Bogen om password: Irriterende - men helt nødvendige. En guide til den almindelige it-bruger derhjemme .
ISBN: 9788771704655 / Duński / Miękka / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Password - Irriterende - men helt nodvendige Sa kom den - bogen om passwords til alle os it-brugere. Bogen anviser, hvordan vi kan gore vores brug af passwords lidt mere sikker. Forfatteren fortaeller, at vi ikke skal have samme password alle steder. Han anbefaler, at vi f.eks. opdeler i: Det kritiske password Det knap sa kritiske password Mine online ting Han fortaeller om menneskelig adfaerd, og hvordan hackeren gor brug af det, sa du kan undga at vaere forudsigelig. Han fortaeller, at du i hvert fald skal undga: at bruge netop 1 stort bogstav og saette det forst at bruge netop 1 tal og...
Password - Irriterende - men helt nodvendige Sa kom den - bogen om passwords til alle os it-brugere. Bogen anviser, hvordan vi kan gore vores brug af ...
|
|
cena:
71,17 zł |
Hack Proof: Protecting your privacy and personal data in the Digital Economy
ISBN: 9780996601207 / Angielski / Miękka / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hack Proof - a guide to protecting your privacy and personal data in the digital economy. You are under surveillance and being tracked without your knowledge. Your personal data is being collected and traded without your permission. Increasing numbers of cyber criminals are out to steal from you. No one is going to protect you and unless you make changes, it is only going to get worse. Unlike many books that describe the problem, Hack Proof goes further with clear Action Steps and products and solution links to protect your data and privacy.
Hack Proof - a guide to protecting your privacy and personal data in the digital economy. You are under surveillance and being tracked without your kn...
|
|
cena:
66,92 zł |
TOR Bible
ISBN: 9781518864902 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. To...
|
|
cena:
179,05 zł |
Engineering Secure Internet of Things Systems
ISBN: 9781785610530 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Internet of Things (IoT) is the emerging global interconnection of billions of -smart- devices. It is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability. This important book examines these important security considerations for the IoT, covering topics including federated identity management in IoT systems; security policies and access control; formal models and foundations of the IoT;...
The Internet of Things (IoT) is the emerging global interconnection of billions of -smart- devices. It is collecting a growing amount of private and s...
|
|
cena:
767,34 zł |
Is the OPM Data Breach the Tip of the Iceberg?
ISBN: 9781530778034 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
84,82 zł |
scam.con
ISBN: 9780994315762 / Angielski / Miękka / 202 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The internet is awash with scammers and deceivers wanting you to dig deep and send them money for a reward... generally nothing Tom Law examines several ways of identifying scammers and their stock in trade often received as unwanted emails. Some are obvious to most but others almost seem genuine accompanied with fake documents etc. to draw you in. The internet brides look alluring and often pretty... but what you get is often not what you see A sometimes humorous exposure to the con artist with deadly intent, Tom Law provides sufficient warning to the cruel reality of the sophisticated...
The internet is awash with scammers and deceivers wanting you to dig deep and send them money for a reward... generally nothing Tom Law examines seve...
|
|
cena:
169,87 zł |
Hacking: Hacking for Beginners and Basic Security: How to Hack
ISBN: 9781329837294 / Angielski / Twarda / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent. In HACKING: Ultimate Hacking for Beginners you will learn: The advantages and disadvantages of Bluetooth technology. The...
HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even ...
|
|
cena:
166,97 zł |
Protecting Your Internet Identity: Are You Naked Online?
ISBN: 9781442265394 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The...
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the fi...
|
|
cena:
80,79 zł |
Cyberthreats and the Decline of the Nation-State
ISBN: 9781138204492 / Angielski / Miękka / 178 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the... This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the... |
|
cena:
231,25 zł |
Cyber Dragon: Inside China's Information Warfare and Cyber Operations
ISBN: 9781440835643 / Angielski / Twarda / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. China combines financial firepower currently the world's second largest economy with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military... China combines financial firepower currently the world's second largest economy with a clear intent of fielding a modern military capable of compet... |
|
cena:
271,14 zł |
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
ISBN: 9781610397209 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even...
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam...
|
|
cena:
85,22 zł |
Federal Cybersecurity Research and Development Strategic Plan: 2016
ISBN: 9781530340828 / Angielski / Miękka / 54 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
66,92 zł |
They Will Do Anything: Identity Theft and Internet Fraud
ISBN: 9781523480548 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
44,72 zł |
Social Media Investigation for Law Enforcement
ISBN: 9781138141902 / Angielski / Twarda / 112 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Social media is becoming an increasingly important--and controversial--investigative source for law enforcement. Social Media Investigation for Law Enforcement provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial areas. The authors also point to future trends. Social media is becoming an increasingly important--and controversial--investigative source for law enforcement. Social Media Investigation for... |
|
cena:
867,37 zł |
The Encrypted Book of Passwords
ISBN: 9781911452003 / Angielski / Miękka / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or stolen. Some people re-use the same password across many different online accounts. For security reasons, this is highly dangerous and inadvisable. This is because, if any cyber criminal steals your username and password information from one place, one of the first things they usually do is to try those same details in many other... A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using on... |
|
cena:
47,70 zł |
The Encrypted Book of Passwords
ISBN: 9781911452027 / Angielski / Twarda / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or stolen. This edition also features a removable dust jacket to leave a plain blue, more discrete, cover. Some people re-use the same password across many different online accounts. For security reasons, this is highly dangerous and inadvisable. This is because, if any cyber criminal steals your username and password information from... A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using on... |
|
cena:
119,31 zł |
The Encrypted Pocketbook of Passwords
ISBN: 9781911452089 / Angielski / Miękka / 122 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A password journal with a major difference An alphabetized storage solution for over 200 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or stolen. Some people re-use the same password across many different online accounts. For security reasons, this is highly dangerous and inadvisable. This is because, if any cyber criminal steals your username and password information from one place, one of the first things they usually do is to try those same details in many other... A password journal with a major difference An alphabetized storage solution for over 200 separate account, username and password details, using on... |
|
cena:
28,36 zł |
Cyber Conflict After Stuxnet: Essays from the Other Bank of the Rubicon
ISBN: 9780989327442 / Angielski / Miękka / 206 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
76,40 zł |
Cybersecurity: Home and Small Business
ISBN: 9781911452041 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the fraction of a second since you started to read this, more people, businesses and other organizations of all sizes have had their computers, accounts, mobile devices and other connected technologies compromised. In the fraction of a second since you started to read this, more people, businesses and other organizations of all sizes have had their computers, ... |
|
cena:
52,47 zł |
The Internet of Risky Things: Trusting the Devices That Surround Us
ISBN: 9781491963623 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other information technology initiatives, we're headed for trouble. With a focus on concrete solutions, The Internet of Risky Things explains how we can avoid simple flaws that have plagued several dramatic IT advances in recent decades. Developers,... By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. I... |
|
cena:
132,75 zł |