Hľadanie: Cisco Router Firewall Security EN
zobraziť:
Security Breach Files (Five Nights at Freddys)
Everything fans need to know about the Five Night's at Freddy's game, 'Security Breach'! This deep dive into the Five Nights at Freddy's game is the perfect addition to any fan's library. From the newest animatronics to the deepest maps and easter eggs, everything is laid out in awesome detail that will deepen the knowledge of even the most enthusiastic player. A must-have for Freddy Fans With even more horror than ever before Full colour art inside
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
Full-length practice tests covering all CISSP domains for the ultimate exam prep
The (ISC)2 CISSP Official Practice Tests is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain. You also have access to four unique 125-question practice exams to help you master the material. As the only official practice tests endorsed by (ISC)2, this book gives you the advantage of full and complete preparation. These practice tests align with the 2021 version of the exam to ensure up-to-date preparation, and are designed to cover what you will see on exam day. Coverage includes: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security.
The CISSP credential signifies a body of knowledge and a set of guaranteed skills that put you in demand in the marketplace. This book is your ticket to achieving this prestigious certification, by helping you test what you know against what you need to know.
Test your knowledge of the 2021 exam domains
Identify areas in need of further study
Gauge your progress throughout your exam preparation
Practice test taking with Sybex’s online test environment containing the questions from the book
The CISSP exam is refreshed every few years to ensure that candidates are up-to-date on the latest security topics and trends. Currently-aligned preparation resources are critical, and periodic practice tests are one of the best ways to truly measure your level of understanding.
Vypredané
37,99 €
39,99 €
Security Analysis (Sixth Edition)
"A road map for investing that I have now been following for 57 years."
From the Foreword by Warren E. Buffett First published in 1934, Security Analysis is one of the most influential financial books ever written. Selling more than one million copies through five editions, it has provided generations of investors with the timeless value investing philosophy and techniques of Benjamin Graham and David L. Dodd.
As relevant today as when they first appeared nearly 75 years ago, the teachings of Benjamin Graham, "the father of value investing," have withstood the test of time across a wide diversity of market conditions, countries, and asset classes.
This new sixth edition, based on the classic 1940 version, is enhanced with 200 additional pages of commentary from some of today's leading Wall Street money managers. These masters of value investing explain why the principles and techniques of Graham and Dodd are still highly relevant even in today's vastly different markets.
Vypredané
68,40 €
72,00 €
Bezpečnost a riziko na skále I.díl
Stále více lezců trpí představou, že lezení na skalách je naprosto bez rizika.
Kniha dlouholetého předsedy Bezpečnostní komise UIAA, Vám pomůže tento blud překonat dříve, než se o tom přesvědčíte na vlastní kůži. Jednotlivé kapitoly se zabývají n
ebezpečnými situacemi při všech běžných úkonech jak na skalách, tak v horách. Není to nudné školometské varování, knihu budete číst jako napínavý příběh, byť zpravidla se smutným koncem. Na desítkách skutečných nehod, na jejichž analýze se autor podí
lel, zjistíte, že k smrtelnému úrazu může dojít jak v lehkém, tak těžkém terénu, jak při závodech na překližce, tak při sólo výstupu v horách. A zdaleka to není jen vina volby materiálu - většinou jde o lidskou a zdánlivě drobnou chybu. Prostě studni
ce poznání pro každého lezce a horolezce jakéhokoliv věku.
Ne, autorovým cílem není Vás odradit od lezení, ale jeho informace a závěry určitě přispějí k zdravému přežití i tak nebezpečné zábavy jakou horolezectví vždy bylo a zůstane.
Karel Svoboda: Žít
Karel Svoboda – bohem nadaný skladatel, neúnavný hitmaker, který svou hudbou dokázal dobýt svět. Zůstaly po něm stovky nádherných písní, z nichž mnohé jsou milované dodnes: Lady Carneval, Depeše, Včelka Mája, Čau, lásko... Složil hudbu k desítkám filmů a seriálů u nás i v zahraničí: Tři oříšky pro Popelku, Návštěvníci, Cirkus Humberto... A proslavil se také svými hudebně i vizuálně podmanivými muzikály v čele s Draculou.
Obsáhlá obrazová monografie Žít představuje Karla Svobodu jako člověka zcela oddaného své práci, který si však zároveň dokázal vychutnávat život plnými doušky a nezkazil žádnou zábavu. Poodhaluje mnoho zajímavostí o jeho životě, dětství, cestě na vrchol, o šťastném rodinném zázemí i o jeho nesmírně smutném konci. Vypráví o složitém vzniku Karlova nahrávacího studia i rekonstrukci vily v Jevanech, kde si vybudoval svůj soukromý ráj a tvůrčí prostor, o večírcích, které končily až nad ránem, o nekončících problémech tvorby na dvou stranách železné opony, i o posedlosti skládáním hudby, které bylo neoddiskutovatelným smyslem jeho života.
Kniha obsahuje mnoho unikátních zápisků a dosud nepublikovaných fotografií, a osobnost Karla Svobody přibližuje i v exkluzivních vzpomínkách jeho blízkých spolupracovníků a přátel, z nichž mnozí se také nesmazatelně zapsali do dějin české i světové kultury.
Cesta k jednoduchosti
Nadčasové úvahy inspirativní rebelky
Cesta k jednoduchosti je souborem textů Mileny Jesenské, který poprvé vyšel již roku 1926, a přesto dokáže i dnes, téměř o století později, oslovit a inspirovat. Autorka uvažuje o lásce, manželství, věrnosti, přátelství, módě a emancipaci, ale i o kráse, radosti ze života a vůbec o ženách a jejich pohledu na svět. Kniha tak nabízí spojení otázek módních, etických i politických v době „po všem válečném a poválečném víru, v jakémsi zdánlivém klidu a v klamné stabilitě“, jak sama Jesenská trefně hodnotila čas vzniku předkládaných fejetonů. Texty mnoha legendami opředené publicistky se pyšní peprnými bonmoty i pasážemi plnými hluboké lidské empatie. Nadčasově svěží Jesenské styl a univerzální tematika poodhalují, jak se v autorce prala dobová perspektiva i rebelie, tvrdá kritika i porozumění. Ona totiž „jednoduchost není vůbec jednoduchá“.
Překladatelka a novinářka Milena Jesenská byla jednou z ženských osobností, které reprezentovaly intelektuální československou meziválečnou republiku a spoluvytvářely tvář nové společnosti. Z jejích textů jasně vystupuje osobnost ženy zakořeněné v tradici, avšak směřující od moderny k avantgardě – dámy s (na svou dobu) liberálními názory a silným sociálním cítěním. Životní příběh Mileny Jesenské rovněž vzrušuje a inspiruje, stal se také nosným tématem četných literárních děl.
Na sklade 4Ks
10,40 €
10,95 €
Passwords - Philology, Security, Authentication
Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing's humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.
Lennon's history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.
Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist's scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing--passwords--that many of us use every day.
Vypredané
37,00 €
38,95 €
Security Analysis
My Advice? Go back to Graham and do your best to take it from there' - "Business Week". A classic - Those words can be applied without equivocation to the Security Analysis of 1934. This book secured Benjamin Graham's stature as a Wall Street immortal. The carefully honed methods for finding undervalued stocks and bonds he described here have never been equalled. These methods have already outlived their author by more than 20 years. But what of the original "Security Analysis"?In some ways, it too was immortal. Through five editions and nearly a million copies, it has been continuously in print for more than 60 years. With many additions and changes, the modern edition remains the investors' bible. But this original 1934 First Edition has its own unique charm and style - the special purity, elegance, and character of Graham as a man of letters - that distinguishes it across six decades and shows why this book launched an investing revolution. This authetic copy of the 1934 First Edition of "Security Analysis" gives you word for eloquent word the investing methods put forth by Benjamin Graham and his coauthor and follower, David Dodd, just five years after the infamous Stock Market Crash of '29. Its message today is just as vivid, just as lucid, and just as vital as it was in 1934. It's an investment in timeless wisdom and timeless value.
Politika nejen pro mladé
Proč by se měl zapojit každý z nás a kde začít?
Zájem o politiku je (nejen) mezi mladými lidmi v Česku nízký. A to je škoda, vždyť právě politika ovlivňuje život každého z nás dnes a denně. Tato kniha se snaží vyvracet mylné mínění, že politika je něco vzdáleného, složitého, špinavého, či dokonce nedůležitého. Čtenářům naopak odpovídá na časté otázky: Proč je důležité se zajímat? Jak je možné se zapojit? Kde hledat informace?
Ve třinácti přehledných kapitolách najdete vysvětlení, jak funguje dnešní rychlý svět plný informací i dezinformací, a dozvíte se o mnoha aktuálních tématech, která pálí (nejen) mladé lidi.
Publikace vznikla ve spolupráci s autorským týmem zapojeným do projektu Politika (nejen) pro mladé, který si klade za cíl šířit mezi mladými lidmi informace o politice a probudit v nich zájem o veřejné dění. Protože informovaná a angažovaná občanská společnost je základem zdravé demokracie.
Na sklade 2Ks
20,84 €
21,94 €
Biograf láska
Inspirováno písněmi Hany Zagorové
Hana, Alča a Eva jsou nerozlučné kamarádky. Hana je svobodná matka, romantická duše, která vlastní retro kavárnu Biograf láska a DVD sbírku romantických devadesátkových filmů, v jejichž happy endy stále ještě věří. Novinářka Alča se k lásce staví poměrně cynicky a dává to svému okolí často ostře najevo. A vždy dokonale upravená Eva žije ve své zdánlivě dokonalé bublině, v manželství s úspěšným manažerem.
Každá je jiná, každá se potýká s jinými životními peripetiemi, ale vše zvládají prožívat s humorem a nadhledem. Umí si ze sebe dělat legraci, dokážou jedna druhé hravě srazit z nosu růžové brýle, ale když je opravdu nejhůř, vždy stojí při sobě. Dočkají se ale té bláznivé romantické lásky, o které všechny tajně sní?
Effective Physical Security
Effective Physical Security, Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors' work that set the standard: Handbook of Loss Prevention and Crime Prevention, Fifth Edition. Designed for easy reference, Effective Physical Security contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessment and Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs. * Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification * Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations * Each chapter is written by a recognized expert security specialist
Vypredané
59,38 €
62,50 €
Security Design Consulting
A crucial reference for the practicing or aspiring design consultant, "Security Design Consulting" brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, "Security Design Consulting" gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program. It focuses on consulting in security design, not security management. It provides sample service agreements, specifications, and reports to use as models. It emphasizes the highest technical and ethical standards for this increasingly crucial profession.
Vypredané
45,39 €
47,78 €
Kytice
Kytice je nejproslulejším dílem českého spisovatele a básníka Karla Jaromíra Erbena. Poprvé byla vydána v roce 1853 pod nezkráceným názvem Kytice z pověstí národních. Pozoruhodná sbírka třinácti skladeb inspirovaných lidovou slovesností poukazuje na hodnotu mezilidských vztahů. Erben v ní věnuje velkou pozornost ženám, povětšinou matkám, neboť podle jeho názoru je nejzákladnějším lidským vztahem pouto mezi matkou a dítětem.
Výjimečně propracovaným, citlivým a jemným stylem doprovodil toto vydání svými ilustracemi výtvarník Martin Augustín. Po předchozí práci na vydání neméně slavného díla, jakým je Máj K. H. Máchy, byl osloven ke spolupráci i na tomto vydání Kytice. Spojení těchto dvou děl osobou výtvarníka je symbolické a stává se trvalou připomínkou obrozenectví obou českých velikánů.
Introduction to Security
Introduction to Security has been the leading introduction to private security for over 30 years, celebrated for its balanced and professional approach to this increasingly important area. Now the 8th edition expands the key topics and adds material important in the 21st century environment. The author team brings together top-level professional experience in industry with years of teaching experience. As a recommended title for security certifications, it is a crucial resource for the 30,000+ ASIS International members, and is also used as a core security textbook in universities throughout the country. This is Butterworth-Heinemann's best-selling security text of all time, an essential reference for all security professionals. * Newest edition of Butterworth-Heinemann's best-selling security book * A recommended text for the 30,000+ members of ASIS-International * Contains essential updated information on internal theft, personnel policies, and drugs and violence in the workplace
Vypredané
62,28 €
65,56 €
Integrated Security Systems Design
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits. * Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design.* Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies.* Demonstrates how to maximize safety while reducing liability and operating costs.
Vypredané
57,00 €
60,00 €
Private Security and the Law
Private Security and the Law, Fourth Edition traces legal developments affecting the private security industry. It examines the industrys staying power and ability to adapt to changes in law enforcement, from street and community protection to the protection of assets, buildings, and people. It considers the roles of law and legal analysis in private-sector justice, and shows how areas such as courts, prisons, policing, and community services are drawn into the world of privatization. The book is divided into eight chapters encompassing topics ranging from the historical foundations of private security to professionalism in the industry. It walks the reader through the laws of arrest, search, and seizure and their applications in the private sector, along with the nature of civil liability and the criminal liability of security personnel. It also discusses the role of private security in enforcing the law and explains how evidence is collected, preserved, and interpreted. Moreover, it compares law enforcement in the public and private sectors and considers the concepts of self-help and self-protection, as well as the constitutional framework of criminal justice in the United States. Other chapters address the place of arrest in private sector justice, challenges to the safe harbor of private security, and positive programs for interaction and cooperation between the public and private sectors in law enforcement. Selected cases that have set precedents for private security are also presented. This book is a valuable resource for security managers and traineers, as well as for educators. *Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION! A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement
Vypredané
62,28 €
65,56 €
Security Engineering 2nd Edition
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Vypredané
81,70 €
86,00 €
Security Supervision and Management : Theory and Practice of Asset Protection
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today's generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). * Core text for completing the Security Supervision and Management Program/Certified in Security Supervision and Management (CSSM) designation offered by IFPO* Contributions from more than 50 experienced security professionals in a single volume* Completely updated to reflect the latest procedural and technological changes in the security industry * Conforms to ANSI/ASIS standards
Vypredané
67,69 €
71,25 €
Cyberphobia : Identity, Trust, Security and the Internet
Crossing the road, we look both ways. Riding a bicycle at night, we use lights. So why is our attitude towards online security so relaxed? Edward Lucas reveals the ways in which cyberspace is not the secure zone we may hope, how passwords provide no significant obstacle to anyone intent on getting past them, and how anonymity is easily accessible to anyone - malign or benign - willing to take a little time covering their tracks. The internet was designed by a small group of computer scientists looking for a way to share information quickly. In the last twenty years it has expanded rapidly to become a global information superhighway, available to all comers, but also wide open to those seeking invisibility. This potential for anonymity means neither privacy nor secrecy are really possible for law-abiding corporations or citizens. As identities can be faked so easily the very foundations on which our political, legal and economic systems are based are vulnerable. Businesses, governments, national security organisations and even ordinary individuals are constantly at risk and with our ever increasing dependence on the internet and smart-phone technology this threat is unlikely to diminish - in fact, the target for cyber-criminals is expanding all the time. Not only does Cyberphobia lay bare the dangers of the internet, it also explores the most successful defensive cyber-strategies, options for tracking down transgressors and argues that we are moving into a post-digital age where once again face-to-face communication will be the only interaction that really matters.
Vypredané
24,23 €
25,50 €