![]() |
My Password Journal
ISBN: 9781681452548 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
61,45 zł |
![]() |
Password Journal
ISBN: 9781681452968 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
61,45 zł |
![]() |
Password Keeper
ISBN: 9781681452647 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
61,45 zł |
![]() |
Website Address Book
ISBN: 9781681457260 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Never suffer through the pain of losing your password again With this website address book, you will have all your log in information within easy reach. This highly durable book is best carried around so you get the same convenience of having all your online records in one place no matter where you are.
Never suffer through the pain of losing your password again With this website address book, you will have all your log in information within easy rea...
|
cena:
61,45 zł |
![]() |
Password Journal and Website Keeper
ISBN: 9781681458120 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The suffering of forgetting your password and having to reset it every time is frustrating and should never be endured by anyone at all. But mentally keeping track of all your logins can be difficult to do so why don't you write them down in this classy password keeper journal? With pages to fill, this book has plenty of space for all your websites.
The suffering of forgetting your password and having to reset it every time is frustrating and should never be endured by anyone at all. But mentally ...
|
cena:
61,45 zł |
![]() |
Google Hacking for Penetration Testers
ISBN: 9780128029640 / Angielski / Miękka / 234 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide... Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no on... |
cena:
229,20 zł |
![]() |
You: For Sale: Protecting Your Personal Data and Privacy Online
ISBN: 9780128034057 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been... Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Ev... |
cena:
146,29 zł |
![]() |
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
ISBN: 9780393352177 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the... Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if yo... |
cena:
68,24 zł |
![]() |
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801772 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, China, Russia, and North Korea. Any cyber threat-sharing legislation produced by Congress should enhance existing capabilities and relationships while establishing procedures to safeguard personal privacy. The cyber breach of health insurance giant Anthem exposed the personal information of up to 80 million Americans, approximately 1 in every 4 Americans, demonstrating that the quantity and sophistication of these attacks is only increasing. The...
For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, C...
|
cena:
64,37 zł |
![]() |
Examining the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801864 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But today, American prosperity depends as much on defending those networks as it does on expanding them. Every day, our country faces digital intrusions from criminals, activists, terrorists, and nation-states like Russia, China, and Iran. The impact of those intrusions are felt everywhere; from our National security secrets to the personal information of Americans. We cannot tolerate acts of cyber vandalism, theft, or cyber warfare, especially...
At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But...
|
cena:
64,37 zł |
![]() |
Emerging Threats and Technologies to Protect the Homeland
ISBN: 9781514802182 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from nation-state and organized criminal actors, it is important that each of the components within the Department of Homeland Security rise to the challenge and meet these threats. Privately-owned entities that make up the Nation's critical infrastructure, including our ports, energy networks, chemical manufacturers, transportation and financial sectors, and telecommunication providers, are all vital to our societal and economic well-being. What is...
Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from...
|
cena:
64,37 zł |
![]() |
The Expanding Cyber Threat
ISBN: 9781514864722 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reports of cyber criminals, "hacktivists" and nation-states accessing sensitive information and disrupting services in both the public and private domains have risen steadily, heightening concerns over the adequacy of cybersecurity measures. Cybersecurity related concerns range from spearfishing attempts and spam, to malware, to illegal or illicit activity on the dark net. More and more cases of successful cyber-attacks are being reported. Financial information, medical records, any and all personal data maintained on computer systems by individuals or by organizations large and small are...
Reports of cyber criminals, "hacktivists" and nation-states accessing sensitive information and disrupting services in both the public and private dom...
|
cena:
76,46 zł |
![]() |
IT-Sicherheit 1.5: Internetprotokolle, Webprogrammierung, Systemsicherheit
ISBN: 9781481119276 / Niemiecki / Miękka / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der darin laufenden Anwendungen oder daruber abgewickelten Geschaftsprozesse. Der Begriff Sicherheit erstreckt sich auf Erkennen und Abwehr bzw. Ausschalten von Spionage (Angriffe von aussen zur Erlangung von Informationen), Sabotage (Angriffe von aussen oder innen zur Behinderung von Geschaftsablaufen), Fahrlassigkeit (eine milde Form der Sabotage, oft in Form einer Eigensabotage) und Unkenntnis (wiederum eine milde Form der Fahrlassigkeit, oft in der Form eigene Fahrlassigkeit...
Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der darin laufenden Anwendungen oder daru...
|
cena:
88,37 zł |
![]() |
NSA, BND & Co.: Die Möglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmaßnahmen
ISBN: 9781495256134 / Niemiecki / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Enthullungen von Edward Snowden uber die Bespitzelung europaischer Burger und Regierungen durch die NSA und andere Dienste haben einiges an peinlicher Aufregung verursacht - peinlich nicht nur fur die USA, sondern besonders fur die betroffenen Regierungen und Burger, die mit einem geruttelt Mass an Ignoranz und Fahrlassigkeit ihre Daten zum grossen Teil selbst offentlich zum Abholen prasentieren. Auch jetzt noch scheint die Ansicht vor zuherrschen, man konne Verschlusselung durch ein gesetzliches Leseverbot einsparen. In diesem Buch gehen wir der Frage nach, uber welche Techniken die...
Die Enthullungen von Edward Snowden uber die Bespitzelung europaischer Burger und Regierungen durch die NSA und andere Dienste haben einiges an peinli...
|
cena:
58,51 zł |
![]() |
Hacking: Basic Security, Penetration Testing and How to Hack
ISBN: 9781512300772 / Angielski / Miękka / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Hurry Scroll to the top and "BUY" your copy today
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of ...
|
cena:
53,99 zł |
![]() |
Tackling the SPAM Menace
ISBN: 9781516988648 / Angielski / Miękka / 44 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Table of Contents Introduction So How Does a Spammer Benefit by Sending You Spam Viruses and Malware Recognizing Fraudulent Spam Messages Who Are These Spammers? Email Marketing - Spam Effect Spam After Effects on Email Marketing Scare Tactics Protect Yourself from Spam Spam Combat Ideas Desktop Alert Applications and Programs? The CAN -SPAM Act Eliminating Spam Conclusion Author Bio Publisher Introduction For all those, who cannot do without their computers, especially the Internet, spam happens to be a part and parcel of their daily life. The real meaning of spam is to describe tinned meat,...
Table of Contents Introduction So How Does a Spammer Benefit by Sending You Spam Viruses and Malware Recognizing Fraudulent Spam Messages Who Are Thes...
|
cena:
28,20 zł |
![]() |
Bit Wars: Cyber Crime, Hacking & Information Warfare
ISBN: 9781514673157 / Angielski / Miękka / 98 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
22,20 zł |
![]() |
Seguro, Atento y Simpático: Cómo utilizar los medios sociales para impresionar a universidades y a futuros empleadores
ISBN: 9780988403932 / Angielski / Miękka / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Lo que aprendera en este libro:
1) Como los medios sociales pueden perjudicar el futuro de su hijo 2) Errores comunes que se cometen en los medios sociales 3) Estrategias y publicaciones en los medios sociales que impresionan a las universidades 4) Estrategias y publicaciones en los medios sociales que impresionan a futuros empleadores 5) Sitios de redes sociales que ayudan a brillar en linea 6) Como y cuando hacer tu imagen privada 7) Como hablar con sus hijos 8) Como crear un plan juntos 9) Casos de estudiantes exitosos que estan... Lo que aprendera en este libro:
1) Como los medios sociales pueden perjudicar el futuro de su hijo 2) Errores comunes que s... |
cena:
32,28 zł |
![]() |
Improving Information Security Practices through Computational Intelligence
ISBN: 9781466694262 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering"--
"This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion...
|
cena:
1073,35 zł |
![]() |
Building a Life and Career in Security: A Guide from Day 1 to Building A Life and Career in Information Security
ISBN: 9780692514153 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As I've looked at my own path and helped others along their journey, there is a framework for success in information security. My goal in writing this book is give you the confidence to grow your own career in information security. I've analyzed my career and the careers of others to design a plan to build a successful career in information security. My focus is on how you can use the content you know along with broadening your knowledge to give you an advantage in getting a promotion or moving to a new opportunity. In the short term, this book can be your mentor to guiding your career. As...
As I've looked at my own path and helped others along their journey, there is a framework for success in information security. My goal in writing this...
|
cena:
28,20 zł |