![]() |
Security: The Human Factor
ISBN: 9781849280631 / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security: The Human Factor looks at the challenges associated with information security, the consequences of failing to meet them and - most importantly - at the steps organisations can take to make themselves and their information more secure.
Security: The Human Factor looks at the challenges associated with information security, the consequences of failing to meet them and - most important...
|
cena:
75,79 |
![]() |
Computer Viruses and Malware
ISBN: 9781441940162 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware... Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger... |
cena:
522,07 |
![]() |
Virtual Chaos: Our Vulnerability to Cyber-Crime and How to Prevent It
ISBN: 9780984580149 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, entertainment and communication. Instead of giving complex and intimidating remedies, Rohrbach provides real security solutions any computer user can implement.
You will learn how to: • Analyze your computer for viruses, malware and spyware • Protect your children while they use the Internet • Secure your home and small business wireless network • Prevent cyber stalking and unwarranted intrusion into your personal life • Ensure your on... In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, enterta...
|
cena:
85,10 |
![]() |
21st Century Chinese Cyberwarfare
ISBN: 9781849283342 / Angielski / Miękka / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu (The Art of War), the Thirty-Six Principles from the Warring States...
Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The P...
|
cena:
303,28 |
![]() |
Worm: The First Digital World War
ISBN: 9780802145949 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world.
Surprisingly, the U.S. government was only vaguely aware of the threat that... The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, tele...
|
cena:
60,82 |
![]() |
Database Nation: The Death of Privacy in the 21st Century
ISBN: 9780596001056 / Angielski / Miękka / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were... Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video su... |
cena:
64,43 |
![]() |
Cuckoo Malware Analysis
ISBN: 9781782169239 / Angielski / Miękka / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
|
cena:
178,75 |
![]() |
Implementing Appfog
ISBN: 9781849698184 / Angielski / Miękka / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. AppFog is the leading platform-as-a-service provider of PHP, Ruby, Node.js, and Java solutions. It is used by developers worldwide to deploy tens of thousands of applications. AppFog delivers a reliable, scalable, and fast platform for deploying applications in the cloud. This book is a hands-on guide that will walk you through creating and deploying applications to the cloud using AppFog, which will allow you to get your application deployed without the hassle of setting up servers. This book demonstrates how to use the AppFog service to build an application and have it running in the Cloud....
AppFog is the leading platform-as-a-service provider of PHP, Ruby, Node.js, and Java solutions. It is used by developers worldwide to deploy tens of t...
|
cena:
140,44 |
![]() |
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
ISBN: 9780071823074 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion... Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve ... |
cena:
277,47 |
![]() |
Android Security Internals
ISBN: 9781593275815 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals--until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys-tem. Elenkov describes Android security archi-tecture from the bottom up, delving into the imple-mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic...
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h...
|
cena:
240,93 |
![]() |
Android Malware and Analysis
ISBN: 9781482252194 / Angielski / Twarda / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis. The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal ma... |
cena:
300,52 |
![]() |
Stuxnet: The True Story of Hunt and Evolution
ISBN: 9781499709223 / Angielski / Miękka / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer viruses can be confusing. They can also be fascinating. This book is about a notorious computer virus Stuxnet. You might be wondering: there are so many computer viruses, why Stuxnet? What is so special about the Stuxnet computer worm? Stuxnet never managed to become the biggest, the scariest, or the most sophisticated malware. At the same time, because of some unexpected twists of fate, Stuxnet had become much more than just a computer worm. Stuxnet brought from shadows into spotlight some very serious issues with the Internet security ranging from stolen digital certificates and...
Computer viruses can be confusing. They can also be fascinating. This book is about a notorious computer virus Stuxnet. You might be wondering: there ...
|
cena:
40,87 |
![]() |
Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
ISBN: 9781491913710 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings, an investigative look into the shady world of email spammers and the people trying to stop them. This compelling expose explores the shadowy world of the people responsible for today's junk-email epidemic. Investigative journalist Brian McWilliams delivers a fascinating account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and anti-spam activists. McWilliams chronicles the activities of several... "People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings |
cena:
94,98 |
![]() |
Code of Practice for Cyber Security in the Built Environment
ISBN: 9781849198912 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing on building-related systems and all connections to the wider cyber environment. It provides clear practical guidance to help multidisciplinary teams understand how the management of key aspects of cyber security relate to their specific jobs and responsibilities in maintaining the security of a building. It is intended to act as an integral part of an organization's overall management system ensuring the cyber security of building related...
This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing ...
|
cena:
455,36 |
![]() |
Hyper-V Security
ISBN: 9781782175490 / Angielski / Miękka / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
140,44 |
![]() |
Getting Started with Windows Server Security
ISBN: 9781784398729 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
208,56 |
![]() |
Cybersecurity Policies and Strategies for Cyberwarfare Prevention
ISBN: 9781466684560 / Angielski / Twarda / 494 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1238,56 |
![]() |
Information Security & Cybersecurity at the Federal Aviation Administration: Challenges & Control Efforts
ISBN: 9781634833127 / Angielski / Twarda / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
795,00 |
![]() |
Dark Territory: The Secret History of Cyber War
ISBN: 9781476763262 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "An important, disturbing, and gripping history" (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars--where every country can be a major power player and every hacker a mass destroyer. In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security....
"An important, disturbing, and gripping history" (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and t...
|
cena:
75,98 |
![]() |
Robotics + Human-Computer Interaction + Cryptography
ISBN: 9781530180332 / Angielski / Miękka / 84 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Robotics at its best
Discover A Book That Tells You What You Should Do and How Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Examples are provided for a more knowledgeable approach on your learning You will also learn the designs and forms of Robotics, and what's more... Robotics at its best
Discover A Book That Tells You What You Should Do and How Instead of jumping right into the instruct... |
cena:
76,27 |