
ilość książek w kategorii: 5023
![]() |
Mommy! There's a Monster in our Computer: The book every parent should read to their child before they go on the Internet
ISBN: 9780990911807 / Angielski / Miękka / 2014 / 18 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book that every parent should read to their child before they go on the Internet. The odds are very good that your child will not be negatively impacted by the Internet. But if they are, it can be devastating. Cyber Bullying KILLS kids. (This is book is dedicated to them and you can read some of their names inside.) Predators scour the Internet looking for victims. Identity Theft affects MILLIONS of people in the US and young adults are being targeted too. Phishing is a very common attack methodology and can literally take money out of your bank account. As a Computer Security...
The book that every parent should read to their child before they go on the Internet. The odds are very good that your child will not be negatively im...
|
cena:
68,23 |
![]() |
The Truth Machine: The Blockchain and the Future of Everything
ISBN: 9781250304179 / Angielski / Miękka / 2019 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
68,23 |
![]() |
Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO's Guide to Protecting the Digital World
ISBN: 9781456649562 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
68,23 |
![]() |
Hacking Wireless Networks - The ultimate hands-on guide
ISBN: 9781508476344 / Angielski / Miękka / 2015 / 430 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup your own hacking lab and learn through practice? If yes, then this is the book for you Hacking Wireless Networks - The ultimate hands-on guide, is a book written for people who seek to practice the techniques of assessing the security of wireless infrastructures.Through 30 real life scenarios and more than 300 figures the book examines in details the following areas: - Discovery and Profiling of wireless networks - Denial of Service attacks -...
Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup yo...
|
cena:
68,69 |
![]() |
Elixir on the Chain: A Developer's Guide for Building High-Performance Blockchain Network
ISBN: 9798301357114 / Angielski / Miękka / 2024 / 168 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
68,86 |
![]() |
Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack!
ISBN: 9781542745376 / Angielski / Miękka / 2017 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous Online Today The Internet is a wonderful resource which has allowed people to access a fountain of knowledge with the simple click of a button. The internet has grown considerably fast in the last decade, and it is still expanding at extraordinary rates. But with this incredible tool comes a danger The government has been using our vast resource to spy on individuals and businesses, overstepping their role as an entity that exists to serve the...
Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous On...
|
cena:
69,17 |
![]() |
Ethical Hacking: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security
ISBN: 9781694041562 / Angielski / Miękka / 2019 / 142 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
69,17 |
![]() |
Kali linux: learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools
ISBN: 9781702667241 / Angielski / Miękka / 2019 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
69,17 |
![]() |
Federal Information Processing Standards Publications: Pubs 140-2, 180-4, 186-4, 199 & 200
ISBN: 9781547148240 / Angielski / Miękka / 2017 / 268 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
69,37 |
![]() |
From Exposed to Secure: The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe
ISBN: 9781636983851 / Angielski Termin realizacji zamówienia: ok. 8-10 dni roboczych. |
cena:
70,20 |
![]() |
Notebook: A cute and discrete password book to keep your log in details safe and close at hand at all times
ISBN: 9789188385352 / Angielski / Twarda / 2020 / 108 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
70,53 |
![]() |
Build a Cyber Citadel: The No-Nonsense Guide to Cybersecurity for Startups & Small Businesses
ISBN: 9798301668890 / Angielski / Miękka / 2024 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
70,93 |
![]() |
Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes
ISBN: 9781672429733 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
71,04 |
![]() |
Cryptography & Comptia A+
ISBN: 9781523426270 / Angielski / Miękka / 2016 / 56 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work? Purchase Cryptography to discover everything you need to know about it Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Cryptography TODAYIs CompTIA A+ what you want to learn? Always wondered what A+ was? Does it... Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp... |
cena:
71,16 |
![]() |
Cyber Election Meddling: The Impact on Voter Beliefs and Decisions
ISBN: 9781959621577 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
71,23 |
![]() |
Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?
ISBN: 9781532792007 / Angielski / Miękka / 2016 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
71,44 |
![]() |
Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies
ISBN: 9781502446190 / Angielski / Miękka / 2014 / 40 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
71,44 |
![]() |
Cybersecurity: The Evolving Nature of Cyber Threats Facing the Private Sector
ISBN: 9781518601248 / Angielski / Miękka / 2015 / 110 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A June 2014 PriceWaterHouseCoopers survey found that 69% of U.S. business leaders worried that cyber threats would harm their company's growth. As corporate information networks become increasingly interconnected with third-party vendors, suppliers, business partners, and customers, the threat of exploitable vulnerabilities expands. Recent cyber attacks against Anthem and Sony Pictures, as well as the theft of up to $1 billion dollars from European banks, illustrate the devastating damage cyber attacks can cause. Cybersecurity has moved to the forefront of the national debate among leaders in...
A June 2014 PriceWaterHouseCoopers survey found that 69% of U.S. business leaders worried that cyber threats would harm their company's growth. As cor...
|
cena:
71,44 |
![]() |
Seguridad en Bases de Datos y Aplicaciones Web: 2a Edición
ISBN: 9781540420565 / Hiszpański / Miękka / 2016 / 138 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Actualmente no es posible imaginarnos a una organizacion sin que la misma no utilice la Tecnologia de la Informacion (TI) de forma estrategica y competitiva. Muchas veces la TI se utiliza como herramienta basica y de beneficios para la existencia de la organizacion. Por ejemplo, Como seria posible la existencia de una red social como Facebook sin el uso de la TI? Y de una empresa de ventas al por menor on-line sin Amazon o Ebay? La TI no solo forma parte de la estrategia de la empresa como un diferencial, sino que tambien puede ser el principal combustible que hay detras de una organizacion....
Actualmente no es posible imaginarnos a una organizacion sin que la misma no utilice la Tecnologia de la Informacion (TI) de forma estrategica y compe...
|
cena:
71,44 |
![]() |
Under Attack: Federal Cybersecurity and the OPM Data Breach
ISBN: 9781548336103 / Angielski / Miękka / 2017 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
71,44 |