• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1825

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Managing Cyber Risk in the Financial Sector: Lessons from Asia, Europe and the USA Ruth Taplin 9781138935464 Routledge
Managing Cyber Risk in the Financial Sector: Lessons from Asia, Europe and the USA

ISBN: 9781138935464 / Angielski / Twarda / 178 str.

ISBN: 9781138935464/Angielski/Twarda/178 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ruth Taplin

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information ("big data") held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book...

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely mone...

cena: 756,05 zł

 Privacy in the Digital Age: Preventing Data Breaches and Combating Cyber Crime Committee on the Judiciary United States 9781517400361 Createspace
Privacy in the Digital Age: Preventing Data Breaches and Combating Cyber Crime

ISBN: 9781517400361 / Angielski / Miękka / 224 str.

ISBN: 9781517400361/Angielski/Miękka/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Committee on the Judiciary United States
Most Americans have been alarmed by the recent data breaches at Target, Neiman Marcus, and Michaels stores. The investigations into those cyber attacks are ongoing. But they have compromised the privacy and security of millions of American consumers-potentially putting one in three Americans at risk of identity theft and other cyber crimes. public confidence is crucial to our economy. If we do not have faith in businesses' ability to protect their personal information, then our economic recovery is going to falter. And in the digital age, major data breaches involving our private information...
Most Americans have been alarmed by the recent data breaches at Target, Neiman Marcus, and Michaels stores. The investigations into those cyber attack...
cena: 88,57 zł

 Cybersecurity and Human Rights in the Age of Cyberveillance Joanna Kulesza Roy Balleste 9781442260412 Rowman & Littlefield Publishers
Cybersecurity and Human Rights in the Age of Cyberveillance

ISBN: 9781442260412 / Angielski / Twarda / 248 str.

ISBN: 9781442260412/Angielski/Twarda/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joanna Kulesza; Roy Balleste
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents contemporary perspectives on the limits of human rights in the international internet community.
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents c...
cena: 439,01 zł

 Cyber Warfare: Prepping for Tomorrow Bobby Akart Freedom Preppers 9781518653490 Createspace
Cyber Warfare: Prepping for Tomorrow

ISBN: 9781518653490 / Angielski / Miękka / 180 str.

ISBN: 9781518653490/Angielski/Miękka/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bobby Akart; Freedom Preppers
"I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones." Albert Einstein Amazon #1 Best Seller Politics & Social Sciences > Disaster Relief Amazon #1 Best Seller Politics & Social Sciences > War + Peace Amazon #1 Best Seller Engineering & Transportation > Operations Management Amazon #1 Best Seller Business & Money > Technical Amazon #1 Best Seller Science & Math > Technology In poll after poll, one of the threats facing our nation is the use of a cyber attack to cause a grid down scenario. There are many bad actors on the...
"I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones." Albert Einstein Amazon #1 Best Se...
cena: 40,27 zł

 Web Security Exploits Elden Federgreen Bryant Wan Nicholas Dworak 9781519196804 Createspace
Web Security Exploits

ISBN: 9781519196804 / Angielski / Miękka / 172 str.

ISBN: 9781519196804/Angielski/Miękka/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elden Federgreen; Bryant Wan; Nicholas Dworak
The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud. This is your guide to web security exploits.
The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud. This is your guide to web securit...
cena: 153,33 zł

 Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare Metodi Hadji-Janev Mitko Bogdanoski 9781466687936 Information Science Reference
Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare

ISBN: 9781466687936 / Angielski / Twarda / 576 str.

ISBN: 9781466687936/Angielski/Twarda/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Metodi Hadji-Janev; Mitko Bogdanoski
"This book addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers"--
"This book addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive pr...
cena: 1712,25 zł

 HIDE ME NOW! My Internet and Wi-Fi Passwords book Jones, Edward C. 9781518751486 Createspace
HIDE ME NOW! My Internet and Wi-Fi Passwords book

ISBN: 9781518751486 / Angielski / Miękka / 68 str.

ISBN: 9781518751486/Angielski/Miękka/68 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Edward C. Jones
This may be the best mostly-empty book that you've ever owned This is one simple, straightforward, single place where you can store all your important login information and not risk losing all your valuable password information if it is stored on your computer and you suffer a computer failure. In addition to pages for your Internet logins and passwords, you'll find pages for your overall internet and wireless network information, space for cellphone and tablet logins, and commonly used customer service numbers for all the major internet providers.
This may be the best mostly-empty book that you've ever owned This is one simple, straightforward, single place where you can store all your importan...
cena: 40,31 zł

 Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools Chapman, Chris 9780128035849 SYNGRESS MEDIA
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

ISBN: 9780128035849 / Angielski / Miękka / 380 str.

ISBN: 9780128035849/Angielski/Miękka/380 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Chapman

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets--such as servers, switches,...

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and...

cena: 229,20 zł

 Implementing Digital Forensic Readiness: From Reactive to Proactive Process Jason Sachowski 9780128044544 SYNGRESS MEDIA
Implementing Digital Forensic Readiness: From Reactive to Proactive Process

ISBN: 9780128044544 / Angielski / Miękka / 374 str.

ISBN: 9780128044544/Angielski/Miękka/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jason Sachowski

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization's business operations and information security's program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital...

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals ho...

cena: 229,20 zł

 New Threats and Countermeasures in Digital Crime and Cyber Terrorism Maurice Dawson Marwan Omar 9781466683457 Information Science Reference
New Threats and Countermeasures in Digital Crime and Cyber Terrorism

ISBN: 9781466683457 / Angielski / Twarda / 390 str.

ISBN: 9781466683457/Angielski/Twarda/390 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maurice Dawson; Marwan Omar
"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--
"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome tec...
cena: 1022,24 zł

 Big Book of Spyware Pierre Zollo 9781519680334 Createspace Independent Publishing Platform
Big Book of Spyware

ISBN: 9781519680334 / Angielski / Miękka / 146 str.

ISBN: 9781519680334/Angielski/Miękka/146 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pierre Zollo
cena: 161,41 zł

 Hacking for Beginners: Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using To Kevin Donaldson 9781523245086 Createspace Independent Publishing Platform
Hacking for Beginners: Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using To

ISBN: 9781523245086 / Angielski / Miękka / 80 str.

ISBN: 9781523245086/Angielski/Miękka/80 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin Donaldson
Learn how to hack Get the scoop on the secret techniques that the professional hackers are using today Protect yourself and your identity by learning hacking techniques. A must-have book "Hacking for Beginners" contains proven steps and strategies on how to change computer hardware and software to achieve an objective which is beyond the maker's original concept. So what is hacking? Hacking is also termed as penetration testing which is aimed to determine the various security vulnerabilities of a system or program to secure it better. Hacking is in fact the art of discovering diverse...
Learn how to hack Get the scoop on the secret techniques that the professional hackers are using today Protect yourself and your identity by learnin...
cena: 44,31 zł

 Bogen om password: Irriterende - men helt nødvendige. En guide til den almindelige it-bruger derhjemme . John Madum 9788771704655 Books on Demand
Bogen om password: Irriterende - men helt nødvendige. En guide til den almindelige it-bruger derhjemme .

ISBN: 9788771704655 / Duński / Miękka / 86 str.

ISBN: 9788771704655/Duński/Miękka/86 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Madum
Password - Irriterende - men helt nodvendige Sa kom den - bogen om passwords til alle os it-brugere. Bogen anviser, hvordan vi kan gore vores brug af passwords lidt mere sikker. Forfatteren fortaeller, at vi ikke skal have samme password alle steder. Han anbefaler, at vi f.eks. opdeler i: Det kritiske password Det knap sa kritiske password Mine online ting Han fortaeller om menneskelig adfaerd, og hvordan hackeren gor brug af det, sa du kan undga at vaere forudsigelig. Han fortaeller, at du i hvert fald skal undga: at bruge netop 1 stort bogstav og saette det forst at bruge netop 1 tal og...
Password - Irriterende - men helt nodvendige Sa kom den - bogen om passwords til alle os it-brugere. Bogen anviser, hvordan vi kan gore vores brug af ...
cena: 68,20 zł

 Hack Proof: Protecting your privacy and personal data in the Digital Economy Berry, John 9780996601207 Big Sky
Hack Proof: Protecting your privacy and personal data in the Digital Economy

ISBN: 9780996601207 / Angielski / Miękka / 270 str.

ISBN: 9780996601207/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Berry
Hack Proof - a guide to protecting your privacy and personal data in the digital economy. You are under surveillance and being tracked without your knowledge. Your personal data is being collected and traded without your permission. Increasing numbers of cyber criminals are out to steal from you. No one is going to protect you and unless you make changes, it is only going to get worse. Unlike many books that describe the problem, Hack Proof goes further with clear Action Steps and products and solution links to protect your data and privacy.
Hack Proof - a guide to protecting your privacy and personal data in the digital economy. You are under surveillance and being tracked without your kn...
cena: 60,32 zł

 
TOR Bible

ISBN: 9781518864902 / Angielski / Miękka / 246 str.

ISBN: 9781518864902/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arlen Kraham
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. To...
cena: 161,41 zł

 Engineering Secure Internet of Things Systems Benjamin Aziz Alvaro Arenas Bruno Crispo 9781785610530 Institution of Engineering & Technology
Engineering Secure Internet of Things Systems

ISBN: 9781785610530 / Angielski / Twarda / 280 str.

ISBN: 9781785610530/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Benjamin Aziz; Alvaro Arenas; Bruno Crispo
The Internet of Things (IoT) is the emerging global interconnection of billions of -smart- devices. It is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability. This important book examines these important security considerations for the IoT, covering topics including federated identity management in IoT systems; security policies and access control; formal models and foundations of the IoT;...
The Internet of Things (IoT) is the emerging global interconnection of billions of -smart- devices. It is collecting a growing amount of private and s...
cena: 596,77 zł

 Is the OPM Data Breach the Tip of the Iceberg? Subcommittee on Oversight &. Subcommitte 9781530778034 Createspace Independent Publishing Platform
Is the OPM Data Breach the Tip of the Iceberg?

ISBN: 9781530778034 / Angielski / Miękka / 126 str.

ISBN: 9781530778034/Angielski/Miękka/126 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Subcommittee on Oversight &. Subcommittee
cena: 76,46 zł

 scam.con Law, Tom 9780994315762 Longership Publishing Australia
scam.con

ISBN: 9780994315762 / Angielski / Miękka / 202 str.

ISBN: 9780994315762/Angielski/Miękka/202 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tom Law
The internet is awash with scammers and deceivers wanting you to dig deep and send them money for a reward... generally nothing Tom Law examines several ways of identifying scammers and their stock in trade often received as unwanted emails. Some are obvious to most but others almost seem genuine accompanied with fake documents etc. to draw you in. The internet brides look alluring and often pretty... but what you get is often not what you see A sometimes humorous exposure to the con artist with deadly intent, Tom Law provides sufficient warning to the cruel reality of the sophisticated...
The internet is awash with scammers and deceivers wanting you to dig deep and send them money for a reward... generally nothing Tom Law examines seve...
cena: 153,13 zł

 Hacking: Hacking for Beginners and Basic Security: How to Hack Jacob Hatcher 9781329837294 Lulu.com
Hacking: Hacking for Beginners and Basic Security: How to Hack

ISBN: 9781329837294 / Angielski / Twarda / 172 str.

ISBN: 9781329837294/Angielski/Twarda/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jacob Hatcher
HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent. In HACKING: Ultimate Hacking for Beginners you will learn: The advantages and disadvantages of Bluetooth technology. The...
HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even ...
cena: 150,52 zł

 Protecting Your Internet Identity: Are You Naked Online? Ted Claypoole Theresa Payton Chris Swecker 9781442265394 Rowman & Littlefield Publishers
Protecting Your Internet Identity: Are You Naked Online?

ISBN: 9781442265394 / Angielski / Miękka / 288 str.

ISBN: 9781442265394/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ted Claypoole; Theresa Payton; Chris Swecker
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The...
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the fi...
cena: 73,12 zł

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia