![]() |
Optimizing Information Security and Advancing Privacy Assurance: New Technologies
ISBN: 9781466600263 / Angielski / Twarda / 340 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary...
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amoun...
|
cena:
985,79 |
![]() |
The Death of the Internet
ISBN: 9781118062418 / Angielski / Miękka / 386 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue,...
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or ...
|
cena:
378,67 |
![]() |
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions
ISBN: 9781466601970 / Angielski / Twarda / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering co...
|
cena:
985,79 |
![]() |
Internet and Wireless Security
ISBN: 9780852961971 / Angielski / Twarda / 302 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses.
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-co...
|
cena:
530,83 |
![]() |
Managerial Guide for Handling Cyber-Terrorism and Information Warfare
ISBN: 9781591405832 / Angielski / Twarda / 250 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling...
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and ho...
|
cena:
429,45 |
![]() |
Privacy Solutions and Security Frameworks in Information Protection
ISBN: 9781466620506 / Angielski / Twarda / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional...
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of t...
|
cena:
985,79 |
![]() |
Penetration Testing: Protecting Networks and Systems
ISBN: 9781849283717 / Angielski / Miękka / 211 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
|
cena:
159,60 |
![]() |
Implementación de Calidad de Servicio basado en ISO/IEC 20000 - Guía de Gestión
ISBN: 9781849283533 / Hiszpański / Miękka / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ISO/IEC 20000 es un estandar internacional importante para los proveedores de servicios de TI. La implementacion y certificacion segun esta norma mejorara sus procesos y practicas de negocio, y dara a sus clientes la confianza de que su empresa sea eficiente y fiable. Los clientes volveran porque saben por experiencia que su servicio es insuperable. Los clientes potenciales buscaran a los proveedores con la norma ISO/IEC 20000 por la tranquilidad que proporciona. Este libro le guiara a traves de la implementacion y certificacion, lo que le permitira agilizar sus procesos de gestion y ofrecer...
ISO/IEC 20000 es un estandar internacional importante para los proveedores de servicios de TI. La implementacion y certificacion segun esta norma mejo...
|
cena:
127,67 |
![]() |
Hackers and Hacking: A Reference Handbook
ISBN: 9781610692762 / Angielski / Twarda / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work... What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? ... |
cena:
229,16 |
![]() |
The Legal Challenges of Global Cyberspace: Why National Regulations Fail to Protect Digital Assets on Cyberspace
ISBN: 9781478393412 / Angielski / Miękka / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book examines legal and cybersecurity challenges resulting from malicious activities on global cyberspace and proposes feasible regulatory, and policy based solutions to address these challenges. Global cyberspace has become an enormous challenge from the security perspective partly due to complications in enforcing security and regulatory efforts of national jurisdictions. This book presents more practical solutions to counteract these and other security threats posed by private and state-sponsored actors. Illicit events on cyberspace become increasingly complex as cyber technology...
This book examines legal and cybersecurity challenges resulting from malicious activities on global cyberspace and proposes feasible regulatory, and p...
|
cena:
59,66 |
![]() |
Ceh Certified Ethical Hacker All-In-One Exam Guide, Third Edition [With Access Code]
ISBN: 9781259836558 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations. An integrated study system based on... Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objec... |
cena:
173,15 |
![]() |
The Pretext Playbook: Instruction Manual for Intentional Misleading Fabrication
ISBN: 9781482392272 / Angielski / Miękka / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What exactly is pretexting anyway? A pretext is a carefully manipulated act to gain factual evidence that you would not otherwise be able to naturally discover. Some investigators call it a gag or a scam. The purpose of this book is to bring a wide variety of pretext ideas that work in today's working class age of internet connectivity with overall scam awareness in the general public. Used by law enforcement, investigators and other professions that need to find out things about people. "A major part of skip tracing includes some type of pretext styled to fit the target's circumstances. We...
What exactly is pretexting anyway? A pretext is a carefully manipulated act to gain factual evidence that you would not otherwise be able to naturally...
|
cena:
63,82 |
![]() |
Anonymizing Health Data: Case Studies and Methods to Get You Started
ISBN: 9781449363079 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to de-identify hundreds of datasets. Clinical data is valuable for research and other types of analytics, but making it anonymous without compromising data quality is tricky. This book demonstrates techniques for handling different data types, based on the authors'... Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningf... |
cena:
142,54 |
![]() |
Defending an Open, Global, Secure, and Resilient Internet
ISBN: 9780876095591 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks. To support security, innovation, growth, and the free flow of information, the Task Force recommends that the United States and its partners work to build a cyber alliance, make the free flow of information a part of all future trade agreements, and articulate an inclusive and robust vision of Internet governance. The Task Force is...
The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services bec...
|
cena:
86,12 |
![]() |
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data
ISBN: 9780071713405 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts... Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats... |
cena:
247,07 |
![]() |
Computer Forensics InfoSec Pro Guide
ISBN: 9780071742450 / Angielski / Miękka / 344 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from... Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to... |
cena:
167,24 |
![]() |
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet
ISBN: 9780123742681 / Angielski / Twarda / 807 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks. This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital... Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any... |
cena:
266,04 |
![]() |
The Basics of Web Hacking: Tools and Techniques to Attack the Web
ISBN: 9780124166004 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these... The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No pr... |
cena:
116,06 |
![]() |
Gfi Network Security and PCI Compliance Power Tools
ISBN: 9781597492850 / Angielski / Miękka / 488 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard...
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the chal...
|
cena:
224,96 |
![]() |
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
ISBN: 9781849517744 / Angielski / Miękka / 414 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration...
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and ...
|
cena:
280,93 |