
ilość książek w kategorii: 5021
![]() |
BEHIND the SCREEN: An Internet Privacy Matter 101 for Adult and Child Online Safety
ISBN: 9798989972739 / Angielski / Miękka / 2024 / 166 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,40 |
![]() |
Beyond the Firewall: Implementing Zero Trust for a Remote Workforce
ISBN: 9798307561843 / Angielski / Miękka / 2025 / 46 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,40 |
![]() |
Seamless Security: Integrating IAM and Data Governance in the Modern Workplace
ISBN: 9798308015086 / Angielski / Miękka / 2025 / 42 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,40 |
![]() |
30-Minute Groups: Online Safety: Spotting Red Flags, Protecting Privacy, and Being a Positive Voice
ISBN: 9781965066041 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,41 |
![]() |
Spyware
ISBN: 9781466221680 / Angielski / Miękka / 2011 / 92 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general, spyware comes secretly bundled within freeware and shareware software that is downloaded from the Internet. Spyware programs work in the background without your knowledge and collect essential information related to you. This may include your usernames, passwords, bank account numbers, and any other personal and confidential information. This information is usually sent to external sources for malicious purposes. Unlike viruses, spyware...
Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general...
|
cena:
79,49 |
![]() |
Ransomware - Prevention and Recovery: How to Avoid Paying a Ransom
ISBN: 9781548276607 / Angielski / Miękka / 2017 / 170 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Ransomware - Malware - WannaCry These pages are not just ransomware definitions or descriptions. Not just case studies of others' demises. Not just warnings and admonitions of what not to do. They are pages to give understanding and the justification for taking the action steps given so that you can prevent most any ransomware attack and, if not, recover from the attack fast and inexpensively without paying a ransom. WannaCry News - Ransomware Windows 7 Author David Pettit invites us to understand the progression and varieties of ransomware. To be informed of the things we may do to prevent...
Ransomware - Malware - WannaCry These pages are not just ransomware definitions or descriptions. Not just case studies of others' demises. Not just wa...
|
cena:
79,49 |
![]() |
Cybersecurity Awareness: Staying Safe Online
ISBN: 9798399284392 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,49 |
![]() |
Understanding AI Monitoring and the Future of Our Privacy: Invisible Eyes
ISBN: 9798344929255 / Angielski / Miękka / 2024 / 102 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,49 |
![]() |
Cybercrime, Cyberterrorism, and Cyberwarfare
ISBN: 9781441572172 / Angielski / Miękka / 2009 / 276 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
FIPS 140 Demystified: An Introductory Guide for Vendors
ISBN: 9781460990391 / Angielski / Miękka / 2011 / 226 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Internet to make online purchases. Corporations store financial and medical information. This data must be protected and encryption (or cryptographic technologies) is the last line of defense against unauthorized access to this precious information. The Federal Information Processing Standard 140 (FIPS 140) is an internationally-recognized standard for assessing and validating that the cryptographic technologies used in our computer systems and...
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Intern...
|
cena:
79,56 |
![]() |
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
ISBN: 9781475232707 / Angielski / Miękka / 2013 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
|
cena:
79,56 |
![]() |
Cloud Security and Control
ISBN: 9781469992549 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
|
cena:
79,56 |
![]() |
The Zealots Guide To Computer Security 2013
ISBN: 9781484977248 / Angielski / Miękka / 2013 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
|
cena:
79,56 |
![]() |
The Zealots Guide To Linux Mint Special Edition
ISBN: 9781500273439 / Angielski / Miękka / 2014 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
GNU GSS Library: Generic Security Service
ISBN: 9789888381661 / Angielski / Miękka / 2015 / 78 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide security services, e.g., to authenticate SMTP/IMAP clients against SMTP/IMAP servers. GSS consists of a library and a manual. GSS is developed for the GNU/Linux system, but runs on over 20 platforms including most major Unix platforms and Windows, and many kind of devices including iPAQ handhelds and S/390 mainframes.
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide securi...
|
cena:
79,56 |
![]() |
Walking Wounded: Inside the U.S. Cyberwar Machine
ISBN: 9781539945611 / Angielski / Miękka / 2016 / 232 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Forget everything you know about crime, war and espionage in cyberspace. Walking Wounded takes the layman to seasoned professional on an insider's journey through the secret history, technologies, and strategies surrounding war and espionage in cyberspace. Walking Wounded is not another hacking book. It takes the reader behind the scenes and recounts the story of the Pentagon's love affair with technology, and how this reliance makes them vulnerable to hackers. It explains how foreign intelligence services, criminals, and amateur hackers have compromised our sensitive systems for three...
Forget everything you know about crime, war and espionage in cyberspace. Walking Wounded takes the layman to seasoned professional on an insider's jou...
|
cena:
79,56 |
![]() |
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy
ISBN: 9786069836002 / Angielski / Miękka / 2018 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide
ISBN: 9781980511847 / Angielski / Miękka / 2018 / 138 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
The little handbook of Windows Forensics: Just some random thoughts about Windows Forensics
ISBN: 9781730914102 / Angielski / Miękka / 2018 / 136 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Ultimate Hacking Challenge: Train on dedicated machines to master the art of hacking
ISBN: 9781521708477 / Angielski / Miękka / 2017 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |