3 Surefire Ways to Back Up Your WordPress Blog: Step-by-Step Ways to Protect Your Blog from Disappearing
ISBN: 9781456420222 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. So, you've got this really cool WordPress blog You're feeling like all is really great. Then, one morning, you find out that it's been hacked It's gone. What will YOU do? Well, if you've backed it up, then you'll just restore it. Problem solved Did you know, that it's not AUTOMATICALLY backed up? And that it's NOT easy to back it up? Didn't think so... This is where "3 Surefire Ways to Back Up Your WordPress Blog" comes in. Ron gives you three ways to back up your WordPress blog. The first one is for non-techies or those who don't want to learn how to do it and describes the important...
So, you've got this really cool WordPress blog You're feeling like all is really great. Then, one morning, you find out that it's been hacked It's g...
|
|
cena:
67,34 zł |
FIPS 140 Demystified: An Introductory Guide for Vendors
ISBN: 9781460990391 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Internet to make online purchases. Corporations store financial and medical information. This data must be protected and encryption (or cryptographic technologies) is the last line of defense against unauthorized access to this precious information. The Federal Information Processing Standard 140 (FIPS 140) is an internationally-recognized standard for assessing and validating that the cryptographic technologies used in our computer systems and...
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Intern...
|
|
cena:
89,92 zł |
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
ISBN: 9781613505076 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information...
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this incre...
|
|
cena:
1111,06 zł |
E-mail Forensics: Eliminating Spam, Scams and Phishing
ISBN: 9781908422002 / Angielski / Miękka / 349 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention. The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the... This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both inve... |
|
cena:
179,89 zł |
CRIME On eBay
ISBN: 9780984536108 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sent a payment and received nothing. Maybe you sent the auction item and the buyer reversed the payment. What do you do? Complaining on a message board may be a release emotionally but it does not recover your money or the item. It also does not protect you from other dishonest members. There are many books that cover the basics of buying and selling on eBay, but once you are on eBay, you need to know how to spot bad buyers or sellers before you...
If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sen...
|
|
cena:
55,48 zł |
The Hidden Corporation: A Data Management Security Novel
ISBN: 9781935504184 / Angielski / Miękka / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss. Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a... If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful ... |
|
cena:
81,19 zł |
Complete Guide to Internet Privacy, Anonymity & Security
ISBN: 9783950309300 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get downloads without censorship or restriction, prevent identity theft and keep cyber-criminals from hacking into a computer, and stop search engines, social networking sites, and powerful Internet players from tracking and profiling users.
Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get...
|
|
cena:
85,64 zł |
IT Security Governance Innovations: Theory and Research
ISBN: 9781466620834 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best...
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a techni...
|
|
cena:
1111,06 zł |
What's My Password?
ISBN: 9781482629712 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of your overall password storage system and discontinue using sticky notes and endless scraps of paper to keep track of passwords. Use "What's My Password?" to help you protect your passwords and login information.
More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of...
|
|
cena:
49,26 zł |
The Benefits and Security Risks of Web-Based Applications for Business: Trend Report
ISBN: 9780124170018 / Angielski / Miękka / 24 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the... This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the ... |
|
cena:
155,94 zł |
Internet and the Law: Technology, Society, and Compromises
ISBN: 9781610693493 / Angielski / Twarda / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about... "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of compl... |
|
cena:
572,99 zł |
Untangling the Web: The Nsa's Guide to Gathering Information on Google
ISBN: 9780984284498 / Angielski / Miękka / 652 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet. From the basic to the advanced, this 650-page book offers a fascinating look at tricks the "real spies" use to uncover hidden (and not-so-hidden) information online. Chapters include: Google hacks Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet... |
|
cena:
171,32 zł |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327404 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
|
cena:
115,15 zł |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327411 / Angielski / Twarda / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
|
cena:
167,94 zł |
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
ISBN: 9781475232707 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
|
|
cena:
89,92 zł |
Cloud Security and Control
ISBN: 9781469992549 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
|
|
cena:
89,92 zł |
Hacking Exposed Web Applications, Third Edition
ISBN: 9780071740647 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development... The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering ... |
|
cena:
278,46 zł |
Web Application Security
ISBN: 9780071776165 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious... Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess... |
|
cena:
222,77 zł |
Digital Watermarking and Steganography
ISBN: 9780123725851 / Angielski / Twarda / 593 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second...
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may ch...
|
|
cena:
401,85 zł |
Federated Identity Primer
ISBN: 9780124071896 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree.
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and con... |
|
cena:
101,69 zł |