![]() |
@War: The Rise of the Military-Internet Complex
ISBN: 9780544570283 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Chilling . . . Extraordinary and urgent." -- Washington Post
"Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors." -- Los Angeles Times "Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure." -- Christian Science Monitor The wars of the future are already being fought today. The United States military currently views cyberspace as the "fifth... "Chilling . . . Extraordinary and urgent." -- Washington Post
"Scary but well documented . . . A deep dive into the world of cyb... |
cena:
72,38 |
![]() |
The Savvy Cyber Kids at Home: The Family Gets a Computer
ISBN: 9780982796825 / Angielski / Twarda / 48 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Keeping pre-teens and teenagers safe on the internet starts before our children know what a keyboard is. Like most important life lessons, teaching online safety begins in early childhood. The Savvy Cyber Kids are just the right playmates for pre-school children and Emma and Tony speak their language. In The Savvy Cyber Kids at Home: The Family Gets A Computer, children learn to protect their personal information, like their name and physical location through their secret Savvy Cyber Kid identity. Through traditional early childhood teaching tools, this colorful book reinforces the message of...
Keeping pre-teens and teenagers safe on the internet starts before our children know what a keyboard is. Like most important life lessons, teaching on...
|
cena:
114,30 |
![]() |
Cyber Threat: The Rise of Information Geopolitics in U.S. National Security
ISBN: 9781440834981 / Angielski / Twarda / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in... How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? Wha... |
cena:
336,80 |
![]() |
Don't Fall Victim to Identity Theft: How to Protect Your Name from Being Used Without Your Consent
ISBN: 9781635014310 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reading a book about identity theft and how to protect yourself could help you be able to keep your identity private and yours. The book can help by explaining exactly what identity theft is, how it occurs, what information the thieves would be after, how to protect your private information from anyone looking for it, and even how to help you if you are already a victim of identity theft.
Reading a book about identity theft and how to protect yourself could help you be able to keep your identity private and yours. The book can help by e...
|
cena:
49,51 |
![]() |
Assessing Information Security: Strategies, Tactics, Logic and Framework
ISBN: 9781849285995 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cyber security that goes beyond technology - all staff in the organisation have a role to play and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that explain what to do when under attack....
The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business underst...
|
cena:
256,10 |
![]() |
Darknet: A Beginner's Guide to Staying Anonymous Online
ISBN: 9781481931380 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Want to surf the web anonymously? This book is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else. This book covers every facet of encrypting your private data, securing your pc, masking your online footsteps, and gives you peace of mind with TOTAL 100% ANONYMITY on the internet. - Learn how to mask your online identity with *every* site or...
Want to surf the web anonymously? This book is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Face...
|
cena:
43,98 |
![]() |
Deep Witchcraft In The 419 Fraud: The Mystery Behind
ISBN: 9781497499225 / Angielski / Miękka / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It will be a delirium, not to acknowledge the fact that, 419 frauds, has not been, of an ultimate cash flow, into the lives of 419ers, for the last twenty-five years. It, proving through confidence trick, and sophisticated business frauds, that unethical accumulation of considerable fortunes, can be done in a very short space. Particularly, when converting dollars to currencies less strong, sees money display on golden tray. As many has witness an unbelievable flow, of wealth into their lives, that they were never programmed for. In a bit to maintain this status quo, as faced with this...
It will be a delirium, not to acknowledge the fact that, 419 frauds, has not been, of an ultimate cash flow, into the lives of 419ers, for the last tw...
|
cena:
60,03 |
![]() |
Handbook of Research on Emerging Developments in Data Privacy
ISBN: 9781466673816 / Angielski / Twarda / 534 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity protection, trust and security, and detection techniques"--
"This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity ...
|
cena:
1647,52 |
![]() |
Dad's & Mom's Internet Safety Do's & Don'ts: Second Edition
ISBN: 9780985226565 / Angielski / Miękka / 206 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
35,98 |
![]() |
Mastering the Nmap Scripting Engine
ISBN: 9781782168317 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
209,13 |
![]() |
Complete Guide to Internet Privacy, Anonymity & Security
ISBN: 9783950309348 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fully updated and revised, this leading guide on Internet privacy, anonymity and security contains all the practical information you need to inform and protect yourself. In this comprehensive yet easy-to-read guide for Windows users, you will quickly learn how to:
Fully updated and revised, this leading guide on Internet privacy, anonymity and security contains all the practical information you need to inf... |
cena:
39,74 |
![]() |
Cybersecurity in Our Digital Lives
ISBN: 9780989845144 / Angielski / Miękka / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of how and why they happen, or if they have been professionally or personally compromised. In Cybersecurity in Our Digital Lives, twelve experts provide much-needed clarification on the technology behind our daily digital interactions. They explain such things as supply chain, Internet of Things,... Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have... |
cena:
114,35 |
![]() |
The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and Our Democratic Process
ISBN: 9781497696976 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation's corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the American people. This book was written in 1983 as a warning. Today it is a history. Most of its grim scenarios are now part of everyday life. The remedy proposed here, greater public oversight of industry and government, has not occurred, but a better one has not yet been found. While many individuals have willingly surrendered much of their privacy...
The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation's corpor...
|
cena:
53,32 |
![]() |
Online Advertising and Hidden Hazards to Consumer Security and Data Privacy
ISBN: 9781508609230 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the emergence of the Internet and e-commerce, more and more commonplace activities are taking place on the Internet, which has led to major advances in convenience, consumer choice, and economic growth. These advances have also presented novel questions concerning whether consumer security and privacy can be maintained in the new technology-based world. We will examine these issues today specifically in the context of online advertising, where vast data is collected and cyber criminals exploit vulnerabilities in the system and use malware to harm consumers. Consumers who venture into the...
With the emergence of the Internet and e-commerce, more and more commonplace activities are taking place on the Internet, which has led to major advan...
|
cena:
87,84 |
![]() |
Essential Cybersecurity Science
ISBN: 9781491920947 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics,... If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to... |
cena:
204,07 |
![]() |
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
ISBN: 9781491902332 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation. A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected... This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people tryin... |
cena:
226,74 |
![]() |
What Happens on Campus Stays on YouTube: The NEW rules for your reputation on campus, online, and beyond.
ISBN: 9780991183524 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the student version of Qualman's book What Happens in Vegas Stays on YouTube. Learn the new rules for your reputation on campus, online and beyond. Today, your digital reputation is determining your next internship or job offer, your role in student organizations and leadership positions, even athletic scholarships and much more This book will help you not only protect your reputation, but it will teach you how to leverage digital tools to produce a strong digital presence. The book includes several student case studies, tips, resources and more. You can read it in a day and...
This is the student version of Qualman's book What Happens in Vegas Stays on YouTube. Learn the new rules for your reputation on campus, online and be...
|
cena:
64,00 |
![]() |
Secret Password Journal
ISBN: 9781681456287 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
60,94 |
![]() |
My Password Journal
ISBN: 9781681452548 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
60,94 |
![]() |
Password Journal
ISBN: 9781681452968 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
60,94 |