
ilość książek w kategorii: 5083
![]() |
NSA, BND & Co.: Die Möglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmaßnahmen
ISBN: 9781495256134 / Niemiecki / Miękka / 2014 / 318 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Die Enthullungen von Edward Snowden uber die Bespitzelung europaischer Burger und Regierungen durch die NSA und andere Dienste haben einiges an peinlicher Aufregung verursacht - peinlich nicht nur fur die USA, sondern besonders fur die betroffenen Regierungen und Burger, die mit einem geruttelt Mass an Ignoranz und Fahrlassigkeit ihre Daten zum grossen Teil selbst offentlich zum Abholen prasentieren. Auch jetzt noch scheint die Ansicht vor zuherrschen, man konne Verschlusselung durch ein gesetzliches Leseverbot einsparen. In diesem Buch gehen wir der Frage nach, uber welche Techniken die...
Die Enthullungen von Edward Snowden uber die Bespitzelung europaischer Burger und Regierungen durch die NSA und andere Dienste haben einiges an peinli...
|
cena:
58,67 |
![]() |
Blockchain for Non IT Professionals: An Example Driven, Metaphorical Approach
ISBN: 9781648699337 / Angielski / Miękka / 2020 / 198 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
58,67 |
![]() |
Castle Defenders: What Do Cyber Parents Do?
ISBN: 9798988023012 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
58,67 |
![]() |
Die ersten grundlegenden Tipps und Tricks f?r angehende Hacker: Darknet - Codes - Schlupfl?cher
ISBN: 9783759714138 / Niemiecki Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
58,67 |
![]() |
Cyberspace Defense Analysis (CDA): AFi 17-2CDA
ISBN: 9781981862214 / Angielski / Miękka / 2017 / 158 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
58,75 |
![]() |
How to Disappear From The Internet Completely While Leaving False Trails: How to Be Anonymous Online
ISBN: 9781539618768 / Angielski / Miękka / 2016 / 52 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. How to Disappear From The Internet Completely While Leaving False Trails How to Be Anonymous Online Why do some people want to erase themselves completely from the internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are reading this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step... How to Disappear From The Internet Completely While Leaving False Trails How to Be Anonymous Online<... |
cena:
58,87 |
![]() |
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security
ISBN: 9781475023732 / Angielski / Miękka / 2012 / 180 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the...
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to estab...
|
cena:
59,03 |
![]() |
Under Pressure: Empowering Cyber Security Incident Responders
ISBN: 9798873918362 / Angielski / Miękka / 2024 / 222 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
59,92 |
![]() |
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!
ISBN: 9781494783808 / Angielski / Miękka / 2013 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
|
cena:
60,17 |
![]() |
Complete Guide to SEO for Beginners: A Beginner's Guide to Smart Online Visibility
ISBN: 9798345397695 / Angielski / Miękka / 2024 / 166 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,17 |
![]() |
Mastering Your Introduction to Cyber Security
ISBN: 9781634914185 / Angielski / Miękka / 2018 / 92 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,21 |
![]() |
Air Force Cyberspace Security and Control System (CSCS)
ISBN: 9781981808502 / Angielski / Miękka / 2017 / 206 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,29 |
![]() |
Capital of Spies
ISBN: 9798224714117 / Angielski / Miękka / 2024 / 110 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,38 |
![]() |
Code and Connect: Web Programming with PHP and MySQL
ISBN: 9798896107378 / Angielski / Miękka / 2024 / 196 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,43 |
![]() |
The CEO's Manual on Cyber Security
ISBN: 9780989253598 / Angielski / Miękka / 2013 / 244 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
|
cena:
60,49 |
![]() |
The Little Black Book of Computer Security, Second Edition
ISBN: 9781475286243 / Angielski / Miękka / 2012 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains checklists covering all aspects of computer security from network security, to writing security policies, and application security. It also covers the soft skills of security, such as social engineering and best practices for hiring employees and working with auditors.
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains ...
|
cena:
60,49 |
![]() |
The Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology
ISBN: 9780989253529 / Angielski / Miękka / 2014 / 130 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,49 |
![]() |
United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment
ISBN: 9781500750244 / Angielski / Miękka / 2014 / 140 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is United States cybersecurity strategy, policy, and organization postured to cope with the post-9/11 security environment? Through an exhaustive review of recurring and stand-alone strategic cybersecurity strategy and policy documents and a detailed assessment of the United States cyber organization within the Department of Homeland Security, Department of Defense, and Department of Justice, the United States is indeed vulnerable to a cyber attack. Despite the recent emphasis on cyber attacks against private and governmental organizations, the genesis of American interest and awareness of...
Is United States cybersecurity strategy, policy, and organization postured to cope with the post-9/11 security environment? Through an exhaustive revi...
|
cena:
60,49 |
![]() |
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
ISBN: 9781502956453 / Angielski / Miękka / 2014 / 30 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security, with support from the NPPD Cyber Strategy Staff, the federally funded Homeland Security Systems Engineering and Development Institute (HS SEDI), and the NPPD Office of Cybersecurity and Communications (CS&C). In 2010, NPPD sponsored a government workshop to discuss a draft of this paper. Recommendations from that workshop have been incorporated. This study explores a future - a "healthy cyber ecosystem" -...
This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U...
|
cena:
60,49 |
![]() |
Ensuring Survivable Information Services: Architecting, Diagnosing and Reconfiguring
ISBN: 9781500253370 / Angielski / Miękka / 2014 / 34 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,49 |