Add Wish List Add to Cart The item has been added Cyber Security Threats and Challenges Facing Human Life Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Senior Cyber As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate number of seniors being coerced, targeted, and robbed through the same internet we all share.From the basics of the... RRP: $46.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Protecting Your Business From Insider Threats In Seven Effective Steps Protecting Your Business From Insider Threats In Seven Effective Steps is one of the first books that addresses the human element of security.Protecting Your Business From Insider Threats In Seven Effective Steps helps the reader to really understand... RRP: $39.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Artificial Intelligence, Ethics and the Future of Warfare This volume examines how the adoption of AI technologies is likely to impact strategic and operational planning, and the possible future tactical scenarios for conventional, unconventional, cyber, space and nuclear force structures. RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Global Digital Data Governance This book provides a nuanced exploration of digital data governance, highlighting the importance of cooperation across sectors to adapt to an evolving technological landscape. This will interest students and scholars of Development Studies, Political... RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Discourse in the United States This book examines the role of cyber-doom rhetoric in the U.S. cybersecurity debate.For more than two decades, fear of "cyber-doom" scenarios-i.e. cyberattacks against critical infrastructure resulting in catastrophic physical, social, and economic... RRP: $111.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Next Floor This is a story about how 185 residents of a newly commissioned, multi-story Village Apartments in a suburb of Canberra, Australia, constrain both villains and the Covid-19 pandemic from destroying their retirement.The Security Response Committee (SRC)... RRP: $34.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Exploring the Dynamics of Online Messaging "Exploring the Dynamics of Online Messaging" delves into the heart of our interconnected world, unraveling the multifaceted layers of digital communication. From tracing the evolution and growth of online messaging to exploring its profound significance... RRP: $21.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Zen oder die Kunst, seine Privatsphäre zu schützen Privatsphäre? Was ist das? Wozu brauch ich das? Und was bringt mir das überhaupt? Kann ich nicht viel einfacher ohne Privatsphäre leben? In Zeiten in denen wir hin- und hergerissen sind zwischen unserem öffentlichen Leben auf (un)sozialen Medien, der... RRP: $48.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Exposed Mind the gap...between the actual level of cybersecurity and the amount required to protect you.Ever wondered what exactly is going so badly wrong in society that the fastest booming industry in the world is cybercrime?Psychology meets technology as this... RRP: $19.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Distributed Denial of Service (DDoS) Attacks The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving... RRP: $128.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Internet-Sicher Heit Jedes Unternehmen verfügt über sensible Informationen, die es schützen muss. Wenn jemand seine Systeme oder Netzwerke gehackt und versucht, illegal an diese Informationen zu gelangen, könnte er viele Informationen verlieren. Sie sollten dieses Buch... RRP: $36.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Cyber Security Handbook In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber... RRP: $117.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added My Password Journal Never lose your password again by keeping them handy and ready for easy retrieval in this chic password journal. Sure, having one password for all your online accounts makes your life a lot easier but that would also make you very prone to security risks... RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added WhatsApp Evolution and Digital Responsibility "WhatsApp Evolution and Digital Responsibility" is a comprehensive exploration of the transformative journey undertaken by communication platforms, with a focus on the paradigm-shifting evolution of WhatsApp. This illuminating book navigates... RRP: $24.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Operation Espionage Insider threat is a real issue, pain point, and can be a challenge in any organization of any size or industry. Having experienced personnel, the right tools, and the right processes can certainly assist your organization in moving in a positive... RRP: $43.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Rise of the Computer State The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation’s corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the... RRP: $23.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Loss Prevention Bei der Durchführung eines Data Loss Prevention Vorhabens sehen sich viele Unternehmen mit zahlreichen Herausforderungen konfrontiert. Anfangs werden die Hürden eines solchen Projekts oft unterschätzt, da die Komplexität von DLP nicht auf den ersten... RRP: $104.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Safe Computing is Like Safe Sex I'll bet you think your computer is safe from viruses and hackers. But is it really? Isn't it reasonable to expect your computer to be secure straight out-of-the-box? What does it mean to secure a system anyway? Huge security breaches have been all over... RRP: $29.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cissp The book includes additional information on difficult topics as the beginners should have a proper foundation. Cissp is a challenging topic, and therefore, the foundation topics must be well-understood; hence the reader can learn the rest of the domains... RRP: $26.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cunningly Smart Phones RRP: $40.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Strategic and Practical Approaches for Information Security Governance Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day Protecting My Business From Cyber Attacks In Only 10 Minutes A Day is a must book for every organisation that interacts online.If you wear a seat belt when you drive a car or lock your house from intruders, the message is clear, you want to ensure your... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity in the COVID-19 Pandemic This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel,... RRP: $54.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in IoT This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such... RRP: $113.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Online Social Networks Security This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs. RRP: $54.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added An Interdisciplinary Approach to Modern Network Security An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. RRP: $111.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Internet of Medical Things Internet of Things (IoT) has become a valuable tool for connection and information exchange between devices. This book provides a brief introduction to this new field, focuses on wearable medical devices, and covers the basic concepts by providing the... RRP: $128.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Password Journal You have numerous accounts online and possibly numerous passwords to remember too! That can be very confusing unless you have the sharpest memory. Free yourself from the hassle of remembering and resetting your password every time you forget by keeping... RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Safety The Importance of Safety in Everyday LifeSafety is an essential aspect of our daily lives, often overlooked until an unfortunate incident occurs. In this subchapter, we will delve into the significance of safety in our everyday routines and highlight the... RRP: $44.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Life and Challenges of IT Professionals "Life and Challenges of IT Professionals" provides an insightful journey into the dynamic realm of Information Technology, unraveling the intricacies of the profession and the individuals who drive its evolution. We embark on a comprehensive exploration... RRP: $24.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mobile Security RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Assessing Information Security The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they... RRP: $117.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added 21st Century Chinese Cyberwarfare Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure... RRP: $149.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Elementary... the Art and Science of Finding Information What you don’t know can hurt you. What you do know can make you successful.The Information Age has given us a soup of useful and not-so-usable facts and fiction. This is your guide to gaining information superiority in the new era. RRP: $66.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Internet Security Dictionary The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English. The dictionary covers five... RRP: $107.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Okta Administration Up and Running - Second Edition Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey FeaturesDiscover how to use Okta for complete identity and... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Art of Social Engineering Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added TLS Cryptography In-Depth A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hidden Traps of the Internet Building an online platform is an overwhelming and daunting task, with many pitfalls and horror stories surrounding the internet. It's not surprising that many writers shy away from online activities, putting that online presence into the do-it-later... RRP: $36.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyberpocalypse Pay up or shut down. You choose. Cybercrime is on the rise and hackers have moved on from targeting individuals to targeting corporations both large and small. In recent memory, many high-profile companies have been the victim of some form of... RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Situational Awareness in Computer Network Defense Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mommy! There's a Monster in our Computer The book that every parent should read to their child before they go on the Internet. The odds are very good that your child will not be negatively impacted by the Internet. But if they are, it can be devastating. Cyber Bullying KILLS kids. (This is... RRP: $38.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Securing IoT and Big Data This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific... RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Datenschutz in der EU. Der Weg von der Datenschutzrichtlinie zur Datenschutzgrundverordnung und Auswirkungen auf die Personalberatungsbranche Bachelorarbeit aus dem Jahr 2019 im Fachbereich Jura - Datenschutz, Note: 2,3, Hochschule München, Sprache: Deutsch, Abstract: Welche Schwierigkeiten in Bezug auf die Verarbeitung personenbezogener Daten hatte die Personalberatungsbranche zu Zeiten der... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in the Digital World “Love the fact that it jumped in with 10 top tips for security, a great opening to the book… Excellent section on phishing emails/vishing/smishing, with great practical examples …”Christopher Wright, Wright-CandA Consulting... RRP: $39.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Learning zANTI2 for Android Pentesting RRP: $61.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Kali Linux Intrusion and Exploitation Cookbook Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsKey Features:Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsImprove your testing... RRP: $103.00 Add to Cart The item has been added