• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Internet - Online Safety & Privacy

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950116]
• Literatura piękna
 [1816336]

  więcej...
• Turystyka
 [70365]
• Informatyka
 [151382]
• Komiksy
 [36157]
• Encyklopedie
 [23168]
• Dziecięca
 [611655]
• Hobby
 [135936]
• AudioBooki
 [1800]
• Literatura faktu
 [225852]
• Muzyka CD
 [388]
• Słowniki
 [2970]
• Inne
 [446238]
• Kalendarze
 [1179]
• Podręczniki
 [166839]
• Poradniki
 [469514]
• Religia
 [507394]
• Czasopisma
 [506]
• Sport
 [61426]
• Sztuka
 [242327]
• CD, DVD, Video
 [3461]
• Technologie
 [219652]
• Zdrowie
 [98967]
• Książkowe Klimaty
 [123]
• Zabawki
 [2482]
• Puzzle, gry
 [3735]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [7903]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Internet - Online Safety & Privacy

ilość książek w kategorii: 1824

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 HIDE ME NOW! My Internet and Wi-Fi Passwords book Jones, Edward C. 9781518751486 Createspace
HIDE ME NOW! My Internet and Wi-Fi Passwords book

ISBN: 9781518751486 / Angielski / Miękka / 68 str.

ISBN: 9781518751486/Angielski/Miękka/68 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Edward C. Jones
This may be the best mostly-empty book that you've ever owned This is one simple, straightforward, single place where you can store all your important login information and not risk losing all your valuable password information if it is stored on your computer and you suffer a computer failure. In addition to pages for your Internet logins and passwords, you'll find pages for your overall internet and wireless network information, space for cellphone and tablet logins, and commonly used customer service numbers for all the major internet providers.
This may be the best mostly-empty book that you've ever owned This is one simple, straightforward, single place where you can store all your importan...
cena: 39,32

 Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools Chapman, Chris 9780128035849 SYNGRESS MEDIA
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

ISBN: 9780128035849 / Angielski / Miękka / 380 str.

ISBN: 9780128035849/Angielski/Miękka/380 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Chapman

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets--such as servers, switches,...

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and...

cena: 228,27

 Implementing Digital Forensic Readiness: From Reactive to Proactive Process Jason Sachowski 9780128044544 SYNGRESS MEDIA
Implementing Digital Forensic Readiness: From Reactive to Proactive Process

ISBN: 9780128044544 / Angielski / Miękka / 374 str.

ISBN: 9780128044544/Angielski/Miękka/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jason Sachowski

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization's business operations and information security's program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital...

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals ho...

cena: 228,27

 New Threats and Countermeasures in Digital Crime and Cyber Terrorism Maurice Dawson Marwan Omar 9781466683457 Information Science Reference
New Threats and Countermeasures in Digital Crime and Cyber Terrorism

ISBN: 9781466683457 / Angielski / Twarda / 390 str.

ISBN: 9781466683457/Angielski/Twarda/390 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maurice Dawson; Marwan Omar
"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--
"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome tec...
cena: 997,10

 Big Book of Spyware Pierre Zollo 9781519680334 Createspace Independent Publishing Platform
Big Book of Spyware

ISBN: 9781519680334 / Angielski / Miękka / 146 str.

ISBN: 9781519680334/Angielski/Miękka/146 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pierre Zollo
cena: 157,44

 Hacking for Beginners: Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using To Kevin Donaldson 9781523245086 Createspace Independent Publishing Platform
Hacking for Beginners: Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using To

ISBN: 9781523245086 / Angielski / Miękka / 80 str.

ISBN: 9781523245086/Angielski/Miękka/80 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin Donaldson
Learn how to hack Get the scoop on the secret techniques that the professional hackers are using today Protect yourself and your identity by learning hacking techniques. A must-have book "Hacking for Beginners" contains proven steps and strategies on how to change computer hardware and software to achieve an objective which is beyond the maker's original concept. So what is hacking? Hacking is also termed as penetration testing which is aimed to determine the various security vulnerabilities of a system or program to secure it better. Hacking is in fact the art of discovering diverse...
Learn how to hack Get the scoop on the secret techniques that the professional hackers are using today Protect yourself and your identity by learnin...
cena: 43,22

 Bogen om password: Irriterende - men helt nødvendige. En guide til den almindelige it-bruger derhjemme . John Madum 9788771704655 Books on Demand
Bogen om password: Irriterende - men helt nødvendige. En guide til den almindelige it-bruger derhjemme .

ISBN: 9788771704655 / Duński / Miękka / 86 str.

ISBN: 9788771704655/Duński/Miękka/86 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Madum
Password - Irriterende - men helt nodvendige Sa kom den - bogen om passwords til alle os it-brugere. Bogen anviser, hvordan vi kan gore vores brug af passwords lidt mere sikker. Forfatteren fortaeller, at vi ikke skal have samme password alle steder. Han anbefaler, at vi f.eks. opdeler i: Det kritiske password Det knap sa kritiske password Mine online ting Han fortaeller om menneskelig adfaerd, og hvordan hackeren gor brug af det, sa du kan undga at vaere forudsigelig. Han fortaeller, at du i hvert fald skal undga: at bruge netop 1 stort bogstav og saette det forst at bruge netop 1 tal og...
Password - Irriterende - men helt nodvendige Sa kom den - bogen om passwords til alle os it-brugere. Bogen anviser, hvordan vi kan gore vores brug af ...
cena: 66,52

 Hack Proof: Protecting your privacy and personal data in the Digital Economy Berry, John 9780996601207 Big Sky
Hack Proof: Protecting your privacy and personal data in the Digital Economy

ISBN: 9780996601207 / Angielski / Miękka / 270 str.

ISBN: 9780996601207/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Berry
Hack Proof - a guide to protecting your privacy and personal data in the digital economy. You are under surveillance and being tracked without your knowledge. Your personal data is being collected and traded without your permission. Increasing numbers of cyber criminals are out to steal from you. No one is going to protect you and unless you make changes, it is only going to get worse. Unlike many books that describe the problem, Hack Proof goes further with clear Action Steps and products and solution links to protect your data and privacy.
Hack Proof - a guide to protecting your privacy and personal data in the digital economy. You are under surveillance and being tracked without your kn...
cena: 58,84

 
TOR Bible

ISBN: 9781518864902 / Angielski / Miękka / 246 str.

ISBN: 9781518864902/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arlen Kraham
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. To...
cena: 157,44

 Engineering Secure Internet of Things Systems Benjamin Aziz Alvaro Arenas Bruno Crispo 9781785610530 Institution of Engineering & Technology
Engineering Secure Internet of Things Systems

ISBN: 9781785610530 / Angielski / Twarda / 280 str.

ISBN: 9781785610530/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Benjamin Aziz; Alvaro Arenas; Bruno Crispo
The Internet of Things (IoT) is the emerging global interconnection of billions of -smart- devices. It is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability. This important book examines these important security considerations for the IoT, covering topics including federated identity management in IoT systems; security policies and access control; formal models and foundations of the IoT;...
The Internet of Things (IoT) is the emerging global interconnection of billions of -smart- devices. It is collecting a growing amount of private and s...
cena: 594,35

 Is the OPM Data Breach the Tip of the Iceberg? Subcommittee on Oversight &. Subcommitte 9781530778034 Createspace Independent Publishing Platform
Is the OPM Data Breach the Tip of the Iceberg?

ISBN: 9781530778034 / Angielski / Miękka / 126 str.

ISBN: 9781530778034/Angielski/Miękka/126 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Subcommittee on Oversight &. Subcommittee
cena: 74,58

 scam.con Law, Tom 9780994315762 Longership Publishing Australia
scam.con

ISBN: 9780994315762 / Angielski / Miękka / 202 str.

ISBN: 9780994315762/Angielski/Miękka/202 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tom Law
The internet is awash with scammers and deceivers wanting you to dig deep and send them money for a reward... generally nothing Tom Law examines several ways of identifying scammers and their stock in trade often received as unwanted emails. Some are obvious to most but others almost seem genuine accompanied with fake documents etc. to draw you in. The internet brides look alluring and often pretty... but what you get is often not what you see A sometimes humorous exposure to the con artist with deadly intent, Tom Law provides sufficient warning to the cruel reality of the sophisticated...
The internet is awash with scammers and deceivers wanting you to dig deep and send them money for a reward... generally nothing Tom Law examines seve...
cena: 149,37

 Hacking: Hacking for Beginners and Basic Security: How to Hack Jacob Hatcher 9781329837294 Lulu.com
Hacking: Hacking for Beginners and Basic Security: How to Hack

ISBN: 9781329837294 / Angielski / Twarda / 172 str.

ISBN: 9781329837294/Angielski/Twarda/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jacob Hatcher
HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent. In HACKING: Ultimate Hacking for Beginners you will learn: The advantages and disadvantages of Bluetooth technology. The...
HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even ...
cena: 146,81

 Protecting Your Internet Identity: Are You Naked Online? Ted Claypoole Theresa Payton Chris Swecker 9781442265394 Rowman & Littlefield Publishers
Protecting Your Internet Identity: Are You Naked Online?

ISBN: 9781442265394 / Angielski / Miękka / 288 str.

ISBN: 9781442265394/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ted Claypoole; Theresa Payton; Chris Swecker
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The...
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the fi...
cena: 72,82

 Cyberthreats and the Decline of the Nation-State Susan W. Brenner 9781138204492 Routledge
Cyberthreats and the Decline of the Nation-State

ISBN: 9781138204492 / Angielski / Miękka / 178 str.

ISBN: 9781138204492/Angielski/Miękka/178 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Susan W. Brenner

This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the...

This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the...

cena: 237,98

 Cyber Dragon: Inside China's Information Warfare and Cyber Operations Dean Cheng 9781440835643 Praeger
Cyber Dragon: Inside China's Information Warfare and Cyber Operations

ISBN: 9781440835643 / Angielski / Twarda / 290 str.

ISBN: 9781440835643/Angielski/Twarda/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dean Cheng

China combines financial firepower currently the world's second largest economy with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare.

Written by an expert on Chinese military...

China combines financial firepower currently the world's second largest economy with a clear intent of fielding a modern military capable of compet...

cena: 255,68

 Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves Adam Levin Beau Friedlander 9781610397209 PublicAffairs
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves

ISBN: 9781610397209 / Angielski / Miękka / 288 str.

ISBN: 9781610397209/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adam Levin; Beau Friedlander
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job.

One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even...

Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam...
cena: 74,93

 Federal Cybersecurity Research and Development Strategic Plan: 2016 National Science and Technology Council 9781530340828 Createspace Independent Publishing Platform
Federal Cybersecurity Research and Development Strategic Plan: 2016

ISBN: 9781530340828 / Angielski / Miękka / 54 str.

ISBN: 9781530340828/Angielski/Miękka/54 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
National Science and Technology Council
cena: 58,84

 They Will Do Anything: Identity Theft and Internet Fraud MR Wayne L. Staley 9781523480548 Createspace Independent Publishing Platform
They Will Do Anything: Identity Theft and Internet Fraud

ISBN: 9781523480548 / Angielski / Miękka / 120 str.

ISBN: 9781523480548/Angielski/Miękka/120 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
MR Wayne L. Staley
cena: 39,32

 Social Media Investigation for Law Enforcement Joshua Brunty Katherine Helenek 9781138141902 Routledge
Social Media Investigation for Law Enforcement

ISBN: 9781138141902 / Angielski / Twarda / 112 str.

ISBN: 9781138141902/Angielski/Twarda/112 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joshua Brunty; Katherine Helenek

Social media is becoming an increasingly important--and controversial--investigative source for law enforcement. Social Media Investigation for Law Enforcement provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial areas. The authors also point to future trends.


Social media is becoming an increasingly important--and controversial--investigative source for law enforcement. Social Media Investigation for...

cena: 898,70

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia