William J Buchanan - Böcker
Visar alla böcker från författaren William J Buchanan. Handla med fri frakt och snabb leverans.
11 produkter
11 produkter
530 kr
Skickas inom 10-15 vardagar
This book provides an excellent foundation in modern information systems and data communications. It has five basic themes:- Digital Information Sources and Multimedia;- The Internet, the World Wide Web and Java;- Local area Networking;- Wide area Networking;- Video Conferencing.The information sources material covers the main standards in digital information on modern computer systems. It includes the conversion of sound and images into a digital format.The networking material introduces the main local area network technologies:- Ethernet;- Token Ring;- FDDI.Modern Wide Area Network technologies like ATM are considered, also the usage of ISDN and Modems for interconnection.
544 kr
Skickas inom 10-15 vardagar
The Internet and the World Wide Web (WWW) is growing each day. More and more people require either to access information, send and receive electronic information or just to log into remote computers. This book provides an up-to-date account of all the component parts of the Internet and the WWW, from architecture through to networking. It discusses key specifications relating to electronic mail, such as MiMe encoding and SMTP, and shows how they are used to send mail around the world.Full backup for the book is provided with electronic mail and the author has set up a WWW page which contains links to other useful sources of information.
544 kr
Skickas inom 10-15 vardagar
The book provides an introduction to programming with Pascal and extends this to show how Borland Delphi is used to development Microsoft Windows programs. It is packed full of real-life application and splits into three main sections:- Pascal programming- Pascal applications- Delphi programmingPractical applications include: software interrupts, hardware interrupts, graphics, date and time, system commands, RS-232 and parallel ports.
544 kr
Skickas inom 10-15 vardagar
This book provides an introduction to the Java programming language and also covers other related areas such as HTML, JavaScript, CGIscript and VRML. Most of the Java programs relate to practical examples, including:- Menus and forms- Graphics- Event-driven software, such as mouse and keyboard events- Networking- Interacting with other programs- AnimationIt also covers fundamental areas such as TCP/IP and the HTTP protocol.The Java compiler, source code, background information and source code is available from the author over the Internet.
530 kr
Skickas inom 10-15 vardagar
Many computer networks are now a hybrid of different types, typically a mixture of two or more different operating systems. These systems must successfully integrate for the complete system to operate properly, whether it is in terms of its compatibility, its security or its ease-of-use. The main aim of this book is to cover the configuration, architecture and networking of the three of the most popular networking operating systems - Microsoft Windows, Novell NetWare and UNIX.
544 kr
Skickas inom 10-15 vardagar
Computing is an area which continues to grow each year. This book covers themain areas of computing, including programming, computer hardware, operating systems, the Internet, data communications and networking. It uses practical examples to show basic concepts, is packed full of diagrams showing important principles, and contains multiple-choice questions to test knowledge and understanding. The book uses a readable style, and is aimed at students studying for Advanced GNVQ, A-level, HND and BSc courses.
544 kr
Skickas inom 10-15 vardagar
Have you ever wanted to write a computer program in which one computer could talk to another? Or perhaps you wanted to write a program which measured an event within a fraction of a second? Well this book shows you how to do this, using the Delphi programming language. After reading it you'll know not only know more about Delphi, but you will understand the basics of many computer applications. It covers the basics of the programming environment, and then extends this to show important applications, such as networking, data communications, operating system interfacing, and event timing. Perhaps even you wanted to write a program which give you the full power of the Windows operating system? Well it is here too, in the form of API calls.
849 kr
Skickas inom 10-15 vardagar
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics.Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including:More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements60,000 test questions, including for Certified Ethical Hacking and CISSP® 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labsRounding out coverage with a look into more advanced topics, including data hiding, obfuscation, web infrastructures, and cloud and grid computing, this book provides the fundamental understanding in computer security and digital forensics required to develop and implement effective safeguards against ever-evolving cyber security threats. Along with this, the text includes a range of online lectures and related material, available at: http://asecuritybook.com.
400 kr
Skickas inom 10-15 vardagar
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the privacy and security of all our personal data. This requirement for protection extends globally, to all organisations, public and private, wherever personal data is held, processed, or transmitted concerning any EU citizen. Cyber Security is at the core of data protection and there is a heavy emphasis on the application of encryption and state of the art technology within the articles of the GDPR. This is considered to be a primary method in achieving compliance with the law. Understanding the overall use and scope of Cyber Security principles and tools allows for greater efficiency and more cost effective management of Information systems.GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.
592 kr
Skickas inom 3-6 vardagar
877 kr
Skickas inom 10-15 vardagar
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the privacy and security of all our personal data. This requirement for protection extends globally, to all organisations, public and private, wherever personal data is held, processed, or transmitted concerning any EU citizen. Cyber Security is at the core of data protection and there is a heavy emphasis on the application of encryption and state of the art technology within the articles of the GDPR. This is considered to be a primary method in achieving compliance with the law. Understanding the overall use and scope of Cyber Security principles and tools allows for greater efficiency and more cost effective management of Information systems.GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.