Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (137)Тематичний інтернет-навігатор (14)Автореферати дисертацій (8994)Реферативна база даних (60317)Книжкові видання та компакт-диски (9499)Журнали та продовжувані видання (408)
Пошуковий запит: (<.>K=ЗАХИСТ$<.>+<.>K=НАВКОЛИШНЬ$<.>+<.>K=СЕРЕДОВИЩ$<.>)
Загальна кількість знайдених документів : 610
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   наукове видання   
2.

Alt, B. L.
Fleecing grandma and grandpa [Electronic resource] : protecting Against Scams, Cons, and Frauds / B. L. Alt, S. K. Wells. - Westport : Praeger Publishers, 2004. - 167 p.
Переклад назви: Оббираючи бабусь і дідусів: захист від шахрайства

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Falling for a scam or con is humiliating for anyone, and can have terrible consequences. But for the elderly, being the victim of fraud can be disastrous, and they are the most common and vulnerable targets of everyday scams, cons, and frauds. From identity theft to gambling scams, from power of attorney issues to pyramid schemes, there is no dearth of creativity in the ways some criminals will relieve the elderly from their money and their homes. Here, Alt and Wells describe the most common scams, offer the stories of actual victims, and detail ways to protect yourself and your family from becoming easy targets. What makes the elderly such easy marks for con artists? How can they avoid the common traps? Knowing about them is one place to start, and this book helps readers to understand and identify the most common scams perpetrated against the elderly. Because such cons are so hard to prosecute, it is important to know the methods criminals employ to separate innocents from their hard-earned money. This lively, vivid account of one of the most insidious forms of crime will help families and individuals protect themselves and their loved ones from the machinations of those who view them as easy marks.



Кл.слова:
соціологія -- шахрайство

   Тип видання:   методичний посібник   
3.

Arata, M. J.
Identity theft for dummies [Electronic resource] / M. J. Arata. - Hoboken : Wiley Publishing, 2010. - 291 p.
Переклад назви: Крадіжки персональних даних для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this book, I tell you how to prevent identity theft and what to do if you’re a victim. If you’re wondering what sort of information is vulnerable and should be shredded, or how to reclaim your credit if you’ve been a victim, this is the one-stop reference for you. Today, the name of the game is making yourself a hard target, and armed with this book, you’ll do exactly that.



Кл.слова:
захист інформації -- безпека інформації -- відновлення даних

   Тип видання:   науково-популярне видання   
4.
 


Atsctoy, Alex.
Самоучитель хакера [Електронний ресурс] / Alex Atsctoy. - М. : Лучшие книги, 2005. - 192 с.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Что нового привносит в общий поток хакерской литературы эта небольшая книга? А то, что в ней вся необъятная тема хакинга рассмотрена в единственном, но самом важном аспекте - практическом. В книге рассмотрены темы Хакинг, Зашита Windows 2000/XP, Проникновение в систему, Сокрытие следов, Хакинг fyay, pofc Web, Деструкция почтового клиента, хакинг lCQ, Хакинг Web-сайтов, атаки DOS Хакинг компьютеров Windows 2000/XP, Хакинг коммутируемого доступа.



Кл.слова:
захист інформації -- інформатика -- інформаційна безпека -- хакінг

   Тип видання:   наукове видання   
5.

Barken, L.
How secure is your wireless network? Safeguarding your wi-fi LAN [Electronic resource] / L. Barken. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator,security specialist, manager, or home user.



Кл.слова:
бездротові локальні мережі -- захист інформації

   Тип видання:   наукове видання   
6.

Barrett, D.
Virtualization and Forensics [Electronic resource] : a Digital Forensic Investigator's Guide to Virtual Environments / D. Barrett, G. Kipper. - Burlington : Elsevier, 2010. - 254 p.
Переклад назви: Віртуалізація і судова медицина: Керівництво для віртуальних середовищ слідчого цифрової судової медицини

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Virtualization creates new and difficult challenges for forensic investigations. Operating systems and applications running in virtualized environments often leave few traces, yielding little evidence with which to conduct an investigation. Virtualization and Forensics offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Part I explains the process of virtualization and the different types of virtualized environments. Part II details how virtualization interacts with the basic forensic process, describing the methods used to find virtualization artifacts in dead and live environments as well as identifying the virtual activities that affect the examination process. Part III address advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization. After reading this book, you'll be equipped to conduct investigations in these environments with confidence.



Кл.слова:
судова медицина -- віртуалізація

   Тип видання:   наукове видання   
7.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   науково-популярне видання   
8.

Beauplan, Guillaume Le Vasseur de.
Description d'Ukranie, qui sont plusieurs provinces du Royaume de Pologne. Contenues depuis les confins de la Moscovie, insques aux limites de la Transilvanie. Ensemble leurs moeurs, façons de viures, et de faire la Guerre [Electronic resource] / G. Le Vasseur de Beauplan. - Rouen : [s. n.], 1660. - 130 p.
Переклад назви: Опис України, кількох провінцій Королівства Польського, що тягнуться від кордонів Московії до границь Трансільванії, разом з їхніми звичаями, способом життя і ведення воєн

  Повний текст доступний у читальних залах НБУВ


Книга французького військового інженера Гійома Левассера де Боплана «Опис України» — цінне історичне джерело для вивчення побуту запорозького козацтва і селянства, а також інших станів середньовічного суспільства України. В ній відображені географічне середовище, природа України, її кліматичні умови, наведені дані з історії заселення Середньої Наддніпрянщини, змальована яскрава картина життя українського народу першої половини XVII ст.



Кл.слова:
українознавство -- етнографія -- демографія

   Тип видання:   наукове видання   
9.

Beazley, D. M.
Python essential reference [Electronic resource] / D. M. Beazley. - 2th. ed.. - Washington : New Riders, 2001. - 416 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Python Essential Reference, Second Edition, concisely describes the Python Programming language and its large library of standard modules, collectively known as the Python programming environment. It is arranged into four major parts. First, a brief tutorial and introduction is presented, then an informal language reference will cover lexical conventions, functions, statements, control flow, datatypes, classes, and execution models. The third section covers the Python library, and the final section covers the Python C API that is used to write Python extensions.



Кл.слова:
середовище програмування -- написання розширень

   Тип видання:   методичний посібник   
10.

Bejtlich, R.
The Tao of network security monitoring. Beyond intrusion detection [Electronic resource] / R. Bejtlich. - Boston : Addison Wesley, 2004. - 832 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious....If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking "What's next?" If so, this book is for you.



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
11.

Bishop, M.
Introduction to computer security [Electronic resource] / M. Bishop. - New Jersey : Prentice Hall PTR, 2004. - 784 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop`s insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools - as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.



Кл.слова:
захист -- адміністрування системи

   Тип видання:   науково-популярне видання   
12.

Bockris, Victor.
Transformer [Electronic resource] : the Lou Reed story / Victor Bockris. - New York : Simon and Schuster, 1994. - 464 p
Переклад назви: Трансформатор: історія Лу Ріда

  Повний текст доступний у читальних залах НБУВ


As cofounder of the Velvet Underground -- regarded as one of the most significant groups of the 1960s -- and solo artist, Lou Reed has influenced a wide range of rock musicians, from David Bowie to the Sex Pistols, from Patti Smith to U2. His innovative skill as a singer and songwriter of over 250 songs, including "Heroin" and "Walk on the Wild Side", and his multiple musical transformations during a twenty-year career have thrust Reed into the forefront of alternative rock, from garage to glitter, punk, disco, and rap. Based on exclusive interviews with Reed and his friends, family, and associates, and including incisive portraits of John Cale, Andy Warhol, Nico, David Bowie, and others, Transformer offers an uncompromising and compelling view of a true rock 'n' roll chameleon.



Кл.слова:
рок-музика -- контркультура -- мистецьке середовище

   Тип видання:   методичний посібник   
13.

Bott, E.
Microsoft Windows security inside out for Windows XP and Windows 2000 [Electronic resource] / E. Bott, C. Siechert. - Redmond : Microsoft Press, 2003. - 800 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Hey, you know your way around a desktop -- so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds -- all in concise, fast-answers format. Learn the essential tools and techniques for tightening up security on your personal computer or network, including ways to fend off viruses, hackers, spam, denial-of-service attacks, and other threats. Discover how to button up your Virtual Private Networks (VPNs), remote access, and wireless networking services. And take ultimate control of security with advanced solutions such as file encryption, port blocking, Internet Protocol Security, group policies, and tamper-proofing the Registry.



Кл.слова:
безпека системи -- захист інформації

   Тип видання:   монографія   
14.

Brand, U.
Conflicts in environmental regulation and the internationalization of the state [Electronic resource] : contested terrains / U. Brand. - New York : Routledge, 2008. - 293 p.
Переклад назви: Конфлікти в екологічному регулюванні та інтернаціоналізація держави

Рубрики:

Географічні рубрики:
  

  Повний текст доступний у читальних залах НБУВ


This book examines the global regulation of biodiversity politics through the UN Convention on Biological Diversity (CBD), the WTO and other international treaties. Using historical-materialist state and regulation theory, it assesses how the discourse and politics of sustainable development have contributed to the internationalisation of the state.



Кл.слова:
навколишнє середовище -- екологія

   Тип видання:   методичний посібник   
15.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
16.
 


Chevallier, Andrew.
Herbal remedies [Electronic resource] / A. Chevallier. - London : Dorling Kindersley, 2007. - 290 p. - (Eyewitness companions)
Переклад назви: Лікувальні трави

Рубрики:

  Повний текст доступний у читальних залах НБУВ


For anyone who wants to learn more about medicinal plants and how to use them at home, Herbal Remedies provides essential information on how to safely use herbal medicines and shows you how to create your own remedies to target common ailments.



Кл.слова:
трави -- захист -- лікування

   Тип видання:   наукове видання   
17.

Chuvakin, A.
Security Warrior [Electronic resource] / A. Chuvakin, C. Peikari. - Sebastobol : O'Reilly, 2004. - 552 p.
Переклад назви: Війна за безпеку

Рубрики:

  Повний текст доступний у читальних залах НБУВ


What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle



Кл.слова:
захист -- інформація

   Тип видання:   наукове видання   
Категорія: Астрономія   
18.
 


Clark, Pamela Elizabeth.
Dynamic planet: Mercury in the context of its environment [Електронний ресурс] / Pamela Elizabeth Clark. - New York : Springer, 2007. - 239 p.
Переклад назви: Динамічна планета: Меркурій в контексті його навколишнього середовища

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book views Mercury as a whole in the context of its environment. It illustrates what we know and what we need to know, and why understanding Mercury is so crucial to our understanding of solar system origin and current processes on Earth. The book describes our current state of knowledge for Mercury and interactions between interior, exterior, and space environment which are highly dynamic and thus critical to understanding Mercury as a system.



Кл.слова:
атмосфера Меркурія -- фізика планет

   Тип видання:   методичний посібник   
19.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   наукове видання   
20.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського