
ilość książek w kategorii: 5083
![]() |
AI Powered Secure Software Engineering: Preventing Financial Fraud Through Cybersecurity & AI
ISBN: 9786254474361 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,28 |
![]() |
Dark Web Reality: Truth, Terror, and the Tunnels of the Internet's Hidden World
ISBN: 9789699092152 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,28 |
![]() |
Data Privacy: Practical Handbook for Governance & Operations
ISBN: 9781969868207 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,28 |
![]() |
Privacy Tools in the Age of AI: Practical Strategies with VPNs, Secure DNS, Private Relay and Intelligent Defenses
ISBN: 9781970482003 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,28 |
![]() |
Build Your Own VPN Server: A Step by Step Guide
ISBN: 9781970482027 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,28 |
![]() |
VPN-Server Komplett-Anleitung: Erstellen Sie Ihr eigenes VPN in der Cloud
ISBN: 9781970482010 / Niemiecki Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,28 |
![]() |
Undetected: Cloud Exit Nodes for Remote Work: Cloud Exit Nodes for Remote Work: Deploying, Hardening & Optimizing Your Cloud Infrastructure: Cloud Exi
ISBN: 9781971277028 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,28 |
![]() |
Protecting Your Business From Insider Threats In Seven Effective Steps: How To Identify, Address And Shape The Human Element Of The Threat Within Your Business In Seven Successful Practices
ISBN: 9780992580919 / Angielski / Miękka / 2017 / 108 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,32 |
![]() |
B-Trees for BASIC
ISBN: 9780894960086 / Angielski / Miękka / 1992 / 260 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,95 |
![]() |
Cyberattaque: Plongez au coeur du blackout @Global Work collection
ISBN: 9782955545270 / Francuski / Miękka / 2019 / 202 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,99 |
![]() |
Weapon Systems Software Management Guidebook
ISBN: 9781728745473 / Angielski / Miękka / 2018 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
87,15 |
![]() |
Cyber Security Awareness: Employee Handbook
ISBN: 9798849441375 / Angielski / Miękka / 2022 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
87,15 |
![]() |
SP 800-61 R 2 Computer Security Incident Handling Guide: August 2012
ISBN: 9781547154159 / Angielski / Miękka / 2012 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST SP 800-61 R 2 Aug 2012 Computer security incident response has become an important component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a successful incident response capability requires substantial planning and resources. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. This publication provides guidelines for incident handling, particularly for analyzing incident-related data and determining...
NIST SP 800-61 R 2 Aug 2012 Computer security incident response has become an important component of information technology (IT) programs. Because...
|
cena:
87,52 |
![]() |
Sensibilisation à la Cybersécurité: Manuel de L'employé
ISBN: 9798356684968 / Francuski / Miękka / 2022 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
87,97 |
![]() |
Understanding the Human Factor in Cyber Security: A Comprehensive Investigation
ISBN: 9789769741393 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
88,00 |
![]() |
Security Testing with Kali Nethunter
ISBN: 9781539820994 / Angielski / Miękka / 2017 / 182 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Testing with Kali NetHunter
Kali Linux NetHunter is an Ethical Hacking platform that allows you to run a mobile version of Kali Linux on a supported Android device. In Security Testing with Kali NetHunter, you will see the basic usage of NetHunter as we walk through the entire NetHunter tool menu, and learn by doing with hands on step-by-step tutorials. Topics Include:
Security Testing with Kali NetHunter
Kali Linux NetHunter is an Ethical Hacking platform that allows you to run a mobile version of Kali Lin... |
cena:
88,08 |
![]() |
The Language of Cyber Attacks: A Rhetoric of Deception
ISBN: 9781350354678 / Angielski Termin realizacji zamówienia: ok. 22 dni roboczych. |
cena:
88,11 |
![]() |
Building IoT Systems: Design Scalable IoT Systems from Edge to Cloud
ISBN: 9798868812118 / Angielski / Miękka / 2025 / 90 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Explore the world of Internet of Things (IoT) and understand how various methodologies are used to manage edge devices, manage the data flow through different layers, and how the world of cloud computing helps to manage and maintain the entire system through IoT platforms. This book takes a practical approach to designing scalable IoT systems. You’ll begin by designing IoT systems at an edge level through different methodologies and see how essential data can be captured and processed. The focus will be toward data flow and how different components in the system can be managed. In the...
Explore the world of Internet of Things (IoT) and understand how various methodologies are used to manage edge devices, manage the data flow through d...
|
cena:
88,59 |
![]() |
Digital Deception: How Public Access and False MFA Broke the Internet
ISBN: 9798868812262 / Angielski / Miękka / 2025 / 150 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate. Divided into well-structured chapters that trace the...
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understan...
|
cena:
88,59 |
![]() |
Quantum Security: Revolutionizing Network Security with Digital IDs
ISBN: 9798868812392 / Angielski / Miękka / 2025 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In a world where cybersecurity threats evolve daily, it’s time to leave traditional, flawed security models behind. This book introduces a groundbreaking approach that applies the quantum principle of superposition to user authentication. Just as a particle exists in multiple states until observed, a user’s presence on a network remains undefined until their Digital ID is verified. Once verified, their identity collapses into a single truth—eliminating any risk of impersonation or fraud. This book demonstrates how Digital IDs transform the very foundation of network security. Unlike...
In a world where cybersecurity threats evolve daily, it’s time to leave traditional, flawed security models behind. This book introduces a groundbre...
|
cena:
88,59 |