Kategorien
Handverlesen
Alice Munro
Paul Auster
Über Mütter
Archiv
Viel besprochen
Bücherschau des Tages
Literaturbeilagen
Bücherbrief
Bücher der Saison
Bestenlisten
Ausgezeichnet
Selbst gelesen
von Marie-Luise Knott
von Thekla Dannenberg
von Peter Truschner
von Angela Schader
Wer wir sind
Datenschutz
Impressum
Gutschein
Kostenloser Newsletter
Der
Perlentaucher unter den Buchläden
Eichendorff21
Warenkorb
Einloggen oder registrieren
Genauer suchen (16 Treffer)
Filter schließen (16 Treffer)
Stichwort auswählen
Alle Stichworte
Denial of Service (16)
Bioinformatics (4)
IT Security (4)
Access Control (3)
Communication (3)
E-Commerce (3)
Information (3)
Multimedia (3)
Tools (3)
Algorithms (2)
Approximation Algorithms (2)
Assignment Problems (2)
Audit (2)
Auditor (2)
Computer Architecture (2)
Computer Science (2)
Computer Security (2)
Configuration (2)
Data Analysis (2)
Data Warehouse (2)
Directed Graphs (2)
Distributed Computing (2)
Distributed Systems (2)
Education (2)
Evaluation (2)
Game Theory (2)
Graph Theory (2)
Heuristic Methods (2)
Mapping (2)
Modeling (2)
Network Security (2)
Problem Solving (2)
Protection (2)
Provable Security (2)
Proving (2)
Radio (2)
Routing (2)
Routing Protocols (2)
Sensor Networks (2)
Sicherheit (2)
Signal Processing (2)
Software Engineering (2)
Wireless Networks (2)
Access (1)
Algorithmen (1)
Architecture (1)
Authentication (1)
B2b (1)
Betriebssystem (1)
Bluetooth (1)
Broadcast (1)
Buch (1)
Building Control (1)
Cyber-Attack Vector (1)
Cyber-Physical Attack (1)
Data Management (1)
Data Security (1)
Electronic Business (1)
Electronic Commerce (1)
Ethical Hacking (1)
Exploit (1)
Exploitation (1)
Faraday (1)
Firewall (1)
Forensik (1)
Grid Computing (1)
Hacker (1)
Hacking (1)
Healthcare Informatics (1)
Hospital Database (1)
Hospital Informatics (1)
Hospital Insider Threat (1)
Hospital Network (1)
Hospital Web Application (1)
Iot (1)
Ipv6 (1)
IT Sicherheit (1)
Kali Linux (1)
Load Balancing (1)
Medical Equipment Attack (1)
Metasploit (1)
Mitp (1)
Monitor (1)
Network Management (1)
Network Mapping (1)
Ofdm (1)
Openvas (1)
Optimierung (1)
Organization (1)
Overlay (1)
Peer (1)
Penetrationstest (1)
Pentest (1)
Pentesting (1)
Performance (1)
Qos (1)
Quality of Service (1)
Quality of Service (qos) (1)
Scada Systems (1)
Schwachstellenanalyse (1)
Schlagwort-Sachbuch auswählen
Schlagwort Sachbuch
Expertensysteme (3)
Informationstheorie (3)
Kodierungstheorie und Verschlüsselung (kryptologie) (3)
Wissensbasierte Systeme (3)
Numerische Mathematik (2)
E-Business (1)
E-Commerce (1)
IT-Management (1)
Netzwerk-Hardware (1)
Netzwerksicherheit (1)
Open-Source und Sonstige Betriebssysteme (1)
Wirtschaftsmathematik und -Informatik (1)
Sprache auswählen
Sprachen
Englisch (14)
Deutsch (2)
Buchform auswählen (BC=Taschenbuch,BB=Gebunden)
Formate
Taschenbuch (13)
Gebunden (3)
Nur mit
-Notizen
Auf Lager
Sortiert nach
Übereinstimmung
Neueste
Preis absteigend
Preis aufsteigend
Seitenzahl aufsteigend
Seitenzahl absteigend
Suchergebnis
Gefundene Autoren:
Anoop Singhal
oder
Luis Ayala
oder
Jürgen Ebner
oder
K. J. Ray Liu
oder
Yan Sun
Jürgen Ebner
Einstieg in Kali Linux
Penetration Testing und Ethical Hacking mit Linux
MITP Verlags GmbH
2023
Taschenbuch
399 Seiten
33,00
€
Auf Lager
* **Von der Installation über die Konfiguration bis hin zum Einsatz der wichtigsten Tools** * **Detaillierter Ablauf von Security Assessments und Du…
eng
Combinatorial Optimization and Applications
11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I
Springer International Publishing
2017
Taschenbuch
504 Seiten
53,49
€
in Kürze
The two-volume set LNCS 10627 and 10628 constitutes the refereed proceedings of the 11th International Conference on Combinatorial Optimization and A…
eng
Combinatorial Optimization and Applications
11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part II
Springer International Publishing
2017
Taschenbuch
548 Seiten
53,49
€
in Kürze
The two-volume set LNCS 10627 and 10628 constitutes the refereed proceedings of the 11th International Conference on Combinatorial Optimization and A…
eng
Luis Ayala
Cybersecurity for Hospitals and Healthcare Facilities
A Guide to Detection and Prevention
Apress
2016
Taschenbuch
156 Seiten
80,24
€
in Kürze
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipmen…
eng
Network Security
Springer US
2014
Taschenbuch
292 Seiten
117,69
€
in Kürze
eng
Future Challenges in Security and Privacy for Academia and Industry
26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings
Springer Berlin Heidelberg
2013
Taschenbuch
344 Seiten
53,49
€
in Kürze
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switz…
eng
Information Security for Global Information Infrastructures
IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22¿24, 2000, Beijing, China
Springer US
2013
Taschenbuch
528 Seiten
213,99
€
in Kürze
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is t…
eng
Integrated Network Management VIII
Managing It All
Springer US
2013
Taschenbuch
740 Seiten
160,49
€
in Kürze
Welcome to 1M 2003, the eighth in a series of the premier international technical conference in this field. As IT management has become mission criti…
eng
Security in the Information Society
Visions and Perspectives
Springer US
2012
Taschenbuch
600 Seiten
160,49
€
in Kürze
Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society.…
eng
Mastering E-Business Infrastructure
Springer US
2012
Taschenbuch
356 Seiten
160,49
€
in Kürze
eng
Future Challenges in Security and Privacy for Academia and Industry
26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings
Springer Berlin Heidelberg
2011
Gebunden
344 Seiten
53,49
€
in Kürze
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switz…
eng
Anoop Singhal
Data Warehousing and Data Mining Techniques for Cyber Security
Springer US
2010
Taschenbuch
176 Seiten
139,09
€
in Kürze
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and inte…
eng
Yan Sun / K. J. Ray Liu …
Network-Aware Security for Group Communications
Springer US
2010
Taschenbuch
324 Seiten
106,99
€
in Kürze
This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications.…
Kommunikation in Verteilten Systemen (KiVS) 2007
15. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007) Bern, Schweiz, 26. Februar - 2. März 2007
Springer Berlin Heidelberg
2007
Taschenbuch
340 Seiten
82,99
€
in Kürze
Die 15. GI/ITG-Fachtagung "Kommunikation in Verteilten Systemen (KiVS 2007)" befasst sich mit einer großen Vielfalt innovativer und zukunftsorientier…
eng
Anoop Singhal
Data Warehousing and Data Mining Techniques for Cyber Security
Springer US
2006
Gebunden
176 Seiten
106,99
€
in Kürze
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and inte…
eng
Information Security for Global Information Infrastructures
IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22¿24, 2000, Beijing, China
Springer US
2000
Gebunden
528 Seiten
213,99
€
in Kürze
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is t…