![]() |
Complete Guide to Internet Privacy, Anonymity & Security
ISBN: 9783950309300 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get downloads without censorship or restriction, prevent identity theft and keep cyber-criminals from hacking into a computer, and stop search engines, social networking sites, and powerful Internet players from tracking and profiling users.
Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get...
|
cena:
76,82 zł |
![]() |
IT Security Governance Innovations: Theory and Research
ISBN: 9781466620834 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best...
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a techni...
|
cena:
996,68 zł |
![]() |
What's My Password?
ISBN: 9781482629712 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of your overall password storage system and discontinue using sticky notes and endless scraps of paper to keep track of passwords. Use "What's My Password?" to help you protect your passwords and login information.
More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of...
|
cena:
44,18 zł |
![]() |
Internet and the Law: Technology, Society, and Compromises
ISBN: 9781610693493 / Angielski / Twarda / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about... "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of compl... |
cena:
548,27 zł |
![]() |
Untangling the Web: The Nsa's Guide to Gathering Information on Google
ISBN: 9780984284498 / Angielski / Miękka / 652 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet. From the basic to the advanced, this 650-page book offers a fascinating look at tricks the "real spies" use to uncover hidden (and not-so-hidden) information online. Chapters include: Google hacks Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet... |
cena:
172,13 zł |
![]() |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327404 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
cena:
103,30 zł |
![]() |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327411 / Angielski / Twarda / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
cena:
150,64 zł |
![]() |
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
ISBN: 9781475232707 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
|
cena:
80,66 zł |
![]() |
Cloud Security and Control
ISBN: 9781469992549 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
|
cena:
80,66 zł |
![]() |
This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
ISBN: 9780142180495 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Who Are The Cypherpunks?
This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, andWe Steal Secrets: The Story of Wikileaks, a documentary out now. WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern... Who Are The Cypherpunks?
This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate... |
cena:
92,23 zł |
![]() |
Hacking Exposed Web Applications, Third Edition
ISBN: 9780071740647 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development... The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering ... |
cena:
249,80 zł |
![]() |
Web Application Security
ISBN: 9780071776165 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious... Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess... |
cena:
199,84 zł |
![]() |
Digital Watermarking and Steganography
ISBN: 9780123725851 / Angielski / Twarda / 593 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second...
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may ch...
|
cena:
384,51 zł |
![]() |
Federated Identity Primer
ISBN: 9780124071896 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree.
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and con... |
cena:
97,30 zł |
| |
Network Forensics: Tracking Hackers Through Cyberspace
ISBN: 9780132564717 / Angielski / Twarda / 545 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field. Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. It s like a symphony meeting an encyclopedia meeting a spy novel. Michael Ford, Corero Network Security On the Internet, every...
This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditio...
|
cena:
331,38 zł |
![]() |
Digital Archaeology: The Art and Science of Digital Forensics
ISBN: 9780321803900 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has written the most thorough, realistic, and up-to-date guide to the principles and techniques of modern digital forensics. Graves begins by providing a solid understanding of the legal underpinnings of and critical laws affecting computer forensics, including key principles of evidence and case law....
The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensic...
|
cena:
365,81 zł |
![]() |
The Internet Police : How Crime Went Online, and the Cops Followed
ISBN: 9780393062984 / Angielski / Twarda / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too.
In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected... Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just compu...
|
cena:
107,55 zł |
![]() |
Practical Unix and Internet Security
ISBN: 9780596003234 / Angielski / Miękka / 988 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular... When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host s... |
cena:
211,18 zł |
![]() |
Essential PHP Security
ISBN: 9780596006563 / Angielski / Miękka / 109 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks. Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of... Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web developm... |
cena:
115,10 zł |
![]() |
Mapping Hacks: Tips & Tools for Electronic Cartography
ISBN: 9780596007034 / Angielski / Miękka / 525 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now?Well, they shouldn't. The reality is that map creation, or "cartography," has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the... Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountai... |
cena:
115,10 zł |