Privacy and data protection Books

Sidebar Sidebar Sidebar
  • Cyber Security Threats and Challenges Facing Human Life Cyber Security Threats and Challenges Facing Human Life
    Add to Cart The item has been added

    Cyber Security Threats and Challenges Facing Human Life

    Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The...
    $270.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Senior Cyber

    As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate number of seniors being coerced, targeted, and robbed through the same internet we all share.From the basics of the...
    $46.00

    Add to Cart The item has been added
  • Global Digital Data Governance Global Digital Data Governance
    Add to Cart The item has been added

    Global Digital Data Governance

    This book provides a nuanced exploration of digital data governance, highlighting the importance of cooperation across sectors to adapt to an evolving technological landscape. This will interest students and scholars of Development Studies, Political...
    $373.00

    Add to Cart The item has been added
  • Cybersecurity Discourse in the United States Cybersecurity Discourse in the United States
    Add to Cart The item has been added

    Cybersecurity Discourse in the United States

    This book examines the role of cyber-doom rhetoric in the U.S. cybersecurity debate.For more than two decades, fear of "cyber-doom" scenarios-i.e. cyberattacks against critical infrastructure resulting in catastrophic physical, social, and economic...
    $111.00

    Add to Cart The item has been added
  • The Next Floor The Next Floor
    Add to Cart The item has been added

    The Next Floor

    This is a story about how 185 residents of a newly commissioned, multi-story Village Apartments in a suburb of Canberra, Australia, constrain both villains and the Covid-19 pandemic from destroying their retirement.The Security Response Committee (SRC)...
    $34.00

    Add to Cart The item has been added
  • Exploring the Dynamics of Online Messaging Exploring the Dynamics of Online Messaging
    Add to Cart The item has been added

    Exploring the Dynamics of Online Messaging

    "Exploring the Dynamics of Online Messaging" delves into the heart of our interconnected world, unraveling the multifaceted layers of digital communication. From tracing the evolution and growth of online messaging to exploring its profound significance...
    $21.00

    Add to Cart The item has been added
  • Zen oder die Kunst, seine Privatsphäre zu schützen Zen oder die Kunst, seine Privatsphäre zu schützen
    Add to Cart The item has been added

    Zen oder die Kunst, seine Privatsphäre zu schützen

    Privatsphäre? Was ist das? Wozu brauch ich das? Und was bringt mir das überhaupt? Kann ich nicht viel einfacher ohne Privatsphäre leben? In Zeiten in denen wir hin- und hergerissen sind zwischen unserem öffentlichen Leben auf (un)sozialen Medien, der...
    $48.00

    Add to Cart The item has been added
  • Cybersecurity Exposed Cybersecurity Exposed
    Add to Cart The item has been added

    Cybersecurity Exposed

    Mind the gap...between the actual level of cybersecurity and the amount required to protect you.Ever wondered what exactly is going so badly wrong in society that the fastest booming industry in the world is cybercrime?Psychology meets technology as this...
    $19.00

    Add to Cart The item has been added
  • Distributed Denial of Service (DDoS) Attacks Distributed Denial of Service (DDoS) Attacks
    Add to Cart The item has been added

    Distributed Denial of Service (DDoS) Attacks

    The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving...
    $128.00

    Add to Cart The item has been added
  • Internet-Sicher Heit Internet-Sicher Heit
    Add to Cart The item has been added

    Internet-Sicher Heit

    Jedes Unternehmen verfügt über sensible Informationen, die es schützen muss. Wenn jemand seine Systeme oder Netzwerke gehackt und versucht, illegal an diese Informationen zu gelangen, könnte er viele Informationen verlieren. Sie sollten dieses Buch...
    $36.00

    Add to Cart The item has been added
  • The Cyber Security Handbook The Cyber Security Handbook
    Add to Cart The item has been added

    The Cyber Security Handbook

    In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber...
    $117.00

    Add to Cart The item has been added
  • My Password Journal My Password Journal
    Add to Cart The item has been added

    My Password Journal

    Never lose your password again by keeping them handy and ready for easy retrieval in this chic password journal. Sure, having one password for all your online accounts makes your life a lot easier but that would also make you very prone to security risks...
    $27.00

    Add to Cart The item has been added
  • WhatsApp Evolution and Digital Responsibility WhatsApp Evolution and Digital Responsibility
    Add to Cart The item has been added

    WhatsApp Evolution and Digital Responsibility

    "WhatsApp Evolution and Digital Responsibility" is a comprehensive exploration of the transformative journey undertaken by communication platforms, with a focus on the paradigm-shifting evolution of WhatsApp. This illuminating book navigates...
    $24.00

    Add to Cart The item has been added
  • Operation Espionage Operation Espionage
    Add to Cart The item has been added

    Operation Espionage

    Insider threat is a real issue, pain point, and can be a challenge in any organization of any size or industry. Having experienced personnel, the right tools, and the right processes can certainly assist your organization in moving in a positive...
    $43.00

    Add to Cart The item has been added
  • The Rise of the Computer State The Rise of the Computer State
    Add to Cart The item has been added

    The Rise of the Computer State

    The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation’s corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the...
    $23.00

    Add to Cart The item has been added
  • Data Loss Prevention Data Loss Prevention
    Add to Cart The item has been added

    Data Loss Prevention

    Bei der Durchführung eines Data Loss Prevention Vorhabens sehen sich viele Unternehmen mit zahlreichen Herausforderungen konfrontiert. Anfangs werden die Hürden eines solchen Projekts oft unterschätzt, da die Komplexität von DLP nicht auf den ersten...
    $104.00

    Add to Cart The item has been added
  • Safe Computing is Like Safe Sex Safe Computing is Like Safe Sex
    Add to Cart The item has been added

    Safe Computing is Like Safe Sex

    I'll bet you think your computer is safe from viruses and hackers. But is it really? Isn't it reasonable to expect your computer to be secure straight out-of-the-box? What does it mean to secure a system anyway? Huge security breaches have been all over...
    $29.00

    Add to Cart The item has been added
  • Cissp Cissp
    Add to Cart The item has been added

    Cissp

    The book includes additional information on difficult topics as the beginners should have a proper foundation. Cissp is a challenging topic, and therefore, the foundation topics must be well-understood; hence the reader can learn the rest of the domains...
    $26.00

    Add to Cart The item has been added
  • Cybersecurity in the COVID-19 Pandemic Cybersecurity in the COVID-19 Pandemic
    Add to Cart The item has been added

    Cybersecurity in the COVID-19 Pandemic

    This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel,...
    $54.00

    Add to Cart The item has been added
  • Security in IoT Security in IoT
    Add to Cart The item has been added

    Security in IoT

    This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such...
    $113.00

    Add to Cart The item has been added
  • Online Social Networks Security Online Social Networks Security
    Add to Cart The item has been added

    Online Social Networks Security

    This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs.
    $54.00

    Add to Cart The item has been added
  • Internet of Medical Things Internet of Medical Things
    Add to Cart The item has been added

    Internet of Medical Things

    Internet of Things (IoT) has become a valuable tool for connection and information exchange between devices. This book provides a brief introduction to this new field, focuses on wearable medical devices, and covers the basic concepts by providing the...
    $128.00

    Add to Cart The item has been added
  • Password Journal Password Journal
    Add to Cart The item has been added

    Password Journal

    You have numerous accounts online and possibly numerous passwords to remember too! That can be very confusing unless you have the sharpest memory. Free yourself from the hassle of remembering and resetting your password every time you forget by keeping...
    $27.00

    Add to Cart The item has been added
  • Mastering Safety Mastering Safety
    Add to Cart The item has been added

    Mastering Safety

    The Importance of Safety in Everyday LifeSafety is an essential aspect of our daily lives, often overlooked until an unfortunate incident occurs. In this subchapter, we will delve into the significance of safety in our everyday routines and highlight the...
    $44.00

    Add to Cart The item has been added
  • Life and Challenges of IT Professionals Life and Challenges of IT Professionals
    Add to Cart The item has been added

    Life and Challenges of IT Professionals

    "Life and Challenges of IT Professionals" provides an insightful journey into the dynamic realm of Information Technology, unraveling the intricacies of the profession and the individuals who drive its evolution. We embark on a comprehensive exploration...
    $24.00

    Add to Cart The item has been added
  • Assessing Information Security Assessing Information Security
    Add to Cart The item has been added

    Assessing Information Security

    The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they...
    $117.00

    Add to Cart The item has been added
  • 21st Century Chinese Cyberwarfare 21st Century Chinese Cyberwarfare
    Add to Cart The item has been added

    21st Century Chinese Cyberwarfare

    Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure...
    $149.00

    Add to Cart The item has been added
  • Internet Security Dictionary
    Add to Cart The item has been added

    Internet Security Dictionary

    The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English. The dictionary covers five...
    $107.00

    Add to Cart The item has been added
  • Okta Administration Up and Running - Second Edition Okta Administration Up and Running - Second Edition
    Add to Cart The item has been added

    Okta Administration Up and Running - Second Edition

    Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey FeaturesDiscover how to use Okta for complete identity and...
    $109.00

    Add to Cart The item has been added
  • The Art of Social Engineering The Art of Social Engineering
    Add to Cart The item has been added

    The Art of Social Engineering

    Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods...
    $98.00

    Add to Cart The item has been added
  • TLS Cryptography In-Depth TLS Cryptography In-Depth
    Add to Cart The item has been added

    TLS Cryptography In-Depth

    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks...
    $109.00

    Add to Cart The item has been added
  • Hidden Traps of the Internet Hidden Traps of the Internet
    Add to Cart The item has been added

    Hidden Traps of the Internet

    Building an online platform is an overwhelming and daunting task, with many pitfalls and horror stories surrounding the internet. It's not surprising that many writers shy away from online activities, putting that online presence into the do-it-later...
    $36.00

    Add to Cart The item has been added
  • Cyberpocalypse Cyberpocalypse
    Add to Cart The item has been added

    Cyberpocalypse

    Pay up or shut down. You choose. Cybercrime is on the rise and hackers have moved on from targeting individuals to targeting corporations both large and small. In recent memory, many high-profile companies have been the victim of some form of...
    $27.00

    Add to Cart The item has been added
  • Situational Awareness in Computer Network Defense Situational Awareness in Computer Network Defense
    Add to Cart The item has been added

    Situational Awareness in Computer Network Defense

    Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security...
    $441.00

    Add to Cart The item has been added
  • Mommy! There's a Monster in our Computer Mommy! There's a Monster in our Computer
    Add to Cart The item has been added

    Mommy! There's a Monster in our Computer

    The book that every parent should read to their child before they go on the Internet. The odds are very good that your child will not be negatively impacted by the Internet. But if they are, it can be devastating. Cyber Bullying KILLS kids. (This is...
    $38.00

    Add to Cart The item has been added
  • Securing IoT and Big Data Securing IoT and Big Data
    Add to Cart The item has been added

    Securing IoT and Big Data

    This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific...
    $373.00

    Add to Cart The item has been added
  • Security in the Digital World Security in the Digital World
    Add to Cart The item has been added

    Security in the Digital World

    “Love the fact that it jumped in with 10 top tips for security, a great opening to the book… Excellent section on phishing emails/vishing/smishing, with great practical examples …”Christopher Wright, Wright-CandA Consulting...
    $39.00

    Add to Cart The item has been added
  • Kali Linux Intrusion and Exploitation Cookbook Kali Linux Intrusion and Exploitation Cookbook
    Add to Cart The item has been added

    Kali Linux Intrusion and Exploitation Cookbook

    Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsKey Features:Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsImprove your testing...
    $103.00

    Add to Cart The item has been added
Privacy and data protection