UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 101.138
1.
  • Business Continuity and Dis... Business Continuity and Disaster Recovery Planning for IT Professionals
    Snedaker, Susan 2013, 2013-09-10T00:00:00, 2013-09-10, c2014
    eBook

    Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. ...
Celotno besedilo
2.
  • Applied Cyber Security and ... Applied Cyber Security and the Smart Grid
    Knapp, Eric D; Samani, Raj 2013, 2013-04-26, c2013
    eBook

    Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new ...
Celotno besedilo
3.
  • The Future of the Internet-... The Future of the Internet--And How to Stop It
    Zittrain, Jonathan 2008, 2008-10-01, 20080101
    eBook

    This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity-and reveals that it is sputtering precisely because of its runaway success. With the unwitting ...
Celotno besedilo
4.
  • Securing the Cloud Securing the Cloud
    Winkler, Vic (J. R. ) 2011, 2011-04-21, c2011
    eBook

    As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult ...
Celotno besedilo
5.
  • Technology, Policy, Law, an... Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
    National Research Council; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board ... 11/2009
    eBook
    Odprti dostop

    The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on ...
Celotno besedilo
6.
  • Hacking Web Apps Hacking Web Apps
    Shema, Mike 2012, 2012-10-22, c2012
    eBook

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by ...
Celotno besedilo
7.
  • XSS Attacks XSS Attacks
    Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov 2011, 2007, 2011-04-18
    eBook

    A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSSAttacks starts by ...
Celotno besedilo
8.
  • Managing Cyber Attacks in I... Managing Cyber Attacks in International Law, Business, and Relations
    Shackelford, Scott J. 07/2014
    eBook

    This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up ...
Celotno besedilo
9.
  • Cloud Computing Cloud Computing
    Ruparelia, Nayan B The MIT Press eBooks, 05/2016
    eBook
    Odprti dostop

    Most of the information available on cloud computing is either highly technical, with details that are irrelevant to non-technologists, or pure marketing hype, in which the cloud is simply a selling ...
Celotno besedilo
10.
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 101.138

Nalaganje filtrov