Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (272)Тематичний інтернет-навігатор (20)Автореферати дисертацій (5815)Реферативна база даних (46641)Книжкові видання та компакт-диски (7032)Журнали та продовжувані видання (354)
Пошуковий запит: (<.>K=ЗАХИСТ$<.>+<.>K=КОРПОРАТИВНОЇ$<.>+<.>K=ІНФОРМАЦІЇ$<.>)
Загальна кількість знайдених документів : 492
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   наукове видання   
2.

Alt, B. L.
Fleecing grandma and grandpa [Electronic resource] : protecting Against Scams, Cons, and Frauds / B. L. Alt, S. K. Wells. - Westport : Praeger Publishers, 2004. - 167 p.
Переклад назви: Оббираючи бабусь і дідусів: захист від шахрайства

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Falling for a scam or con is humiliating for anyone, and can have terrible consequences. But for the elderly, being the victim of fraud can be disastrous, and they are the most common and vulnerable targets of everyday scams, cons, and frauds. From identity theft to gambling scams, from power of attorney issues to pyramid schemes, there is no dearth of creativity in the ways some criminals will relieve the elderly from their money and their homes. Here, Alt and Wells describe the most common scams, offer the stories of actual victims, and detail ways to protect yourself and your family from becoming easy targets. What makes the elderly such easy marks for con artists? How can they avoid the common traps? Knowing about them is one place to start, and this book helps readers to understand and identify the most common scams perpetrated against the elderly. Because such cons are so hard to prosecute, it is important to know the methods criminals employ to separate innocents from their hard-earned money. This lively, vivid account of one of the most insidious forms of crime will help families and individuals protect themselves and their loved ones from the machinations of those who view them as easy marks.



Кл.слова:
соціологія -- шахрайство

   Тип видання:   методичний посібник   
3.

Arata, M. J.
Identity theft for dummies [Electronic resource] / M. J. Arata. - Hoboken : Wiley Publishing, 2010. - 291 p.
Переклад назви: Крадіжки персональних даних для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this book, I tell you how to prevent identity theft and what to do if you’re a victim. If you’re wondering what sort of information is vulnerable and should be shredded, or how to reclaim your credit if you’ve been a victim, this is the one-stop reference for you. Today, the name of the game is making yourself a hard target, and armed with this book, you’ll do exactly that.



Кл.слова:
захист інформації -- безпека інформації -- відновлення даних

   Тип видання:   науково-популярне видання   
4.
 


Atsctoy, Alex.
Самоучитель хакера [Електронний ресурс] / Alex Atsctoy. - М. : Лучшие книги, 2005. - 192 с.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Что нового привносит в общий поток хакерской литературы эта небольшая книга? А то, что в ней вся необъятная тема хакинга рассмотрена в единственном, но самом важном аспекте - практическом. В книге рассмотрены темы Хакинг, Зашита Windows 2000/XP, Проникновение в систему, Сокрытие следов, Хакинг fyay, pofc Web, Деструкция почтового клиента, хакинг lCQ, Хакинг Web-сайтов, атаки DOS Хакинг компьютеров Windows 2000/XP, Хакинг коммутируемого доступа.



Кл.слова:
захист інформації -- інформатика -- інформаційна безпека -- хакінг

   Тип видання:   наукове видання   
5.

Barken, L.
How secure is your wireless network? Safeguarding your wi-fi LAN [Electronic resource] / L. Barken. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator,security specialist, manager, or home user.



Кл.слова:
бездротові локальні мережі -- захист інформації

   Тип видання:   науково-популярне видання   
Категорія: Науки про Землю   
6.
 


Barlow, Maude.
Blue Gold [Electronic resource] : the fight to stop the corporate theft of the world's wate / Maude Barlow, Tony Clarke. - New York : The New Press, 2005. - 289 p
Переклад назви: Синє золото: боротьба за припинення корпоративної крадіжки світових водних ресурсів

Рубрики:

Географічні рубрики:
  

  Повний текст доступний у читальних залах НБУВ


In this “chilling, in-depth examination of a rapidly emerging global crisis” (In These Times), Maude Barlow and Tony Clarke, two of the most active opponents to the privatization of water show how, contrary to received wisdom, water mainly flows uphill to the wealthy. Our most basic resource may one day be limited: our consumption doubles every twenty years—twice the rate of population increase. At the same time, increasingly transnational corporations are plotting to control the world’s dwindling water supply. In England and France, where water has already been privatized, rates have soared, and water shortages have been severe. The major bottled-water producers—Perrier, Evian, Naya, and now Coca-Cola and PepsiCo—are part of one of the fastest-growing and least-regulated industries, buying up freshwater rights and drying up crucial supplies. A truly shocking exposé that is a call to arms to people around the world, Blue Gold shows in frightening detail why, as the vice president of the World Bank has pronounced, “The wars of the next century will be about water.”



Кл.слова:
водні ресурси -- екологія -- світова економіка

   Тип видання:   наукове видання   
7.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   методичний посібник   
8.

Bejtlich, R.
The Tao of network security monitoring. Beyond intrusion detection [Electronic resource] / R. Bejtlich. - Boston : Addison Wesley, 2004. - 832 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious....If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking "What's next?" If so, this book is for you.



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
9.

Bishop, M.
Introduction to computer security [Electronic resource] / M. Bishop. - New Jersey : Prentice Hall PTR, 2004. - 784 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop`s insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools - as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.



Кл.слова:
захист -- адміністрування системи

   Тип видання:   методичний посібник   
10.

Bott, E.
Microsoft Windows security inside out for Windows XP and Windows 2000 [Electronic resource] / E. Bott, C. Siechert. - Redmond : Microsoft Press, 2003. - 800 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Hey, you know your way around a desktop -- so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds -- all in concise, fast-answers format. Learn the essential tools and techniques for tightening up security on your personal computer or network, including ways to fend off viruses, hackers, spam, denial-of-service attacks, and other threats. Discover how to button up your Virtual Private Networks (VPNs), remote access, and wireless networking services. And take ultimate control of security with advanced solutions such as file encryption, port blocking, Internet Protocol Security, group policies, and tamper-proofing the Registry.



Кл.слова:
безпека системи -- захист інформації

   Тип видання:   наукове видання   
11.

Brown, L.
Special edition using Microsoft CRM [Electronic resource] / L. Brown, J. Gravely. - Indianapolis : Que Publishing, 2003. - 640 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


A sophisticated yet easy-to-use software program, Microsoft CRM handles the full range of Sales and Customer Service functions, and allows the user to access key customer and sales information from Microsoft Outlook and the Web. It is designed for rapid deployment, ease of use, and integration with Microsoft Office and Microsoft Great Plains' back-office solutions, increasing information reliability, employee usage and productivity.



Кл.слова:
програмне забезпечення -- продаж інформації

   Тип видання:   методичний посібник   
12.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
13.
 


Chevallier, Andrew.
Herbal remedies [Electronic resource] / A. Chevallier. - London : Dorling Kindersley, 2007. - 290 p. - (Eyewitness companions)
Переклад назви: Лікувальні трави

Рубрики:

  Повний текст доступний у читальних залах НБУВ


For anyone who wants to learn more about medicinal plants and how to use them at home, Herbal Remedies provides essential information on how to safely use herbal medicines and shows you how to create your own remedies to target common ailments.



Кл.слова:
трави -- захист -- лікування

   Тип видання:   наукове видання   
14.

Chuvakin, A.
Security Warrior [Electronic resource] / A. Chuvakin, C. Peikari. - Sebastobol : O'Reilly, 2004. - 552 p.
Переклад назви: Війна за безпеку

Рубрики:

  Повний текст доступний у читальних залах НБУВ


What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle



Кл.слова:
захист -- інформація

   Тип видання:   науково-популярне видання   
15.


Cities of the United States [Electronic resource] : a compilation of current information on economic, cultural, geographic, and social conditions / ed. L. C. DeShantz-Cook, J. K. Mueckenheim, K. Swartout. - Detroit : Thomson Gale, 2006. - 2517 p
Переклад назви: Міста США: збірник актуальної інформації про економічні, культурні, географічні і соціальні умови.

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The editors are grateful for the assistance provided by dozens of helpful chambers of commerce and convention and visitors bureau professionals, as well as municipal, library, and school employees for their invaluable generosity and expertise



Кл.слова:
економіка -- культура -- соціологія -- США

   Тип видання:   довідник   
Категорія: Науки про Землю   
16.


Cities Of The United States [Electronic resource] : a compilation of current information on economic, cultural, geographic and social conditions : in 4 vol. / L.C. DeShantz-Cook, J.K. Mueckenheim, K. Swartout. - Farmington Hills : Gale, 2006. - 2518 p.
Переклад назви: Міста США : звід нагальної інформації в економічній, культурній, географічній та суспільній царині

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


For each of "America's top cities", this source provides a map; brief entries on geography; history; population profiles; government; economy; education; health care; recreation including arts and culture, festivals, and sports; transportation, and communications.



Кл.слова:
США -- економіка -- культура

   Тип видання:   методичний посібник   
17.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   наукове видання   
18.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій

   Тип видання:   науково-популярне видання   
19.
 


Dick van Lente
The nuclear age in popular media [Electronic resource] : a transnational history, 1945-1965 / Dick van Lente. - New York : Palgrave Macmillan, 2012. - 293 p
Переклад назви: Ядерна доба в популярних засобах масової інформації: транснаціональна Історія, 1945-1965

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Among the many technical innovations that were introduced after World War II, none left as strong an impression on the public as the atom bombs that destroyed two Japanese cities in August 1945. People spoke of the "atomic age" that had now begun, as if this technological innovation would, all by itself, shape a new world. The atomic age was described as one that might soon end in the destruction of human civilization, but from the beginning, utopian images were attached to it as well. Nuclear technology offered the promise of applications in medicine, agriculture, and engineering, and nuclear power could theoretically provide an unlimited supply of energy. This book demonstrates and explains how the popular media represented nuclear power, in its military and non-military forms. It focuses on the first two decades of the "atomic age," when national governments, military strategists, scientists, and the public attempted to come to terms with a technology that so drastically seemed to change the prospects for the future. Popular magazines, comics, newspapers, public exhibitions from across the world are examined to compare representations of nuclear power in different countries and to trace divergences, convergences, and exchanges.



Кл.слова:
ЗМІ -- ядерна зброя -- холодна війна -- інформування

   Тип видання:   наукове видання   
20.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського