Nejnižší cena za posledních 60 dní: 1 337 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today's technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A compromise has to be struck between security of information and its availability. This book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today's technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A
MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current
This third edition of Moral Constraints on War offers a principle by principle presentation of the ethics of war as is found in the age-old tradition of the Just War. Parts one and two trace the evolution of Just War Theory, analyzing the principles of jus ad bellum and jus in bello: the principles
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are
Data is a valuable corporate asset and its effective management can be vital to an organisation's success. This professional reference guide covers all the key areas of data management including database development, data quality and corporate data modelling. It is not based on a particular
The Principles of Endodontics, Third Edition is a contemporary and easy-to-read guide on why and how to carry out safe and effective endodontic treatment. Fully revised and updated, the third edition applies endodontic theory to clinical practice in a pragmatic and user-friendly way. This
'Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks,
Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than
Born in 1856, Taylor began work at age eighteen as an apprentice to a pattern-maker and as a machinist. A few years later he joined the Midvale Steel Company as a laborer, and in eight years rose to chief engineer. During this time he developed and tested what he called the 'task system,' which
Taiwan's position looks increasingly precarious, and tensions threaten to grow into a major strategic crisis. Chinese President Xi Jinping has made reunification with Taiwan a central pillar of his vision for China, and has ramped up diplomatic and economic pressure on Taiwan. Its inhabitants are
Instrumentation and Control Systems, Third Edition, addresses the basic principles of modern instrumentation and control systems, including examples of the latest devices, techniques and applications. The book provides a comprehensive introduction on the subject, with Laplace presented in a simple
Newly revised and containing information from recent excavations and discovered artifacts, Ancient Iraq covers the political, cultural, and socio-economic history from Mesopotamia days of prehistory to the Christian
Sport Nutrition, Third Edition, presents the principles and rationale for current nutrition guidelines for athletes. Using a physiological basis, this text provides an in-depth look at the science behind sport nutrition. Students will come away with an understanding of nutrition as it relates to
The latest edition of a highly successful textbook, MassSpectrometry, Third Edition provides students with a completeoverview of the principles, theories and key applications of modernmass spectrometry. All instrumental aspects of mass spectrometryare clearly and concisely described: sources,
Wine Science: Principles and Applications, Fifth Edition, delivers in-depth information and expertise in a single, science-focused volume, including all the complexities and nuances of creating a quality wine product. From variety, to the chemistry that transforms grape to fruit to wine, the book
Now in a fully revised and updated third edition, Sport Facility Operations Management goes beyond the basic theories of sport facility management to include relevant practical professional experiences connecting facilities, people, and technology. This is a comprehensive and engaging textbook
Principles and Practice of Big Data: Preparing, Sharing, and Analyzing Complex Information, Second Edition updates and expands on the first edition, bringing a set of techniques and algorithms that are tailored to Big Data projects. The book stresses the point that most data analyses conducted on
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP(R)) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the