krainaksiazek security and intelligence issues in an evolving world 20124277

- znaleziono 24 produkty w 4 sklepach

Advanced Cyber Security - 2826941444

217,76 zł

Advanced Cyber Security John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

Attain true cyber security amidst ever-evolving threats using a holistic approach to defense Advanced Cyber Security is a practical guide to protecting your organization from cyber attacks using advanced active counter measures. Predict and guard against cyber attacks before they occur, by implementing cutting-edge static and dynamic active defense operations based on attack profile intelligence. This book walks you through the tools, techniques, and strategies that keep your organization's information secure, providing tips and tricks, as well as warning about common pitfalls. Case studies demonstrate the latest in attack intelligence profiling, active defense through social media, email operations, crowd sourcing, and cross-disciplinary data science applications, giving you insight into how these tools are being applied most effectively by companies around the world. A discussion about the future of cyber security proposes future defense models and provides an insightful look at what's coming down the pipeline. Cyber-threats are a top priority for businesses and governments and, as the threats change and develop, the need for effective countermeasures will only increase. This book helps you get out in front of the threat with a robust defense strategy, utilizing the newest, most effective methods in the field today. * Locate your system's vulnerabilities * Build an effective defense against attacks * Navigate the new security ecosystem * Explore emerging cyber defense technology Effective cyber defense requires a holistic approach. Attacks can come from any quarter, and are becoming increasingly sophisticated, leaving traditional countermeasures wholly inadequate and reactive approaches insufficient. Defense-as-usual is now simply damage control. Advanced Cyber Security shows you what true cyber security now requires, and gives you clear guidance toward effective implementation.

Sklep: Libristo.pl

Contemporary Security Studies - 2826826751

168,77 zł

Contemporary Security Studies Oxford University Press

Książki / Literatura obcojęzyczna

Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the field, it features an impressive breadth and depth of coverage of the different theoretical approaches to the study of security and the ever-evolving range of issues that dominate the security agenda in the 21st Century. Throughout the text, students are encouraged to question their own preconceptions and assumptions, and to use their own judgement to critically evaluate key approaches and ideas. To help them achieve this, each chapter is punctuated with helpful learning features including 'key ideas', 'think points' and case studies, demonstrating the real world applications and implications of the theory. In addition to covering a wide range of topical security issues, from terrorism and inter-state armed conflict to cybersecurity, health, and transnational crime, the fourth edition features a new chapter on postcolonialism and expanded coverage of critical security studies. The book is supported by an Online Resource Centre designed to help students take their learning further. For students: - Explore relevant security issues in greater depth with additional online case studies. - Test your understanding of the key ideas and themes in each chapter with self-marking multiple-choice questions. For registered lecturers: - Use the adaptable PowerPoint slides as the basis for lecture presentations, or as hand-outs in class.

Sklep: Libristo.pl

Security Leader Insights for Business Continuity - 2827169427

94,03 zł

Security Leader Insights for Business Continuity Elsevier Science & Technology

Książki / Literatura obcojęzyczna

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Business Continuity, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in business continuity. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. It includes chapters on the business resiliency and emergency preparedness, leading during a crisis, corporate social responsibility, and the Voluntary Private Sector Preparedness Certification Program. Security Leader Insights for Business Continuity is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. * Each chapter can be read in five minutes or less, and is written by or contains insights from experienced security leaders.* Can be used to find illustrations and examples you can use to deal with a relevant issue.* Brings together the diverse experiences of proven security leaders in one easy-to-read resource.

Sklep: Libristo.pl

Information Security - 2826724258

605,72 zł

Information Security Wiley-Blackwell (an imprint of John Wiley & Sons...

Książki / Literatura obcojęzyczna

Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive set of classroom-tested PowerPoint slides and a solutions manual are available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields. A solutions manual is available. Please email digialo@wiley.com to obtain it.

Sklep: Libristo.pl

Globalization and Security - 2836096438

544,41 zł

Globalization and Security Praeger Security International

Książki / Literatura obcojęzyczna

Globalization and Security: An Encyclopedia addresses the need for an authoritative, but accessible analysis of the impact of globalization on security and its multifaceted aspects. Broad in scope, this two-volume set covers the economic and political aspects of globalization, as well as its social and cultural impacts. More importantly, it is the first work to focus explicitly on security, including human security broadly conceived, and the role that globalization plays in the world's new and ever-evolving security environment. While more books on globalization are becoming available, none focus on the impact of globalism on security-related issues as this set does. Drawing on the expertise of specialists from many disciplines and nations, Globalization and Security directly addresses the needs of one of the fastest-growing areas of study, the intersection of globalization and security worldwide.

Sklep: Libristo.pl

Data and Application Security, 1 - 2826865738

1330,59 zł

Data and Application Security, 1 Springer, Berlin

Książki / Literatura obcojęzyczna

New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. §Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: §Electronic Commerce, XML and Web Security; §Workflow Security and Role-based Access Control; §Distributed Objects and Component Security; §Inference Problem, Data Mining and Intrusion Detection; §Language and SQL Security; §Security Architectures and Frameworks; §Federated and Distributed Systems Security; §Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.

Sklep: Libristo.pl

Advances in Cyber Security - 2827090647

453,07 zł

Advances in Cyber Security Fordham University Press

Książki / Literatura obcojęzyczna

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security--including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks. Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem.

Sklep: Libristo.pl

National Security - 2212829411

708,30 zł

National Security Elsevier Science Publishers

Inne 1

This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational issues under investigation.This book is intended to be used as both a textbook and a comprehensive research handbook. The contributors to this edited volume are renowned experts in their respective fields. Most of the chapters contained in this book provide an updated comprehensive survey of the related field and also specific findings from cutting-edging innovative research. To facilitate its adoption as a textbook, all the authors have included specific discussion questions that could be utilized to stimulate discussions and potentially further research in the area. This book addresses three

Sklep: Albertus.pl

Governance In A Globalizing World - 2840063598

149,99 zł

Governance In A Globalizing World

Książki Obcojęzyczne>Angielskie>Society & social sciences>Society & culture: general>Social issues & processes>GlobalizationKsiążki Obc...

An Exploration Of The Impact Of Governance On Culture, Economics, Security And The Environment In A Globalized World. The Book Aims To Answer Three Questions: How Are Patterns Of Globalization Currently Evolving?; How Do These Patterns Affect Governance?; And How Might Globalism Itself Be Governed?

Sklep: Gigant.pl

Information Technology Management - 2822223241

935,58 zł

Information Technology Management John Wiley & Sons

Medycyna > English Division

Up-to-date coverage on how new technology is changing the way organizations operate and compete Every day, new technology influences how organizations operate and compete in the current global environment, and this updated edition of a classic provides authoritative and streamlined coverage of this evolving topic. High-profile topics are discussed, such as social networks, green IS, and business intelligence, and global examples span a wide range of subject matter. You'll explore IT governance, connectivity that blurs public and private lives, sustainability, enterprise social media, and viral and social marketing.* Offers completely updated coverage on the evolving topic of the way organizations operate and compete in the current global environment* Addresses issues involving social networks, green IS, and business intelligence* Features real-world examples that deal with international issues Packed with real-world examples and coverage of international topics, Information Technology for Management, Eighth Edition, is critical reading for anyone involved in this field.

Sklep: Ksiazki-medyczne.eu

Richard Aldrich - GCHQ - 2845907179

76,64 zł

Richard Aldrich - GCHQ Harper Collins

Książki / Literatura obcojęzyczna

As we become ever-more aware of how our governments "eavesdrop" on our conversations, here is a gripping exploration of this unknown realm of the British secret service: Government Communication Headquarters (GCHQ). GCHQ is the successor to the famous Bletchley Park wartime code-breaking organisation and is the largest and most secretive intelligence organisation in the country. During the war, it commanded more staff than MI5 and MI6 combined and has produced a number of intelligence triumphs, as well as some notable failures. Since the end of the Cold War, it has played a pivotal role in shaping Britain's secret state. Still, we know almost nothing about it. In this ground-breaking new book, Richard Aldrich traces GCHQ's evolvement from a wartime code-breaking operation based in the Bedfordshire countryside, staffed by eccentric crossword puzzlers, to one of the world leading espionage organisations. It is packed full of dramatic spy stories that shed fresh light on Britain's role in the Cold War - from the secret tunnels dug beneath Vienna and Berlin to tap Soviet phone lines, and daring submarine missions to gather intelligence from the Soviet fleet, to the notorious case of Geoffrey Pine, one of the most damaging moles ever recruited by the Soviets inside British intelligence. The book reveals for the first time how GCHQ operators based in Cheltenham affected the outcome of military confrontations in far-flung locations such as Indonesia and Malaya, and exposes the shocking case of three GCHQ workers who were killed in an infamous shootout with terrorists while working undercover in Turkey. Today's GCHQ struggles with some of the most difficult issues of our time. A leading force of the state's security efforts against militant terrorist organisations like Al-Qaeda, they are also involved in fundamental issues that will mould the future of British society. Compelling and revelatory, Aldrich's book is the crucial missing link in Britain's intelligence history.

Sklep: Libristo.pl

Professional Microsoft PowerPivot for Excel and SharePoint - 2826627165

180,31 zł

Professional Microsoft PowerPivot for Excel and SharePoint Wiley

Książki / Literatura obcojęzyczna

With PowerPivot, Microsoft brings the power of Microsoft's business intelligence tools to Excel and SharePoint users. Self-service business intelligence today augments traditional BI methods, allowing faster response time and greater flexibility. If you're a business decision-maker who uses Microsoft Office or an IT professional responsible for deploying and managing your organization's business intelligence systems, this guide will help you make the most of PowerPivot. Professional Microsoft PowerPivot for Excel and SharePoint describes all aspects of PowerPivot and shows you how to use each of its major features. By the time you are finished with this book, you will be well on your way to becoming a PowerPivot expert. This book is for people who want to learn about PowerPivot from end to end. You should have some rudimentary knowledge of databases and data analysis. Familiarity with Microsoft Excel and Microsoft SharePoint is helpful, since PowerPivot builds on those two products. This book covers the first version of PowerPivot, which ships with SQL Server 2008 R2 and enhances Microsoft Office 2010. It provides an overview of PowerPivot and a detailed look its two components: PowerPivot for Excel and PowerPivot for SharePoint. It explains the technologies that make up these two components, and gives some insight into why these components were implemented the way they were. Through an extended example, it shows how to build a PowerPivot application from end to end. The companion Web site includes all the sample applications and reports discussed. What This Book Covers After discussing self-service BI and the motivation for creating PowerPivot, the book presents a quick, end-to-end tutorial showing how to create and publish a simple PowerPivot application. It then drilsl into the features of PowerPivot for Excel in detail and, in the process, builds a more complex PowerPivot application based on a real-world case study. Finally, it discusses the server side of PowerPivot (PowerPivot for SharePoint) and provides detailed information about its installation and maintenance. Chapter 1, "Self-Service Business Intelligence and Microsoft PowerPivot," begins Part I of the book. This chapter describes self-service BI and introduces PowerPivot, Microsoft's first self-service BI tool. It provides a high-level look at the two components that make up PowerPivot - PowerPivot for Excel and PowerPivot for SharePoint. Chapter 2, "A First Look at PowerPivot," walks you through a simple example of creating a PowerPivot application from end to end. In the process, it shows how to set up the two components of PowerPivot, and describes the normal workflow of creating a simple PowerPivot application. Chapter 3, "Assembling Data," starts off Part II of the book, and explains how to bring data into PowerPivot from various external data sources. It also introduces the extended example that you will build in this and subsequent chapters. Chapter 4, "Enriching Data," shows how to enhance the data you brought into your application by creating relationships and using PowerPivot's expression language, Data Analysis Expressions (DAX). Chapter 5, "Self-Service Analysis," describes how to use your PowerPivot data with various Excel features, such as PivotTables, PivotCharts, and slicers to do analysis. Chapter 5 also delves further into DAX, showing how to create and use DAX measures. Chapter 6, "Self-Service Reporting," shows how to publish your PowerPivot workbook to the server side of PowerPivot (PowerPivot for SharePoint), and make use of its features to view and update PowerPivot reports. It also shows how to use the data in a PowerPivot workbook as a data source for reports created in other tools such as Report Builder 3.0 and Excel. Chapter 7, "Preparing for SharePoint 2010," is the first chapter in Part III of the book. It describes the components of SharePoint 2010 that are relevant for PowerPivot, and looks at how PowerPivot for SharePoint interacts with those components. Chapter 8, "PowerPivot for SharePoint Setup and Configuration," provides instructions on how to set up and configure a multi-machine SharePoint farm that contains PowerPivot for SharePoint. Chapter 9, "Troubleshooting, Monitoring, and Securing PowerPivot Services," gives tips on how to troubleshoot PowerPivot for SharePoint issues. It also shows how to monitor the health of your PowerPivot for SharePoint environment, and discusses relevant security issues. Chapter 10, "Diving into the PowerPivot Architecture," describes at a deeper level the architecture of PowerPivot, both client and server. It also explains the Windows Identity Foundation and discusses the use of Kerberos in the context of PowerPivot for SharePoint. Chapter 11, "Enterprise Considerations," talks about common PowerPivot for SharePoint enterprise considerations: capacity planning, optimizing the environment, upgrade considerations, and uploading performance. Appendix A provides instructions for setting up the data sources that are used to build the SDR Healthcare extended example in Chapters 3 through 6. Additionally, two "bonus" elements are available online at this book's companion Web site: Appendix B is a comprehensive DAX reference that describes all the DAX functions and provides code snippets that show how to use them. A special chapter describes real-world scenarios in which PowerPivot is used to solve common problems.

Sklep: Libristo.pl

Dark Web - 2826663972

724,08 zł

Dark Web Springer, Berlin

Książki / Literatura obcojęzyczna

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. §This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions: methodological issues in Dark Web research; database and computational techniques to support information collection and data mining; and legal, social, privacy, and data confidentiality challenges and approaches. It will bring useful knowledge to scientists, security professionals, counterterrorism experts, and policy makers. The monograph can also serve as a reference material or textbook in graduate level courses related to information security, information policy, information assurance, information systems, terrorism, and public policy.

Sklep: Libristo.pl

Counterterrorism and Cybersecurity - 2841438295

348,93 zł

Counterterrorism and Cybersecurity Springer, Berlin

Książki / Literatura obcojęzyczna

Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood.§Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO s Supreme Allied Commander James Stavridis: Instead of building walls to create security, we need to build bridges. The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: If you control the code, you control the world. §Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that our problems are manmade therefore they can be solved by man [or woman], as President John F. Kennedy said at the American University commencement in June 1963.

Sklep: Libristo.pl

Blondie 24 - 2212826918

103,00 zł

Blondie 24 Morgan Kaufmann

Informatyka

Blondie24 tells the story of a computer that taught itself to play checkers far better than its creators ever could by using a program that emulated the basic principles of Darwinian evolution--random variation and natural selection-- to discover on its own how to excel at the game. Unlike Deep Blue, the celebrated chess machine that beat Garry Kasparov, the former world champion chess player, this evolutionary program didn't have access to strategies employed by human grand masters, or to databases of moves for the endgame moves, or to other human expertise about the game of chekers. With only the most rudimentary information programmed into its "brain," Blondie24 (the program's Internet username) created its own means of evaluating the complex, changing patterns of pieces that make up a checkers game by evolving artificial neural networks---mathematical models that loosely describe how a brain works.It's fitting that Blondie24 should appear in 2001, the year when we remember Arthur C. Clarke's prediction that one day we would succeed in creating a thinking machine. In this compelling narrative, David Fogel, author and co-creator of Blondie24, describes in convincing detail how evolutionary computation may help to bring us closer to Clarke's vision of HAL. Along the way, he gives readers an inside look into the fascinating history of AI and poses provocative questions about its future.* Brings one of the most exciting areas of AI research to life by following the story of Blondie24's development in the lab through her evolution into an expert-rated checkers player, based on her impressive success in Internet competition.* Explains the foundations of evolutionary computation, simply and clearly.* Presents complex material in an engaging style for readers with no background in computer science or artificial intelligence.* Examines foundational issues surrounding the creation of a thinking machine.* Debates whether the famous Turing Test really tests for intelligence.* Challenges deeply entrenched myths about the successes and implication of some well-known AI experiments * Shows Blondie's moves with checkerboard diagrams that readers can easily follow.

Sklep: Albertus.pl

szukaj w Kangoo krainaksiazek security and intelligence issues in an evolving world 20124277

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z krainaksiazek pl security and intelligence issues in an evolving world 20124277

2. Szukaj na wszystkich stronach serwisu

t1=0.083, t2=0, t3=0, t4=0.028, t=0.083

Dla sprzedawców

copyright © 2005-2017 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER