![]() |
Cyberthreats and the Decline of the Nation-State
ISBN: 9781138204492 / Angielski / Miękka / 178 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the... This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the... |
cena:
224,33 zł |
![]() |
Cyber Dragon: Inside China's Information Warfare and Cyber Operations
ISBN: 9781440835643 / Angielski / Twarda / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. China combines financial firepower currently the world's second largest economy with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military... China combines financial firepower currently the world's second largest economy with a clear intent of fielding a modern military capable of compet... |
cena:
251,59 zł |
![]() |
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
ISBN: 9781610397209 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even...
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam...
|
cena:
76,82 zł |
![]() |
Federal Cybersecurity Research and Development Strategic Plan: 2016
ISBN: 9781530340828 / Angielski / Miękka / 54 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
60,32 zł |
![]() |
They Will Do Anything: Identity Theft and Internet Fraud
ISBN: 9781523480548 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
40,31 zł |
![]() |
Social Media Investigation for Law Enforcement
ISBN: 9781138141902 / Angielski / Twarda / 112 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Social media is becoming an increasingly important--and controversial--investigative source for law enforcement. Social Media Investigation for Law Enforcement provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial areas. The authors also point to future trends. Social media is becoming an increasingly important--and controversial--investigative source for law enforcement. Social Media Investigation for... |
cena:
853,61 zł |
![]() |
The Encrypted Book of Passwords
ISBN: 9781911452003 / Angielski / Miękka / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or stolen. Some people re-use the same password across many different online accounts. For security reasons, this is highly dangerous and inadvisable. This is because, if any cyber criminal steals your username and password information from one place, one of the first things they usually do is to try those same details in many other... A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using on... |
cena:
43,00 zł |
![]() |
The Encrypted Book of Passwords
ISBN: 9781911452027 / Angielski / Twarda / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or stolen. This edition also features a removable dust jacket to leave a plain blue, more discrete, cover. Some people re-use the same password across many different online accounts. For security reasons, this is highly dangerous and inadvisable. This is because, if any cyber criminal steals your username and password information from... A password journal with a major difference An alphabetized storage solution for over 500 separate account, username and password details, using on... |
cena:
107,56 zł |
![]() |
The Encrypted Pocketbook of Passwords
ISBN: 9781911452089 / Angielski / Miękka / 122 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A password journal with a major difference An alphabetized storage solution for over 200 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or stolen. Some people re-use the same password across many different online accounts. For security reasons, this is highly dangerous and inadvisable. This is because, if any cyber criminal steals your username and password information from one place, one of the first things they usually do is to try those same details in many other... A password journal with a major difference An alphabetized storage solution for over 200 separate account, username and password details, using on... |
cena:
25,57 zł |
| |
Cyber Conflict After Stuxnet: Essays from the Other Bank of the Rubicon
ISBN: 9780989327442 / Angielski / Miękka / 206 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
68,87 zł |
![]() |
Cybersecurity: Home and Small Business
ISBN: 9781911452041 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the fraction of a second since you started to read this, more people, businesses and other organizations of all sizes have had their computers, accounts, mobile devices and other connected technologies compromised. In the fraction of a second since you started to read this, more people, businesses and other organizations of all sizes have had their computers, ... |
cena:
47,30 zł |
![]() |
The Internet of Risky Things: Trusting the Devices That Surround Us
ISBN: 9781491963623 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other information technology initiatives, we're headed for trouble. With a focus on concrete solutions, The Internet of Risky Things explains how we can avoid simple flaws that have plagued several dramatic IT advances in recent decades. Developers,... By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. I... |
cena:
110,40 zł |
![]() |
Facing Cyber Threats Head on: Protecting Yourself and Your Business
ISBN: 9781442265486 / Angielski / Twarda / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. News breaks all the time that hackers have attacked another company. Media outlets regularly cover cyber events. The President issues executive orders, and Congress explores cyber legislation. With all these events happening, business leaders must ask: what does this mean for my business and me? Facing Cyber Threats Head On looks at cyber security from a business leader perspective. By avoiding deep technical explanations of "how" and focusing on the "why" and "so what," this book guides readers to a better understanding of the challenges that cyber security presents to modern business, and...
News breaks all the time that hackers have attacked another company. Media outlets regularly cover cyber events. The President issues executive orders...
|
cena:
180,47 zł |
![]() |
Security Management in Mobile Cloud Computing
ISBN: 9781522506027 / Angielski / Twarda / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms"--
"This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating a variety of protoc...
|
cena:
766,68 zł |
![]() |
Account Security Basics: An actionable guide to securing your online accounts, preventing identity theft, and ending cyber-fraud for good.
ISBN: 9781537049762 / Angielski / Miękka / 110 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Account Security Basics An actionable guide to securing your online accounts, preventing identity theft, and ending cyber-fraud for good. More people are using the Internet today than EVER before Every Single Day There Are millions of People Who Have Their Online Accounts Compromised, Have You Been One Of Them? If you haven't, or even if you have, let me show you EXACTLY how you can prevent ANY AND ALL security threats now and forever. With this Account Security Basics training guide, you can... - Secure all of your online accounts - Use a system to generate safe credentials - Learn to...
Account Security Basics An actionable guide to securing your online accounts, preventing identity theft, and ending cyber-fraud for good. More people ...
|
cena:
36,28 zł |
![]() |
Using Automated Fix Generation
ISBN: 9783639454390 / Angielski / Miękka / 84 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
219,69 zł |
![]() |
Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, Space 2016, Hyderabad, India, December 14-18, 2016, Proceedings
ISBN: 9783319494449 / Angielski / Miękka / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016.
This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2...
|
cena:
201,72 zł |
![]() |
Tor & Darknet: in the Art of Anonymity
ISBN: 9781539537151 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Surf the Internet and Darknet anonymous. Learn how to get invisible for everyone while using software from FBI, CIS and CIA. Make the Anonymous to your Profession.
Surf the Internet and Darknet anonymous. Learn how to get invisible for everyone while using software from FBI, CIS and CIA. Make the Anonymous to you...
|
cena:
28,05 zł |
![]() |
How to Disappear From The Internet Completely While Leaving False Trails: How to Be Anonymous Online
ISBN: 9781539618768 / Angielski / Miękka / 52 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How to Disappear From The Internet Completely While Leaving False Trails How to Be Anonymous Online Why do some people want to erase themselves completely from the internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are reading this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step... How to Disappear From The Internet Completely While Leaving False Trails How to Be Anonymous Online<... |
cena:
58,72 zł |
![]() |
Introduction to Computer Security
ISBN: 9780321512949 / Angielski / Twarda / 556 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the...
Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-securi...
|
cena:
1154,00 zł |