![]() |
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
ISBN: 9780124078178 / Angielski / Miękka / 472 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a... Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools th... |
cena:
184,49 |
![]() |
WordPress Security: Protection from Hackers
ISBN: 9781482537062 / Angielski / Miękka / 70 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Steps You Can Take To Secure Your Website And Keep It Virtually Hack-Proof If you're like most people these days, you always go the extra step to keep yourself, your loved ones, and your possessions safe. You probably lock your doors at night... maybe you even have a home security system. You might have a car alarm installed as well. If I looked at your computer, I'd probably find an antivirus and a running firewall. That covers everything, right?...
IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Ste...
|
cena:
41,02 |
![]() |
Introduction to Information Security
ISBN: 9781597499699 / Angielski / Miękka / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in... Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the int... |
cena:
274,26 |
![]() |
Surveillance and Threat Detection: Prevention Versus Mitigation
ISBN: 9780124077805 / Angielski / Twarda / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ... Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle t... |
cena:
254,31 |
![]() |
Information Protection Playbook
ISBN: 9780124172326 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn... The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) profe... |
cena:
274,31 |
![]() |
Secure Smart Embedded Devices, Platforms and Applications
ISBN: 9781461479147 / Angielski / Twarda / 568 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives... New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a r... |
cena:
936,74 |
![]() |
Unmasking the Social Engineer: The Human Element of Security
ISBN: 9781118608579 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and... Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focu... |
cena:
142,56 |
![]() |
Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War
ISBN: 9781466588202 / Angielski / Twarda / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offenders. This political violence and terrorism plagues all continents and does not originate solely from jihadist groups. With a view towards developing more effective measures of prevention and resolution, Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War examines political violence in various national and international settings. A collection of works, some previously published as articles in the journal... Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offen... |
cena:
598,50 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, Dimva 2013, Berlin, Germany, July 18-19, 2013. Proce
ISBN: 9783642392344 / Angielski / Miękka / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessme...
|
cena:
187,35 |
![]() |
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone
ISBN: 9781475097009 / Angielski / Miękka / 90 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hackers and bad guys are everywhere. They're after your data so they can steal from you and make you a victim of ID theft, credit card fraud, utilities fraud, or worse. But not only can they do this through your PC or laptop, now they can do it all through your iPhone, Android, or Blackberry. Don't let them Many ID theft attempts occur when you're away from home and in unfamiliar surroundings. So when you're visiting that coffee shop with friends,...
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hacker...
|
cena:
32,95 |
![]() |
Darknet Ecosystems: Surfacing Underground Economies
ISBN: 9781484077016 / Angielski / Miękka / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. The ability to monitor, track and secure information may be organically increased through the perception that group members are getting something "free" out of the exchange of information. This may likely suggest that underground economies could be influenced, when the concept of "free" lowers the perceived market value of "anonymity." This in turn has the effect of surfacing underground economic activity. Evidence may likely suggest that an...
The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. Th...
|
cena:
152,36 |
![]() |
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Luc
ISBN: 9783642393761 / Angielski / Twarda / 295 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Goncalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011. The 34 revised papers presented were carefully reviewed and selected for inclusion in this volume. They represent a cross section of applicable research as well as case studies in security education.
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, ...
|
cena:
203,61 |
![]() |
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings
ISBN: 9783642396922 / Angielski / Miękka / 117 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, Chi...
|
cena:
187,35 |
![]() |
Privacy: Select Issues & Laws for the 21st Century
ISBN: 9781626184299 / Angielski / Twarda / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1371,51 |
![]() |
Threat Modeling: Designing for Security
ISBN: 9781118809990 / Angielski / Miękka / 624 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptograph... |
cena:
267,75 |
![]() |
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
ISBN: 9781118810118 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with... Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neim... |
cena:
249,38 |
![]() |
It-Sicherheitsmanagement Nach ISO 27001 Und Grundschutz: Der Weg Zur Zertifizierung
ISBN: 9783658017231 / Niemiecki / Miękka / 377 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Normreihe ISO 27000 und der IT-Grundschutz werden immer wichtiger fur Unternehmen und Behorden, die ein IT-Sicherheitsmanagement in ihrer Organisation einfuhren und betreiben wollen. Im internationalen Kontext ist die Anwendung der ISO 27001 fur viele Organisationen nahezu unverzichtbar. Das Buch fuhrt den Leser Schritt fur Schritt in diese Standards ein und legt verstandlich dar, wie man ein adaquates Management-System (ISMS) aufbaut und bestehende Risiken analysiert und bewertet. Die ausfuhrlich kommentierten Controls unterstutzen Sicherheitsverantwortliche bei der Auswahl...Die Normreihe ISO 27000 und der IT-Grundschutz werden immer wichtiger fur Unternehmen und Behorden, die ein IT-Sicherheitsmanagement in ihrer Organ... |
cena:
342,53 |
![]() |
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
ISBN: 9780071494267 / Angielski / Miękka / 451 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and... The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello... |
cena:
267,04 |
![]() |
Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
ISBN: 9780071599238 / Angielski / Miękka / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reduce the environmental and budgetary impact of your IT infrastructure This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a detailed implementation plan. You will find strategies for reducing power needs, procuring energy from alternative sources, utilizing virtualization technologies, and managing sustainable development. Case studies highlighting successful green IT... Reduce the environmental and budgetary impact of your IT infrastructure This groundbreaking work offers a complete roadmap f... |
cena:
157,08 |
![]() |
Designing an IAM Framework with Oracle Identity and Access Management Suite
ISBN: 9780071741378 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Develop and Implement an End-to-End IAM Solution
Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business... Develop and Implement an End-to-End IAM Solution
Maintain a high-performance, fully integrated security foundation across your enterprise using the... |
cena:
215,99 |