
ilość książek w kategorii: 5045
![]() |
Tor: Remaining Anonymous on the Dark Net in an Era of NSA Spying
ISBN: 9781545589946 / Angielski / Miękka / 2017 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
54,38 |
![]() |
Introduction to Networks V6 Labs & Study Guide
ISBN: 9781587133619 / Angielski / Mixed media product / 2016 / 672 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
316,20 |
![]() |
Cyberspace and Cybersecurity
ISBN: 9781138057715 / Angielski / Twarda / 2017 / 292 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of...
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and o...
|
cena:
410,60 |
![]() |
Hacking & Tor: The Ultimate Beginners Guide To Hacking, Tor, & Accessing The Deep Web & Dark Web
ISBN: 9781546342649 / Angielski / Miękka / 2017 / 246 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Would You Like to Learn Exactly What It Means to be a Hacker & How To Protect Your Identity On The Web? - NOW INCLUDES FREE GIFTS (see below for details)
Have you always secretly admired how tech savvy hackers are? Does the word "hacker" make you think of the cool kids who don't obey society's rules? Or does the idea of someone hacking your system and stealing your data make you break out into a cold sweat? Do you want to understand how hacking works for once and for all? Have you been drawn to the dark side of the web? Do you long for the days when anonymity on... Would You Like to Learn Exactly What It Means to be a Hacker & How To Protect Your Identity On The Web? - NOW INCLUDES FREE GIFTS (see below for deta...
|
cena:
102,49 |
![]() |
Cybersecurity Exposed: The Cyber House Rules
ISBN: 9781911452195 / Angielski / Twarda / 2017 / 176 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Mind the gap...between the actual level of cybersecurity and the amount required to protect you. Psychology meets technology as this book explores how the rapid progression of technology is luring us all forwards at a pace that outstrips the human comfort zone. Is security fixable? Or are we... Mind the gap...between the actual level of cybersecurity and the amount required to protect you. |
cena:
109,33 |
![]() |
Surveillance Systems: Design, Applications & Technology
ISBN: 9781536107036 / Angielski / Miękka / 2017 / 115 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
573,87 |
![]() |
Inside the Enemy's Computer Identifying Cyber-Attackers
ISBN: 9781849045544 / Angielski / Twarda / 2017 / 224 str. Termin realizacji zamówienia: ok. 30 dni roboczych. When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book ...
|
cena:
156,24 |
![]() |
Think Like a Hacker: A Sysadmin's Guide to Cybersecurity
ISBN: 9780692865217 / Angielski / Miękka / 2017 / 102 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage. Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and backdoors inside an...
Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever...
|
cena:
61,48 |
![]() |
Down the Rabbit Hole An OSINT Journey: Open Source Intelligence Gathering for Penetration Testing
ISBN: 9780995687547 / Angielski / Miękka / 2017 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do you enjoy the reconnaissance part of a penetration testing? Want to discover issues on your network, assets or applications proactively? Would you like to learn some new OSINT based recon tools and techniques? Follow the rabbit hole and find exploitable critical vulnerabilities in the Panama Papers law firm and politics both American and international including Trump and the DNC. Analyse network and email configurations for entry points and exploits with FOCA, Maltego, Nmap/ZenMap, and Spiderfoot. Learn how to use advanced searches, alternative search engines that don't respect...
Do you enjoy the reconnaissance part of a penetration testing? Want to discover issues on your network, assets or applications proactively? Would you ...
|
cena:
110,69 |
![]() |
Rethinking It Security: What Needs to Be Said. How Can We Solve the It Security Problem Long Term?
ISBN: 9781546410980 / Angielski / Miękka / 2017 / 42 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,97 |
![]() |
Hacking with Python: The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples
ISBN: 9781547130504 / Angielski / Miękka / 2017 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
66,90 |
![]() |
Federal Information Processing Standards Publications: Pubs 140-2, 180-4, 186-4, 199 & 200
ISBN: 9781547148240 / Angielski / Miękka / 2017 / 268 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
71,48 |
![]() |
NIST SP 800-18 R 1 Developing Security Plans for Federal Information Systems: Feb 2006
ISBN: 9781547152742 / Angielski / Miękka / 2006 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST SP 800-18 R 1 February 2006 The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented in a system security plan. The purpose of the system security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. The system security plan also delineates responsibilities and expected behavior of all...
NIST SP 800-18 R 1 February 2006 The objective of system security planning is to improve protection of information system resources. All federal s...
|
cena:
57,82 |
![]() |
NIST SP 800-39 Managing Information Security Risk: March 2011
ISBN: 9781547153749 / Angielski / Miękka / 2011 / 96 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST SP 800-39 March 2011 Organizational risk can include many types of risk (e.g., program management risk, investment risk, budgetary risk, legal liability risk, safety risk, inventory risk, supply chain risk, and security risk). Security risk related to the operation and use of information systems is just one of many components of organizational risk that senior leaders/executives address as part of their ongoing risk management responsibilities. Effective risk management requires that organizations operate in highly complex, interconnected environments using state-of-the-art and...
NIST SP 800-39 March 2011 Organizational risk can include many types of risk (e.g., program management risk, investment risk, budgetary risk, lega...
|
cena:
57,82 |
![]() |
SP 800-61 R 2 Computer Security Incident Handling Guide: August 2012
ISBN: 9781547154159 / Angielski / Miękka / 2012 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST SP 800-61 R 2 Aug 2012 Computer security incident response has become an important component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a successful incident response capability requires substantial planning and resources. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. This publication provides guidelines for incident handling, particularly for analyzing incident-related data and determining...
NIST SP 800-61 R 2 Aug 2012 Computer security incident response has become an important component of information technology (IT) programs. Because...
|
cena:
88,71 |
![]() |
NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems: oct 2015
ISBN: 9781547179152 / Angielski / Miękka / 2017 / 148 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
59,18 |
![]() |
NIST SP 800-130 Framework for Designing Cryptographic Key Management Systems: NIST SP 800-130 Aug 2013
ISBN: 9781547179312 / Angielski / Miękka / 2017 / 122 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
58,24 |
![]() |
NIST SP 800-60 Guide for Mapping Types of Information and Information Systems to: Nist SP 800-60
ISBN: 9781547202775 / Angielski / Miękka / 2008 / 56 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST SP 800-60 August 2008 This guideline has been developed to assist Federal government agencies to categorize information and information systems. The guideline's objective is to facilitate application of appropriate levels of information security according to a range of levels of impact or consequences that might result from the unauthorized disclosure, modification, or use of the information or information system. This document includes two volumes, a basic guideline and a volume of appendices. Users should review the guidelines provided in Volume I, then refer to only that...
NIST SP 800-60 August 2008 This guideline has been developed to assist Federal government agencies to categorize information and information syste...
|
cena:
57,82 |
![]() |
Ransomware - Prevention and Recovery: How to Avoid Paying a Ransom
ISBN: 9781548276607 / Angielski / Miękka / 2017 / 170 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Ransomware - Malware - WannaCry These pages are not just ransomware definitions or descriptions. Not just case studies of others' demises. Not just warnings and admonitions of what not to do. They are pages to give understanding and the justification for taking the action steps given so that you can prevent most any ransomware attack and, if not, recover from the attack fast and inexpensively without paying a ransom. WannaCry News - Ransomware Windows 7 Author David Pettit invites us to understand the progression and varieties of ransomware. To be informed of the things we may do to prevent...
Ransomware - Malware - WannaCry These pages are not just ransomware definitions or descriptions. Not just case studies of others' demises. Not just wa...
|
cena:
81,90 |
![]() |
Under Attack: Federal Cybersecurity and the OPM Data Breach
ISBN: 9781548336103 / Angielski / Miękka / 2017 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
73,62 |