Anti-Virus Powered by Kaspersky Labs Covers Top Active Viruses in the Wild List Scans HTTP / FTP / SMTP / POP3 / IMAP4 Automatic Signature Update No File Size Limitation Blacklist / Whitelist Application Patrol IM / P2P Granular Access Control Integrated with Scheduling / Rate-Limit / User-Aware IM / P2P Up-To-Date Support* Real-Time Statistical Reports *: Requiring valid IDP subscription Intrusion Detection and Prevention In-line Mode (Routing / Bridge) Zone-Based IDP Inspection Customizable Protection Profile Signature-Based Deep Packet Inspection Automatic Signature Update Custom Signatures Traffic Anomaly: Scanning Detection and Flood Protection Protocol Anomaly: HTTP / ICMP / TCP / UDP Content Filter URL Blocking, Keyword Blocking Exempt List (Blacklist and Whitelist) Blocks Java Applet, Cookies and Active X Dynamic URL Filtering Database (BlueCoat) VPN IPSec VPN Encryptions (AES / 3DES / DES) Authentication (SHA-1 / MD5) Key Management (Manual Key / IKE) Perfect Forward Secrecy (DH Group 1 / 2 / 5) NAT over IPSec Dead Peer Detection / Replay Detection PKI (X.509) Certificate Enrollment (CMP / SCEP) Xauth Authentication L2TP Over IPSec Support SSL VPN Clientless Secure Remote Access (Reverse Proxy Mode) SecuExtender (Full Tunnel Mode) Unified Policy Enforcement Supports Two Factor Authentication Customizable User Portal Networking Routing Mode / Bridge Mode / Mixed Mode Layer 2 Port Grouping Ethernet / PPPoE / PPTP Tagged VLAN (802.1Q) Virtual Interface (Alias Interface) Policy-Based Routing (User-Aware) Policy-Based NAT (SNAT / DNAT) RIP v1 / v2 OSPF IP Multicasting (IGMP v1 / v2) DHCP Client / Server / Relay Built-in DNS Server Dynamic DNS Bandwidth Management Bandwidth Priority Policy-Based Traffic Shaping Maximum / Guaranteed Bandwidth Bandwidth Borrowing SPI Firewall Zone-Based Access Control List Customizable Security Zone Stateful Packet Inspection DoS/DDoS Protection User-Aware Policy Enforcement ALG Supports Custom Ports Authentication Internal User Database Microsoft Windows Active Directory External LDAP / RADIUS User Database ZyWALL OTP (One Time Password) Force User Authentication (Transparent Authentication) High Availability Device HA (Active-Passive Mode) Device Failure Detection Link Monitoring Auto-Sync Configurations Multiple WAN Load Balancing VPN HA (Redundant Remote VPN Gateways) System Management Role-Based Administration Simultaneous Administrative Logins Multi-Lingual Web GUI (HTTPS / HTTP) Object-Based Configuration Command Line Interface (Console / WebConsole / SSH / TELNET) Comprehensive Local Logging Syslog (4 Servers) E-mail Alert (2 Servers) SNMP v2c (MIB-II) Real-Time Traffic Monitoring System Configuration Rollback Text-Based Configuration File Firmware upgrade via FTP / FTP-TLS / WebGUI Advanced Reporting (Vantage Report 3.1*) Centralized Network Management (Vantage CNM 3.0*) *: Future release Certifications ICSA Firewall Certified* ICSA IPSec VPN Certified* *: Certificate pending Hardware Specifications Memory: 256MB RAM / 256MB Flash Interface: GbE x 7 (RJ-45, with LED) Auto-Negotiation and Auto MDI/MDI-X Console: RS-232 (DB9F) AUX: RS-232 (DB9M) LED Indicator: PWR, SYS, AUX, CARD1, CARD2 Power Switch: Yes Reset Pinhole: Yes Extension Card Slot: Yes* (2) USB: Yes* (2) *: These hardware accessories will be supported in future firmware release Physical Specifications Rack Mountable: Yes (19-inch, rack-mount kit included) Dimension: 430.0(W) x 201.2(D) x 42.0(H) mm Weight: 2,800g Power Requirements Input Voltage: 100-240VAC, 50/60Hz, 0.55-0.3A Power Rating: 35W Max Environmental Specifications Operating Temperature: 0 °C ~ 50 °C Storage Temperature: -30 °C ~ 60 °C Humidity: 20% to 95% (non-condensing) Standard Compliance HSF (Hazardous Substance Free): RoHS and WEEE EMC: FCC Part 15 Class A, CE-EMC Class A, C-Tick Class A, VCCI Class A Safety: CSA International (ANS/UL60950-1, CSA60950-1, EN60950-1, IEC60950-1)

Sklep: Frikomp.pl

Critical Infrastructure Protection XVI - 2878323099

883,15 zł

Critical Infrastructure Protection XVI Springer, Berlin

Książki / Literatura obcojęzyczna

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XVI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastructure Security.This book is the 16th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  The book contains a selection of 11 edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held as a virtual event during March, 2022.Critical Infrastructure Protection XVI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Sklep: Libristo.pl

Critical Infrastructure Protection XV - 2878177378

512,72 zł

Critical Infrastructure Protection XV Springer, Berlin

Książki / Literatura obcojęzyczna

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastructure Security.This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  The book contains a selection of 13 edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held as a virtual event during the spring of 2021.Critical Infrastructure Protection XV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Sklep: Libristo.pl

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z libristo pl network aware security for group communications 1382305

2. Szukaj na wszystkich stronach serwisu

t1=0.022, t2=0, t3=0, t4=0.018, t=0.022

Dla sprzedawców

copyright © 2005-2024 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER