Erweiterte Suche
Preis einschränken:


Melden Sie sich jetzt an und erhalten Sie regelmäßig Informationen über neue Produkte, Sonderangebote oder neue Gutscheine.

Mit * gekennzeichnete Felder sind Pflichtfelder.

59,00 EUR*
Details Economic Relevance of IT-Security: Austria in the International Comparison

Economic Relevance of It-Security IT-security sounds like a subject purely for a company's IT-department, for the IT-specialists alone. But IT-security definitely is more than just a technical "toy," its influence on a company's performance is real ...

85,59 EUR*
Details IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms (Lecture Notes in Computer Science)

IT-security and Privacy Invasion of privacy and misuse of personal data are some of the negative effects of information and communication technologies. Taking into account technical aspects from IT security, this book presents a task-based privacy ...

101,64 EUR*
Details Embedded Security in Cars: Securing Current and Future Automotive IT Applications

Embedded Security in Cars Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next ...

145,63 EUR*
Details Management of Information Security

Management of Information Security Suitable for Information Security professionals, managers of IT employees, business managers, organizational security officers, network administrators, students or Business and Information Systems, IT, Accounting ...

38,59 EUR*

Symantec Norton Security Deluxe 3.0 2016. Tipo licenze: Full license. Sistema operativo Windows supportato: Windows 10 Education, Windows 10 Education x64, Windows 10 Enterprise, Windows 10 Enterprise x64, Wi, Altri sistemi operativi supportati ...

49,00 EUR*
Details A Six Sigma Approach to Assure IT Security: Secure the Digital World

A Six Sigma Approach to Assure IT Security Today information is considered as an asset just like capital either it is related to a personal or corporate. Global sharing and information losses enforce organizations to think about their information ...

112,00 EUR*
Details Network Security: Current Status and Future Directions

Network Security This book covers a wide range of topics dealing with network security. It is focused on the current status of security protocols, architectures, implementations and policies. It makes future projections by analyzing current research ...

59,44 EUR*
Details IT-Security-Box 2014, CD-ROM JahresEdition 2014

JahresEdition 2014CD-ROMWas Sie erwarten dürfen:- Alle Tipps und Tricks aus dem Top-Ratgeber "mIT Sicherheit"- Die besten Beiträge und die besten Tools aus 2014- Geballtes Expertenwissen aus der Praxis für die Praxis = Ihre Zeit- und Kostenersparnis ...

30,97 EUR*
Details Beautiful Security: Leading Security Experts Explain How They Think

Beautiful Security An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design ...

102,16 EUR*
Details Technology and Security: Governing Threats in the New Millennium (New Security Challenges)

Technology and Security This book takes forward the existing state of academic understanding where security and technology intersect. It assesses the challenges posed by emerging scientific and technological developments for security while ...

67,36 EUR*
Details Security Law and Methods

Security Law and Methods Examines suggested security methods designed to diminish or negate the consequence of crime and misconduct. This book explains crime prevention methods in light of legal and security principles. It is divided into 5 parts and ...

75,99 EUR*
Details Network Security: Private Communication in a Public World (Prentice Hall Series in Computer Networking and Distributed)

Network Security A comprehensible guide to network security. It explains the developments in this field that has become so critical to our global network-dependent society. It brings together insightful explanations of various key facets of ...

45,99 EUR*
Details Emergency Notification (PSI Business Security)

Emergency Notification Effective emergency notification makes things 'right', it allows the right message to reach the right people at the right time - facilitating the right response. This book explains how. It also covers risk communication, message ...

19,01 EUR*
Details F-Secure Internet Security 2015 - 1 Jahr / 1 PC

Vollversion Internet Security 2015 with 1Y Support and Maintenance 1Y 1u DE/FR/IT

84,84 EUR*
Details Cloud Computing: Implementation, Management, and Security

Cloud Computing Presenting an understanding of what cloud computing really means, this title explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to ...

33,95 EUR*
Details Virtualization Security: Protecting Virtualized Environments

Virtualization Security Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes ...

41,68 EUR*
Details Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

ITIL 2011 at a Glance IT organizations worldwide are implementing ITIL[registered] as a vehicle for improving IT service quality and improve return on investment for IT services. This title provides graphical and textual memory joggers for the primary ...

63,67 EUR*
Details A Practitioner's Guide to Effective Maritime and Port Security

This book specifically addresses the maritime security environment with proposals to make international trade and maritime transportation more secure and cost effective. It provides a comprehensive approach to implementing security measures that ...

41,68 EUR*
Details Security Log Management: Identifying Patterns in the Chaos

Security Log Management Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools ...

66,49 EUR*
Details Insuring Inequality: Administrative Leadership in Social Security, 1935-54

Insuring Inequality The story of the conflict of values and of the short-sighted compromise that resulted in the Social Security system as we know it today Full description

24,49 EUR*
Details Aden + Anais Issie Security Blanket - Twinkle

Babies thrive on routine and familiarity. aden + anais security blankets, also known as Issie's are made from the same, lightweight, breathable 100% cotton muslin, as our swaddles and sleeping bags. Each Issie is 40cm by 40cm, making it the perfect ...

40,61 EUR*
Details Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) ...