logo xn--d1abyckug.xn--p1ai XN--D1ABYCKUG.XN--P1AI | Личный кабинет | Контакты | Доставка

Marco Schlesiger Human Security vs. Collective Security?


Книга "Human Security vs. Collective Security?".

8139 RUR

похожие

Подробнее

Tom Mooney Information Security. A Practical Guide


How do you engage with your peers when they think you're there to stop them working?Corporate information security is often hindered by a lack of adequate communication between the security team and the rest of the organisation . Information security affects the whole company and is a responsibility shared by all staff, so failing to obtain wider acceptance can endanger the security of the entire organisation . Many consider information security a block, not a benefit, however, and view security professionals with suspicion if not outright hostility. As a security professional, how can you get broader buy-in from your colleagues?Information Security: A Practical Guide addresses that issue by providing an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.Product overviewCovering everything from your first day at work as an information security professional to developing and implementing enterprise-wide information security processes, Information Security: A Practical Guide explains the basics of information security, and how to explain them to management and others so that security risks can be appropriately addressed.Topics covered include:How to understand the security culture of the organisationGetting to know the organisation and building relationships with key personnelHow to identify gaps in the organisation's security set-upThe impact of...

6139 RUR

похожие

Подробнее

Security Metal Detector PD140 Handheld Instrument Checker Airport Railway Station Stadium

Security Metal detector handheld security monitoring detection anti-theft anti-eavesdropping radio wave induction alarm

Аккумулятор Security Force / Alarm АКБ-7 SF 1207

Security Detector GC-1002 High Sensitivity Handheld Metal Instrument Door Station Entertainment Lighter Detect

Shaek Rana Mohammad Baki Billah and Hafizur Rahman Design & Development of Network Security System using IP Tables


This is the project which is design & development of network security in a bank using IP tables, which will improve & develop the network security of a banking system. This project is divided into three parts, Banking system, Server’s configuration & Network security system. We have tried to improve the security level and server’s configuration, briefly described about different types of servers like DNS, FTP, Telnet, NFS, SSH, Mail, Web, Proxy, DHCP & Samba servers, also described how to configure these servers. In network security system, we have briefly described about security system of computer network, types of security, network security, types of computer network security, process of network security, security system using Linux, the methods of providing security in Linux network, services of Linux system security & implementation security system using IP tables. Eight case studies have also implemented. Our proposed techniques will perform better in the banking system and it will ensure the security of information of banking databases. There may be some limitations. In future we will try our best to resolve these problems as well as we will submit this paper.

5473 RUR

похожие

Подробнее

Valtteri Niemi LTE Security


Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms employed to meet these requirements. Whilst the industry standards inform how to implement systems, they do not provide readers with the underlying principles behind security specifications. LTE Security fills this gap by providing first hand information from 3GPP insiders who explain the rationale for design decisions. Key features: Provides a concise guide to the 3GPP/LTE Security Standardization specifications Authors are leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP Shows how GSM and 3G security was enhanced and extended to meet the requirements of fourth generation systems Gives the rationale behind the standards specifications enabling readers to have a broader understanding of the context of these specifications Explains why LTE security solutions are designed as they are and how theoretical security mechanisms can be put to practical use

8450.67 RUR

похожие

Подробнее

Dileep Keshava Narayana IT Application Security and Control


Document from the year 2012 in the subject Computer Science - IT-Security, grade: 98, University of Greenwich (University of Greenwich), course: Network & Computer systems security, language: English, abstract: This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.

3202 RUR

похожие

Подробнее

Al-Obaidy Abeer Improving Security Methods for E-Commerce Websites


if you want to learn a new methods about how to increase your security sessions during buying or selling any kind of goods ,please read my book. my book is interested in the following topics 1- Web Security 2- E-Commerce Websites 3- Encryption and decryption new complex security methods. 4- improving Twofish security method. 5- How to Increse the security between E-Commerce Websites and Online Banking system during purchasing any goods. 6- suggest more than two new powerful security methods depending on irreducible polynomials

9639 RUR

похожие

Подробнее

Jean Cédric Obame Emane Global Security, the Number One Dilemma of World Community. Case United States


Doctoral Thesis / Dissertation from the year 2018 in the subject Politics - International Politics - Topic: Peace and Conflict Studies, Security, grade: A, Atlantic International University, course: Doctor of International Relations with a major in International Security, language: English, abstract: This paper is an attempt to deconstruct the concept of security which has been by tradition exclusively confined to the military realm. We make evident that security takes into consideration a number of fields and that its major concern is the human person. In addressing security in this work, we do not only refer to the security of states - the concept of national security -, but also to that of individuals - human security -.Governments should integrate in their security agendas not only their own security, but also the security of their nationals. Accordingly, this implies that they should protect their citizens against any threat to human life. In other words, governments or the people they rule do not merely face military threats from other states; they are as well endangered by other threats to their security, these threats are debated in this research paper. We do not mean that military issues are not to be conceptualized within security frameworks, but we do contend that they are not the unique issues to be securitized. Indeed, this paper displays that other issues should be securitized.

6277 RUR

похожие

Подробнее

Nicole Detraz International Security and Gender


What does it mean to be secure? In the global news, we hear stories daily about the wars in Iraq and Afghanistan, about domestic-level conflicts around the world, about the challenges of cybersecurity and social security. This broad list highlights the fact that security is an idea with multiple meanings, but do we all experience security issues in the same way? In this book, Nicole Detraz explores the broad terrain of security studies through a gender lens. Assumptions about masculinity and femininity play important roles in how we understand and react to security threats. By examining issues of militarization, peacekeeping, terrorism, human security, and environmental security, the book considers how the gender-security nexus pushes us to ask different questions and broaden our sphere of analysis. Including gender in our analysis of security challenges the primacy of some traditional security concepts and shifts the focus to be more inclusive. Without a full understanding of the vulnerabilities and threats associated with security, we may miss opportunities to address pressing global problems. Our society often expects men and women to play different roles, and this is no less true in the realm of security. This book demonstrates that security debates exhibit gendered understandings of key concepts, and whilst these gendered assumptions may benefit specific people, they are often detrimental to others, particularly in the key realm of policy-making.

5539.88 RUR

похожие

Подробнее

Golden Security 10Pcs 90dB Wireless Home Window Door Burglar Alarm System Magnetic Sensor for

3 Plate Lock Retro Security Mechanical Combination File Cabinet Password Dial Accessories

Zoohi Security Camera System Kit 1080P 2MP CCTV Home 8CH Outdoor WIFI Night Vision

4 CH Security Camera System CCTV DVR 4CH x 4MP 4.0mp DIY Kits

Golden Security Outdoor 1080P PoE Camera 720P ONVIF Waterproof IP CCTV 36PCS IR LED

1pcs Mini security alarm Home Security Smart Burglar Alarm wired 120db 5/12/24V 120dB Loudly

Classic Retro Security Lock Mechanical Combination 4 Board File Cabinet Password Accessories

Golden Security 4CH AHD 1080P DVR Camera System 2PCS Weatherproof Bullet CCTV Home Surveillance Kit

1pcs Mini security alarm Home Security Smart Burglar Alarm wired 120db 5/12/24V 120dB Loudly Siren

DG006 Zinc Alloy Security Door Guard Extruded Latch Chain Swing Bar For Home Etc

Yobang Security Wireless wifi GSM Home Alarm System IOS Android APP with siren

200W 180 Degree Wifi Camera 1080P FHD Security Panoramic Night Vision camera System For Home Cam

Xavier Hollenbeck 2016 Computer Security Procedures


2016 Computer Security Procedures documents the latest in computer and network security procedures.

3727 RUR

похожие

Подробнее

Federal Security Agency Social Yearbook for the Calendar Year 1941


Эта книга — репринт оригинального издания (издательство "Federal Security Agency, Social Security Board", 1942 год), созданный на основе электронной копии высокого разрешения, которую очистили и обработали вручную, сохранив структуру и орфографию оригинального издания. Редкие, забытые и малоизвестные книги, изданные с петровских времен до наших дней, вновь доступны в виде печатных книг.Social Security Yearbook for the Calendar Year 1941.

847 RUR

похожие

Подробнее

Federal Security Agency Social Yearbook, 1943


Эта книга — репринт оригинального издания (издательство "Federal Security Agency, Social Security Board", 1944 год), созданный на основе электронной копии высокого разрешения, которую очистили и обработали вручную, сохранив структуру и орфографию оригинального издания. Редкие, забытые и малоизвестные книги, изданные с петровских времен до наших дней, вновь доступны в виде печатных книг.Social Security Yearbook, 1943.

812 RUR

похожие

Подробнее

Federal Security Agency Social Yearbook, 1945


Эта книга — репринт оригинального издания (издательство "Federal Security Agency, Social Security Administration", 1946 год), созданный на основе электронной копии высокого разрешения, которую очистили и обработали вручную, сохранив структуру и орфографию оригинального издания. Редкие, забытые и малоизвестные книги, изданные с петровских времен до наших дней, вновь доступны в виде печатных книг.Social Security Yearbook, 1945.

815 RUR

похожие

Подробнее

Federal Security Agency Social Yearbook for the Calendar Year 1939


Эта книга — репринт оригинального издания (издательство "Federal Security Agency, Social Security Board", 1940 год), созданный на основе электронной копии высокого разрешения, которую очистили и обработали вручную, сохранив структуру и орфографию оригинального издания. Редкие, забытые и малоизвестные книги, изданные с петровских времен до наших дней, вновь доступны в виде печатных книг.Social Security Yearbook for the Calendar Year 1939.

846 RUR

похожие

Подробнее

John Voeller G. Cyber Security


Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

1977.62 RUR

похожие

Подробнее

Вебкамера Perfeo Security PF_A4036

Stephen Amidon Security


Книга "Security".

1814 RUR

похожие

Подробнее

Pieter Arlow C. Industrial Security. Managing Security in the 21st Century


A comprehensive and practical guide to security organization and planning in industrial plants Features Basic definitions related to plant security Features Countermeasures and response methods Features Facilities and equipment, and security organization Topics covered are applicable to multiple types of industrial plants Illustrates practical techniques for assessing and evaluating financial and corporate risks

6910.54 RUR

похожие

Подробнее

Federal Security Agency Social Yearbook for the Calendar Year 1942


Эта книга — репринт оригинального издания (издательство "Federal Security Agency, Social Security Board", 1943 год), созданный на основе электронной копии высокого разрешения, которую очистили и обработали вручную, сохранив структуру и орфографию оригинального издания. Редкие, забытые и малоизвестные книги, изданные с петровских времен до наших дней, вновь доступны в виде печатных книг.Social Security Yearbook for the Calendar Year 1942.

825 RUR

похожие

Подробнее

Federal Security Agency Social Yearbook, 1944


Эта книга — репринт оригинального издания (издательство "Federal Security Agency, Social Security Board", 1945 год), созданный на основе электронной копии высокого разрешения, которую очистили и обработали вручную, сохранив структуру и орфографию оригинального издания. Редкие, забытые и малоизвестные книги, изданные с петровских времен до наших дней, вновь доступны в виде печатных книг.Social Security Yearbook, 1944.

815 RUR

похожие

Подробнее

Chris Snyder, Thomas Myer, Michael Southwell Pro PHP Security. From Application Security Principles to the Implementation of XSS Defenses


Книга "Pro PHP Security. From Application Security Principles to the Implementation of XSS Defenses".

6314 RUR

похожие

Подробнее

Advances in Information and Computer Security. 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, Proceedings


Книга "Advances in Information and Computer Security. 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings".

9214 RUR

похожие

Подробнее

Cyber Security and Privacy. Third Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, Revised Selected Papers


Книга "Cyber Security and Privacy. Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers".

7964 RUR

похожие

Подробнее

Cyber Security and Privacy. 4th Privacy Innovation Forum, CSP Forum 2015, Brussels, Belgium April 28-29, Revised Selected Papers


Книга "Cyber Security and Privacy. 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers".

9377 RUR

похожие

Подробнее

Комментарии




Подпишитесь на новинки нашего магазина xn--d1abyckug.xn--p1ai