ilość książek w kategorii: 213
Hearing on the Report of the President's Review Group on Intelligence and Communications Technologies
ISBN: 9781514388365 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On August 27, 2013, the President announced the creation of the Review Group on Intelligence and Communications Technologies. The immediate backdrop for the Review Group's work was a series of disclosures of classified information involving foreign intelligence collection by the National Security Agency. The disclosures revealed intercepted collections that occurred inside and outside of the United States and that included the communications of United States persons and legal permanent residents, as well as non-United States persons located outside the United States. A robust foreign...
On August 27, 2013, the President announced the creation of the Review Group on Intelligence and Communications Technologies. The immediate backdrop f...
|
|
cena:
77,18 zł |
Betrayed: Stephen Harper's war on principled conservatism
ISBN: 9781515399407 / Angielski / Miękka / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Longtime Canadian conservative activist Connie Fournier makes the case that the Conservative government in Canada has lost its way and that party members have a responsibility to hold their leadership accountable in the 2015 federal election by voting against Stephen Harper.
Longtime Canadian conservative activist Connie Fournier makes the case that the Conservative government in Canada has lost its way and that party memb...
|
|
cena:
45,49 zł |
The Fourth Amendment in Flux: The Roberts Court, Crime Control, and Digital Privacy
ISBN: 9780700622566 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When the Founders penned the Fourth Amendment to the Constitution, it was not difficult to identify the "persons, houses, papers, and effects" they meant to protect; nor was it hard to understand what "unreasonable searches and seizures" were. The Fourth Amendment was intended to stop the use of general warrants and writs of assistance and applied primarily to protect the home. Flash forward to a time of digital devices, automobiles, the war on drugs, and a Supreme Court dominated by several decades of the jurisprudence of crime control, and the legal meaning of everything from "effects" to...
When the Founders penned the Fourth Amendment to the Constitution, it was not difficult to identify the "persons, houses, papers, and effects" they me...
|
|
cena:
431,21 zł |
The Fourth Amendment in Flux: The Roberts Court, Crime Control, and Digital Privacy
ISBN: 9780700622573 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When the Founders penned the Fourth Amendment to the Constitution, it was not difficult to identify the "persons, houses, papers, and effects" they meant to protect; nor was it hard to understand what "unreasonable searches and seizures" were. The Fourth Amendment was intended to stop the use of general warrants and writs of assistance and applied primarily to protect the home. Flash forward to a time of digital devices, automobiles, the war on drugs, and a Supreme Court dominated by several decades of the jurisprudence of crime control, and the legal meaning of everything from "effects" to...
When the Founders penned the Fourth Amendment to the Constitution, it was not difficult to identify the "persons, houses, papers, and effects" they me...
|
|
cena:
158,01 zł |
Hacking the Human
ISBN: 9781910223741 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human... Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is cruci... |
|
cena:
128,71 zł |
The Administration's Use of Fisa Authorities
ISBN: 9781499507683 / Angielski / Miękka / 154 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today's hearing will examine the statutory authorities that govern certain programs operated under the Foreign Intelligence Surveillance Act, or FISA. Since Edward Snowden, an unknown former NSA contractor and CIA employee, released classified material on top secret NSA data collection programs, many Members of Congress and their constituents have expressed concern about how these programs are operated and whether they pose a threat to Americans' civil liberties and privacy. When FISA was originally enacted in 1978, America was largely concerned with collecting intelligence from foreign...
Today's hearing will examine the statutory authorities that govern certain programs operated under the Foreign Intelligence Surveillance Act, or FISA....
|
|
cena:
86,29 zł |
Safeguarding Our Nation's Secrets: Examining the National Security Workforce
ISBN: 9781540806031 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are nearly five million individuals with a U.S. national security clearance. It only takes one individual to slip through the cracks, one individual who could do untold damage to our national security by exposing sensitive information about government actions and programs. From the significant disclosures of classified information to the tragedy at the Washington Naval Yard, it should be clear to the American people that the Federal Government is failing to properly vet the individuals who are granted access to our Nation's most sensitive information and secure facilities. The system...
There are nearly five million individuals with a U.S. national security clearance. It only takes one individual to slip through the cracks, one indivi...
|
|
cena:
113,61 zł |
Strengthening Privacy Rights and National Security: Oversight of FISA Surveillance Programs
ISBN: 9781541183322 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the years since September 11th, Congress has repeatedly expanded the scope of Foreign Intelligence Surveillance Act (FISA) and has given the Government sweeping new powers to collect information on law-abiding Americans. Americans have learned that one of these authorities-Section 215 of the USA PATRIOT Act-has for years been secretly interpreted to authorize the collection of Americans' phone records on an unprecedented scale. Information has also been leaked about Section 702 of FISA, which authorizes the National Security Agency (NSA) to collect the communications of foreigners...
In the years since September 11th, Congress has repeatedly expanded the scope of Foreign Intelligence Surveillance Act (FISA) and has given the Govern...
|
|
cena:
104,50 zł |
Surveillance Valley
ISBN: 9781610398022 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
173,46 zł |
The Politics of Data Transfer: Transatlantic Conflict and Cooperation Over Data Privacy
ISBN: 9781138696280 / Angielski / Twarda / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Transatlantic conflicts over data have been studied from several perspectives. The EU-U.S. debate that led to the Safe Harbor Arrangement has typically been seen as an instance of a regulatory conflict or competition between two powers with different approaches to data protection or privacy. The Passenger Name Record (PNR) dispute and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair, on the other hand, have mostly been understood as cases of struggle between counterterrorism and civil liberties; according to a prevailing view, they are examples of 'hegemonic'... Transatlantic conflicts over data have been studied from several perspectives. The EU-U.S. debate that led to the Safe Harbor Arrangement has typic... |
|
cena:
704,29 zł |
Surveillance Zone: The Hidden World of Corporate Surveillance Detection & Covert Special Operations
ISBN: 9781546730248 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
63,70 zł |
Geolocation Technology and Privacy
ISBN: 9781547044801 / Angielski / Miękka / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
81,73 zł |
Who Are You?: Strengthening Personal Identity Management in Australia
ISBN: 9780648050902 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's technological age, how can you trust that people are who they say they are? Identity crime is now the most common crime in Australia and costs the community over $2.2 billion per year. Many western governments are currently grappling with this complex issue in an attempt to protect their communities from identity crime. A better approach to managing identity is essential if we are to stop these crimes and their increasing costs to Australia as a whole. 'Who are You? - Strengthening Personal Identity Management in Australia' addresses the controversial topic of managing personal...
In today's technological age, how can you trust that people are who they say they are? Identity crime is now the most common crime in Australia and co...
|
|
cena:
76,95 zł |
Section 702 of the Foreign Intelligence Surveillance ACT
ISBN: 9781548261573 / Angielski / Miękka / 104 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
81,73 zł |
The Counterrevolution: How Our Government Went to War Against Its Own Citizens
ISBN: 9781541697287 / Angielski / Twarda / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A distinguished political theorist sounds the alarm about the counterinsurgency strategies used to govern Americans
A distinguished political theorist sounds the alarm about the counterinsurgency strategies used to govern Americans
|
|
cena:
200,57 zł |
Negotiating Workplace Relationships
ISBN: 9781516522729 / Angielski / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Teaches students how to navigate the ethically challenging and professionally risky situations they are likely to encounter in their working lives. Grounded in both classic and contemporary studies, this narrative-based text introduces a theoretical framework and pragmatic communication strategies for mitigating personal risk and optimizing relational and organisational outcomes.
Teaches students how to navigate the ethically challenging and professionally risky situations they are likely to encounter in their working lives. Gr...
|
|
cena:
513,02 zł |
Examining Government Surveillance Programs and the Conflict of Individual Privacy with National Security Interests. Comparative Study between Great Br
ISBN: 9781979270359 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
45,49 zł |
SAS Remote Area Surveillance: Tactics, Techniques, and Prodedures
ISBN: 9781983404702 / Angielski / Miękka / 78 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
59,15 zł |
SAS Anti-Surveillance and Counter-Surveillance Techniques
ISBN: 9781983409059 / Angielski / Miękka / 26 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
31,83 zł |
Hacking the Human: Social Engineering Techniques and Security Countermeasures
ISBN: 9780815389385 / Angielski / Twarda / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
704,29 zł |