E-mail Forensics: Eliminating Spam, Scams and Phishing
ISBN: 9781908422002 / Angielski / Miękka / 349 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention. The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the... This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both inve... |
|
cena:
182,97 zł |
CRIME On eBay
ISBN: 9780984536108 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sent a payment and received nothing. Maybe you sent the auction item and the buyer reversed the payment. What do you do? Complaining on a message board may be a release emotionally but it does not recover your money or the item. It also does not protect you from other dishonest members. There are many books that cover the basics of buying and selling on eBay, but once you are on eBay, you need to know how to spot bad buyers or sellers before you...
If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sen...
|
|
cena:
56,43 zł |
The Hidden Corporation: A Data Management Security Novel
ISBN: 9781935504184 / Angielski / Miękka / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss. Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a... If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful ... |
|
cena:
82,57 zł |
Complete Guide to Internet Privacy, Anonymity & Security
ISBN: 9783950309300 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get downloads without censorship or restriction, prevent identity theft and keep cyber-criminals from hacking into a computer, and stop search engines, social networking sites, and powerful Internet players from tracking and profiling users.
Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get...
|
|
cena:
87,11 zł |
IT Security Governance Innovations: Theory and Research
ISBN: 9781466620834 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best...
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a techni...
|
|
cena:
1130,12 zł |
What's My Password?
ISBN: 9781482629712 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of your overall password storage system and discontinue using sticky notes and endless scraps of paper to keep track of passwords. Use "What's My Password?" to help you protect your passwords and login information.
More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of...
|
|
cena:
50,10 zł |
The Benefits and Security Risks of Web-Based Applications for Business: Trend Report
ISBN: 9780124170018 / Angielski / Miękka / 24 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the... This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the ... |
|
cena:
158,51 zł |
Internet and the Law: Technology, Society, and Compromises
ISBN: 9781610693493 / Angielski / Twarda / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about... "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of compl... |
|
cena:
585,34 zł |
Untangling the Web: The Nsa's Guide to Gathering Information on Google
ISBN: 9780984284498 / Angielski / Miękka / 652 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet. From the basic to the advanced, this 650-page book offers a fascinating look at tricks the "real spies" use to uncover hidden (and not-so-hidden) information online. Chapters include: Google hacks Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet... |
|
cena:
195,16 zł |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327404 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
|
cena:
117,13 zł |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327411 / Angielski / Twarda / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
|
cena:
170,81 zł |
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
ISBN: 9781475232707 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
|
|
cena:
91,47 zł |
Cloud Security and Control
ISBN: 9781469992549 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
|
|
cena:
91,47 zł |
This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
ISBN: 9780142180495 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Who Are The Cypherpunks?
This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, andWe Steal Secrets: The Story of Wikileaks, a documentary out now. WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern... Who Are The Cypherpunks?
This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate... |
|
cena:
104,58 zł |
Hacking Exposed Web Applications, Third Edition
ISBN: 9780071740647 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development... The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering ... |
|
cena:
283,24 zł |
Web Application Security
ISBN: 9780071776165 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious... Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess... |
|
cena:
226,59 zł |
Digital Watermarking and Steganography
ISBN: 9780123725851 / Angielski / Twarda / 593 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second...
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may ch...
|
|
cena:
410,51 zł |
Federated Identity Primer
ISBN: 9780124071896 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree.
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and con... |
|
cena:
103,89 zł |
The Internet Police : How Crime Went Online, and the Cops Followed
ISBN: 9780393062984 / Angielski / Twarda / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too.
In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected... Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just compu...
|
|
cena:
114,83 zł |
Firefox for Dummies
ISBN: 9780471748991 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
|
|
cena:
114,83 zł |