Erweiterte Suche
Preis einschränken:

Newsletter

Melden Sie sich jetzt an und erhalten Sie regelmäßig Informationen über neue Produkte, Sonderangebote oder neue Gutscheine.

Mit * gekennzeichnete Felder sind Pflichtfelder.

59,00 EUR*
Details Economic Relevance of IT-Security: Austria in the International Comparison

Economic Relevance of It-Security IT-security sounds like a subject purely for a company's IT-department, for the IT-specialists alone. But IT-security definitely is more than just a technical "toy," its influence on a company's performance is real ...

85,59 EUR*
Details IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms (Lecture Notes in Computer Science)

IT-security and Privacy Invasion of privacy and misuse of personal data are some of the negative effects of information and communication technologies. Taking into account technical aspects from IT security, this book presents a task-based privacy ...

101,64 EUR*
Details Embedded Security in Cars: Securing Current and Future Automotive IT Applications

Embedded Security in Cars Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next ...

145,63 EUR*
Details Management of Information Security

Management of Information Security Suitable for Information Security professionals, managers of IT employees, business managers, organizational security officers, network administrators, students or Business and Information Systems, IT, Accounting ...

38,59 EUR*
Details NORTON SECURITY DELUXE IT

Symantec Norton Security Deluxe 3.0 2016. Tipo licenze: Full license. Sistema operativo Windows supportato: Windows 10 Education, Windows 10 Education x64, Windows 10 Enterprise, Windows 10 Enterprise x64, Wi, Altri sistemi operativi supportati ...

49,00 EUR*
Details A Six Sigma Approach to Assure IT Security: Secure the Digital World

A Six Sigma Approach to Assure IT Security Today information is considered as an asset just like capital either it is related to a personal or corporate. Global sharing and information losses enforce organizations to think about their information ...

112,00 EUR*
Details Network Security: Current Status and Future Directions

Network Security This book covers a wide range of topics dealing with network security. It is focused on the current status of security protocols, architectures, implementations and policies. It makes future projections by analyzing current research ...

30,97 EUR*
Details Beautiful Security: Leading Security Experts Explain How They Think

Beautiful Security An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design ...

102,16 EUR*
Details Technology and Security: Governing Threats in the New Millennium (New Security Challenges)

Technology and Security This book takes forward the existing state of academic understanding where security and technology intersect. It assesses the challenges posed by emerging scientific and technological developments for security while ...

67,36 EUR*
Details Security Law and Methods

Security Law and Methods Examines suggested security methods designed to diminish or negate the consequence of crime and misconduct. This book explains crime prevention methods in light of legal and security principles. It is divided into 5 parts and ...

75,99 EUR*
Details Network Security: Private Communication in a Public World (Prentice Hall Series in Computer Networking and Distributed)

Network Security A comprehensible guide to network security. It explains the developments in this field that has become so critical to our global network-dependent society. It brings together insightful explanations of various key facets of ...

45,99 EUR*
Details Emergency Notification (PSI Business Security)

Emergency Notification Effective emergency notification makes things 'right', it allows the right message to reach the right people at the right time - facilitating the right response. This book explains how. It also covers risk communication, message ...

19,01 EUR*
Details F-Secure Internet Security 2015 - 1 Jahr / 1 PC

Vollversion Internet Security 2015 with 1Y Support and Maintenance 1Y 1u DE/FR/IT

33,95 EUR*
Details Virtualization Security: Protecting Virtualized Environments

Virtualization Security Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes ...

84,84 EUR*
Details Cloud Computing: Implementation, Management, and Security

Cloud Computing Presenting an understanding of what cloud computing really means, this title explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to ...

63,67 EUR*
Details A Practitioner's Guide to Effective Maritime and Port Security

This book specifically addresses the maritime security environment with proposals to make international trade and maritime transportation more secure and cost effective. It provides a comprehensive approach to implementing security measures that ...

41,68 EUR*
Details Security Log Management: Identifying Patterns in the Chaos

Security Log Management Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools ...