Online Advertising and Hidden Hazards to Consumer Security and Data Privacy
ISBN: 9781508609230 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the emergence of the Internet and e-commerce, more and more commonplace activities are taking place on the Internet, which has led to major advances in convenience, consumer choice, and economic growth. These advances have also presented novel questions concerning whether consumer security and privacy can be maintained in the new technology-based world. We will examine these issues today specifically in the context of online advertising, where vast data is collected and cyber criminals exploit vulnerabilities in the system and use malware to harm consumers. Consumers who venture into the...
With the emergence of the Internet and e-commerce, more and more commonplace activities are taking place on the Internet, which has led to major advan...
|
|
cena:
101,40 zł |
Essential Cybersecurity Science
ISBN: 9781491920947 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics,... If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to... |
|
cena:
204,08 zł |
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
ISBN: 9781491902332 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation. A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected... This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people tryin... |
|
cena:
217,93 zł |
What Happens on Campus Stays on YouTube: The NEW rules for your reputation on campus, online, and beyond.
ISBN: 9780991183524 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the student version of Qualman's book What Happens in Vegas Stays on YouTube. Learn the new rules for your reputation on campus, online and beyond. Today, your digital reputation is determining your next internship or job offer, your role in student organizations and leadership positions, even athletic scholarships and much more This book will help you not only protect your reputation, but it will teach you how to leverage digital tools to produce a strong digital presence. The book includes several student case studies, tips, resources and more. You can read it in a day and...
This is the student version of Qualman's book What Happens in Vegas Stays on YouTube. Learn the new rules for your reputation on campus, online and be...
|
|
cena:
73,87 zł |
Secret Password Journal
ISBN: 9781681456287 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
70,35 zł |
My Password Journal
ISBN: 9781681452548 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
70,35 zł |
Password Journal
ISBN: 9781681452968 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
70,35 zł |
Password Keeper
ISBN: 9781681452647 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
70,35 zł |
Website Address Book
ISBN: 9781681457260 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Never suffer through the pain of losing your password again With this website address book, you will have all your log in information within easy reach. This highly durable book is best carried around so you get the same convenience of having all your online records in one place no matter where you are.
Never suffer through the pain of losing your password again With this website address book, you will have all your log in information within easy rea...
|
|
cena:
70,35 zł |
Password Journal and Website Keeper
ISBN: 9781681458120 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The suffering of forgetting your password and having to reset it every time is frustrating and should never be endured by anyone at all. But mentally keeping track of all your logins can be difficult to do so why don't you write them down in this classy password keeper journal? With pages to fill, this book has plenty of space for all your websites.
The suffering of forgetting your password and having to reset it every time is frustrating and should never be endured by anyone at all. But mentally ...
|
|
cena:
70,35 zł |
Google Hacking for Penetration Testers
ISBN: 9780128029640 / Angielski / Miękka / 234 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide... Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no on... |
|
cena:
243,26 zł |
You: For Sale: Protecting Your Personal Data and Privacy Online
ISBN: 9780128034057 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been... Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Ev... |
|
cena:
155,26 zł |
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801772 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, China, Russia, and North Korea. Any cyber threat-sharing legislation produced by Congress should enhance existing capabilities and relationships while establishing procedures to safeguard personal privacy. The cyber breach of health insurance giant Anthem exposed the personal information of up to 80 million Americans, approximately 1 in every 4 Americans, demonstrating that the quantity and sophistication of these attacks is only increasing. The...
For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, C...
|
|
cena:
73,68 zł |
Examining the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801864 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But today, American prosperity depends as much on defending those networks as it does on expanding them. Every day, our country faces digital intrusions from criminals, activists, terrorists, and nation-states like Russia, China, and Iran. The impact of those intrusions are felt everywhere; from our National security secrets to the personal information of Americans. We cannot tolerate acts of cyber vandalism, theft, or cyber warfare, especially...
At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But...
|
|
cena:
73,68 zł |
Emerging Threats and Technologies to Protect the Homeland
ISBN: 9781514802182 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from nation-state and organized criminal actors, it is important that each of the components within the Department of Homeland Security rise to the challenge and meet these threats. Privately-owned entities that make up the Nation's critical infrastructure, including our ports, energy networks, chemical manufacturers, transportation and financial sectors, and telecommunication providers, are all vital to our societal and economic well-being. What is...
Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from...
|
|
cena:
73,68 zł |
The Expanding Cyber Threat
ISBN: 9781514864722 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reports of cyber criminals, "hacktivists" and nation-states accessing sensitive information and disrupting services in both the public and private domains have risen steadily, heightening concerns over the adequacy of cybersecurity measures. Cybersecurity related concerns range from spearfishing attempts and spam, to malware, to illegal or illicit activity on the dark net. More and more cases of successful cyber-attacks are being reported. Financial information, medical records, any and all personal data maintained on computer systems by individuals or by organizations large and small are...
Reports of cyber criminals, "hacktivists" and nation-states accessing sensitive information and disrupting services in both the public and private dom...
|
|
cena:
87,54 zł |
IT-Sicherheit 1.5: Internetprotokolle, Webprogrammierung, Systemsicherheit
ISBN: 9781481119276 / Niemiecki / Miękka / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der darin laufenden Anwendungen oder daruber abgewickelten Geschaftsprozesse. Der Begriff Sicherheit erstreckt sich auf Erkennen und Abwehr bzw. Ausschalten von Spionage (Angriffe von aussen zur Erlangung von Informationen), Sabotage (Angriffe von aussen oder innen zur Behinderung von Geschaftsablaufen), Fahrlassigkeit (eine milde Form der Sabotage, oft in Form einer Eigensabotage) und Unkenntnis (wiederum eine milde Form der Fahrlassigkeit, oft in der Form eigene Fahrlassigkeit...
Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der darin laufenden Anwendungen oder daru...
|
|
cena:
101,17 zł |
NSA, BND & Co.: Die Möglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmaßnahmen
ISBN: 9781495256134 / Niemiecki / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Enthullungen von Edward Snowden uber die Bespitzelung europaischer Burger und Regierungen durch die NSA und andere Dienste haben einiges an peinlicher Aufregung verursacht - peinlich nicht nur fur die USA, sondern besonders fur die betroffenen Regierungen und Burger, die mit einem geruttelt Mass an Ignoranz und Fahrlassigkeit ihre Daten zum grossen Teil selbst offentlich zum Abholen prasentieren. Auch jetzt noch scheint die Ansicht vor zuherrschen, man konne Verschlusselung durch ein gesetzliches Leseverbot einsparen. In diesem Buch gehen wir der Frage nach, uber welche Techniken die...
Die Enthullungen von Edward Snowden uber die Bespitzelung europaischer Burger und Regierungen durch die NSA und andere Dienste haben einiges an peinli...
|
|
cena:
66,98 zł |
Hacking: Basic Security, Penetration Testing and How to Hack
ISBN: 9781512300772 / Angielski / Miękka / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Hurry Scroll to the top and "BUY" your copy today
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of ...
|
|
cena:
61,81 zł |
Tackling the SPAM Menace
ISBN: 9781516988648 / Angielski / Miękka / 44 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Table of Contents Introduction So How Does a Spammer Benefit by Sending You Spam Viruses and Malware Recognizing Fraudulent Spam Messages Who Are These Spammers? Email Marketing - Spam Effect Spam After Effects on Email Marketing Scare Tactics Protect Yourself from Spam Spam Combat Ideas Desktop Alert Applications and Programs? The CAN -SPAM Act Eliminating Spam Conclusion Author Bio Publisher Introduction For all those, who cannot do without their computers, especially the Internet, spam happens to be a part and parcel of their daily life. The real meaning of spam is to describe tinned meat,...
Table of Contents Introduction So How Does a Spammer Benefit by Sending You Spam Viruses and Malware Recognizing Fraudulent Spam Messages Who Are Thes...
|
|
cena:
32,29 zł |