The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and Our Democratic Process
ISBN: 9781497696976 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation's corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the American people. This book was written in 1983 as a warning. Today it is a history. Most of its grim scenarios are now part of everyday life. The remedy proposed here, greater public oversight of industry and government, has not occurred, but a better one has not yet been found. While many individuals have willingly surrendered much of their privacy...
The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation's corpor...
|
|
cena:
56,85 zł |
Online Advertising and Hidden Hazards to Consumer Security and Data Privacy
ISBN: 9781508609230 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the emergence of the Internet and e-commerce, more and more commonplace activities are taking place on the Internet, which has led to major advances in convenience, consumer choice, and economic growth. These advances have also presented novel questions concerning whether consumer security and privacy can be maintained in the new technology-based world. We will examine these issues today specifically in the context of online advertising, where vast data is collected and cyber criminals exploit vulnerabilities in the system and use malware to harm consumers. Consumers who venture into the...
With the emergence of the Internet and e-commerce, more and more commonplace activities are taking place on the Internet, which has led to major advan...
|
|
cena:
93,65 zł |
Essential Cybersecurity Science
ISBN: 9781491920947 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics,... If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to... |
|
cena:
203,61 zł |
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
ISBN: 9781491902332 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation. A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected... This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people tryin... |
|
cena:
217,09 zł |
What Happens on Campus Stays on YouTube: The NEW rules for your reputation on campus, online, and beyond.
ISBN: 9780991183524 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the student version of Qualman's book What Happens in Vegas Stays on YouTube. Learn the new rules for your reputation on campus, online and beyond. Today, your digital reputation is determining your next internship or job offer, your role in student organizations and leadership positions, even athletic scholarships and much more This book will help you not only protect your reputation, but it will teach you how to leverage digital tools to produce a strong digital presence. The book includes several student case studies, tips, resources and more. You can read it in a day and...
This is the student version of Qualman's book What Happens in Vegas Stays on YouTube. Learn the new rules for your reputation on campus, online and be...
|
|
cena:
68,23 zł |
Secret Password Journal
ISBN: 9781681456287 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
64,97 zł |
My Password Journal
ISBN: 9781681452548 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
64,97 zł |
Password Journal
ISBN: 9781681452968 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
64,97 zł |
Password Keeper
ISBN: 9781681452647 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
64,97 zł |
Website Address Book
ISBN: 9781681457260 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Never suffer through the pain of losing your password again With this website address book, you will have all your log in information within easy reach. This highly durable book is best carried around so you get the same convenience of having all your online records in one place no matter where you are.
Never suffer through the pain of losing your password again With this website address book, you will have all your log in information within easy rea...
|
|
cena:
64,97 zł |
Password Journal and Website Keeper
ISBN: 9781681458120 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The suffering of forgetting your password and having to reset it every time is frustrating and should never be endured by anyone at all. But mentally keeping track of all your logins can be difficult to do so why don't you write them down in this classy password keeper journal? With pages to fill, this book has plenty of space for all your websites.
The suffering of forgetting your password and having to reset it every time is frustrating and should never be endured by anyone at all. But mentally ...
|
|
cena:
64,97 zł |
Google Hacking for Penetration Testers
ISBN: 9780128029640 / Angielski / Miękka / 234 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide... Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no on... |
|
cena:
239,24 zł |
You: For Sale: Protecting Your Personal Data and Privacy Online
ISBN: 9780128034057 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been... Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Ev... |
|
cena:
154,67 zł |
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
ISBN: 9780393352177 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the... Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if yo... |
|
cena:
71,23 zł |
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
ISBN: 9781512049589 / Angielski / Miękka / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity Other books tell you to install Tor and then encrypt your hard drive... and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona - how...
The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric medi...
|
|
cena:
63,96 zł |
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801772 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, China, Russia, and North Korea. Any cyber threat-sharing legislation produced by Congress should enhance existing capabilities and relationships while establishing procedures to safeguard personal privacy. The cyber breach of health insurance giant Anthem exposed the personal information of up to 80 million Americans, approximately 1 in every 4 Americans, demonstrating that the quantity and sophistication of these attacks is only increasing. The...
For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, C...
|
|
cena:
68,05 zł |
Examining the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801864 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But today, American prosperity depends as much on defending those networks as it does on expanding them. Every day, our country faces digital intrusions from criminals, activists, terrorists, and nation-states like Russia, China, and Iran. The impact of those intrusions are felt everywhere; from our National security secrets to the personal information of Americans. We cannot tolerate acts of cyber vandalism, theft, or cyber warfare, especially...
At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But...
|
|
cena:
68,05 zł |
Emerging Threats and Technologies to Protect the Homeland
ISBN: 9781514802182 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from nation-state and organized criminal actors, it is important that each of the components within the Department of Homeland Security rise to the challenge and meet these threats. Privately-owned entities that make up the Nation's critical infrastructure, including our ports, energy networks, chemical manufacturers, transportation and financial sectors, and telecommunication providers, are all vital to our societal and economic well-being. What is...
Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from...
|
|
cena:
68,05 zł |
The Expanding Cyber Threat
ISBN: 9781514864722 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reports of cyber criminals, "hacktivists" and nation-states accessing sensitive information and disrupting services in both the public and private domains have risen steadily, heightening concerns over the adequacy of cybersecurity measures. Cybersecurity related concerns range from spearfishing attempts and spam, to malware, to illegal or illicit activity on the dark net. More and more cases of successful cyber-attacks are being reported. Financial information, medical records, any and all personal data maintained on computer systems by individuals or by organizations large and small are...
Reports of cyber criminals, "hacktivists" and nation-states accessing sensitive information and disrupting services in both the public and private dom...
|
|
cena:
80,85 zł |
IT-Sicherheit 1.5: Internetprotokolle, Webprogrammierung, Systemsicherheit
ISBN: 9781481119276 / Niemiecki / Miękka / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der darin laufenden Anwendungen oder daruber abgewickelten Geschaftsprozesse. Der Begriff Sicherheit erstreckt sich auf Erkennen und Abwehr bzw. Ausschalten von Spionage (Angriffe von aussen zur Erlangung von Informationen), Sabotage (Angriffe von aussen oder innen zur Behinderung von Geschaftsablaufen), Fahrlassigkeit (eine milde Form der Sabotage, oft in Form einer Eigensabotage) und Unkenntnis (wiederum eine milde Form der Fahrlassigkeit, oft in der Form eigene Fahrlassigkeit...
Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der darin laufenden Anwendungen oder daru...
|
|
cena:
93,44 zł |