Online safety and behaviour Books

Sidebar Sidebar Sidebar
  • Privacy and Security Policies in Big Data Privacy and Security Policies in Big Data
    Add to Cart The item has been added

    Privacy and Security Policies in Big Data

    In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security...
    $475.00

    Add to Cart The item has been added
  • Detecting and Mitigating Robotic Cyber Security Risks Detecting and Mitigating Robotic Cyber Security Risks
    Add to Cart The item has been added

    Detecting and Mitigating Robotic Cyber Security Risks

    Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and...
    $475.00

    Add to Cart The item has been added
  • Online Banking Security Measures and Data Protection Online Banking Security Measures and Data Protection
    Add to Cart The item has been added

    Online Banking Security Measures and Data Protection

    Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever...
    $486.00

    Add to Cart The item has been added
  • Security Management in Mobile Cloud Computing Security Management in Mobile Cloud Computing
    Add to Cart The item has been added

    Security Management in Mobile Cloud Computing

    Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing...
    $339.00

    Add to Cart The item has been added
  • CODASPY '18 CODASPY '18
    Add to Cart The item has been added

    CODASPY '18

    <p>It is our great pleasure to welcome you to the eighth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2018), which follows the successful seven editions held in February/March 2011-2017. This conference series...
    $219.00

    Add to Cart The item has been added
  • Digital Dreams Have Become Nightmares Digital Dreams Have Become Nightmares
    Add to Cart The item has been added

    Digital Dreams Have Become Nightmares

    This book offers a compelling discussion of the digital dreams that have come true, their often unintended side effects (nightmares), and what must be done to counteract the nightmares. It is intended as an impetus to further conversation not only in...
    $109.00

    Add to Cart The item has been added
  • Crafting Secure Software Crafting Secure Software
    Add to Cart The item has been added

    Crafting Secure Software

    Gain a solid understanding of the threat landscape and discover best practices to protect your software factory throughout the SDLC, with valuable insights from security experts at GitGuardianKey Features:- Develop a strong security posture by grasping...
    $131.00

    Add to Cart The item has been added
  • Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
    Add to Cart The item has been added

    Privacy-Preserving Machine Learning

    Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breachesKey Features:- Understand machine learning privacy...
    $94.00

    Add to Cart The item has been added
  • A Non-Techie Beginners' Guide to Cybersecurity and Privacy A Non-Techie Beginners' Guide to Cybersecurity and Privacy
    Add to Cart The item has been added

    A Non-Techie Beginners' Guide to Cybersecurity and Privacy

    If you are worried about falling victim to cyber threats and having your sensitive data compromised, then keep reading...Are you tired of constantly worrying about hackers getting into your personal information and compromising your online privacy?Do you...
    $58.00

    Add to Cart The item has been added
  • The Digital Revolution The Digital Revolution
    Add to Cart The item has been added

    The Digital Revolution

    "The Digital Revolution: How Technology is Reshaping Our World" is a compelling and insightful exploration of the profound impact that digital technology has had on every aspect of our lives. From the way we communicate and work to how we learn and play,...
    $61.00

    Add to Cart The item has been added
  • Earning Online Earning Online
    Add to Cart The item has been added

    Earning Online

    "Earning Online: From Side Hustle to Full-Time Income" is a comprehensive guide for anyone looking to leverage the power of the internet to create a sustainable and profitable online income stream. Whether you're a freelancer, entrepreneur, or someone...
    $61.00

    Add to Cart The item has been added
  • Simplificando la Ciberseguridad Simplificando la Ciberseguridad
    Add to Cart The item has been added

    Simplificando la Ciberseguridad

    A medida que la tecnología impregna cada vez más nuestras vidas, la seguridad digital ha adquirido una importancia vital. "Simplificando la Ciberseguridad" ofrece una introducción accesible a la ciberseguridad dirigida específicamente a quienes se...
    $19.00

    Add to Cart The item has been added
  • The Encrypted Book of Passwords The Encrypted Book of Passwords
    Add to Cart The item has been added

    The Encrypted Book of Passwords

    A password journal with a major difference! An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or...
    $19.00

    Add to Cart The item has been added
  • Network Protocols for Security Professionals Network Protocols for Security Professionals
    Add to Cart The item has been added

    Network Protocols for Security Professionals

    Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey Features:Exploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database,...
    $109.00

    Add to Cart The item has been added
  • Mobile Forensics - Advanced Investigative Strategies Mobile Forensics - Advanced Investigative Strategies
    Add to Cart The item has been added

    Mobile Forensics - Advanced Investigative Strategies

    Master powerful strategies to acquire and analyze evidence from real-life scenariosKey Features:A straightforward guide to address the roadblocks face when doing mobile forensicsSimplify mobile forensics using the right mix of methods, techniques, and...
    $114.00

    Add to Cart The item has been added
  • iOS Forensics for Investigators iOS Forensics for Investigators
    Add to Cart The item has been added

    iOS Forensics for Investigators

    Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey Features:Explore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts,...
    $98.00

    Add to Cart The item has been added
  • Accountability in Computing Accountability in Computing
    Add to Cart The item has been added

    Accountability in Computing

    Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control Mechanisms, are preventive in nature. That is, they stop unauthorized parties before they are able to access data, information and services or...
    $156.00

    Add to Cart The item has been added
  • The Hidden Corporation The Hidden Corporation
    Add to Cart The item has been added

    The Hidden Corporation

    If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information...
    $41.00

    Add to Cart The item has been added
  • Practical Memory Forensics Practical Memory Forensics
    Add to Cart The item has been added

    Practical Memory Forensics

    A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey Features:Explore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware...
    $93.00

    Add to Cart The item has been added
  • Okta Administration Okta Administration
    Add to Cart The item has been added

    Okta Administration

    Plan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for...
    $103.00

    Add to Cart The item has been added
  • Screen Time Log Screen Time Log
    Add to Cart The item has been added

    Screen Time Log

    This Screen Time Log is a perfect way of recording your child's screen time. Keep track of their screentime, take a break from technology, and motivate them to get out and enjoy life. Each interior page includes prompts and space to record the...
    $26.00

    Add to Cart The item has been added
  • Cloud Security Band 2 Cloud Security Band 2
    Add to Cart The item has been added

    Cloud Security Band 2

    Digitalisierung, Industrie 4.0 und Economy 4.0 sind Schlagworte, die unsere Gesellschaft und die Unternehmen unserer Zeit beschäftigen. Dieses Buch gibt Antworten auf die Fragen, welche Veränderungen auf Prozesse und Unternehmensstrukturen erfolgen und...
    $86.00

    Add to Cart The item has been added
  • The Foundations of Threat Hunting The Foundations of Threat Hunting
    Add to Cart The item has been added

    The Foundations of Threat Hunting

    Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey Features:Learn foundational concepts for effective threat hunting teams in pursuit of cyber...
    $81.00

    Add to Cart The item has been added
  • Blockchain and Trustworthy Systems Blockchain and Trustworthy Systems
    Add to Cart The item has been added

    Blockchain and Trustworthy Systems

    This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020.The 42 full papers and the 11 short papers were...
    $184.00

    Add to Cart The item has been added
  • The Future of Cybersecurity The Future of Cybersecurity
    Add to Cart The item has been added

    The Future of Cybersecurity

    "The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices" explores how cybersecurity is developing and provides information on the best practices, tools, and strategies required to protect digital assets in a...
    $37.00

    Add to Cart The item has been added
  • Online Safety Made Simple Online Safety Made Simple
    Add to Cart The item has been added

    Online Safety Made Simple

    A straightforward guide for seniors on how to stay safe and secure online. This book explains how to recognize scams, protect your data, and build confidence in navigating the internet.
    $41.00

    Add to Cart The item has been added
  • Cyber Space and Outer Space Security Cyber Space and Outer Space Security
    Add to Cart The item has been added

    Cyber Space and Outer Space Security

    This book delves into cutting-edge research, encompassing both theoretical and experimental aspects, as well as innovations in the domains of cyberspace and outer space security.
    $282.00

    Add to Cart The item has been added
  • Password Book for Seniors Password Book for Seniors
    Add to Cart The item has been added

    Password Book for Seniors

    Introducing our Password Book for Seniors - a Personal Internet Organizer created with seniors in mind. This user-friendly book neatly organizes all your usernames, logins, and web addresses in an alphabetical format for swift and easy access. The...
    $17.00

    Add to Cart The item has been added
  • The Subjective Value of Privacy The Subjective Value of Privacy
    Add to Cart The item has been added

    The Subjective Value of Privacy

    This book critically examines the subjective value of privacy in the context of state surveillance, exploring how individuals assess costs and benefits of surveillance. It delves into the complex relationship between attitudes towards privacy, security,...
    $227.00

    Add to Cart The item has been added
  • Die Fortentwicklung des Datenschutzes Die Fortentwicklung des Datenschutzes
    Add to Cart The item has been added

    Die Fortentwicklung des Datenschutzes

    Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, künstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch für die Datenschutz‐Grundverordnung. Die Beiträge...
    $214.00

    Add to Cart The item has been added
  • Web Services - ICWS 2024 Web Services - ICWS 2024
    Add to Cart The item has been added

    Web Services - ICWS 2024

    This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024.The 9 full papers presented in this...
    $122.00

    Add to Cart The item has been added
  • Security Rights in Intellectual Property Security Rights in Intellectual Property
    Add to Cart The item has been added

    Security Rights in Intellectual Property

    This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination...
    $442.00

    Add to Cart The item has been added
  • OSINT OSINT
    Add to Cart The item has been added

    OSINT

    Are you ready to become a master of online open-source due diligence with the guidance of a top industry expert?"This book is an absolute must-have for security and intelligence professionals... "- Angel Villegas, US Army (Retired) / Flashpoint...
    $70.00

    Add to Cart The item has been added
  • Cyber Frauds, Scams and their Victims Cyber Frauds, Scams and their Victims
    Add to Cart The item has been added

    Cyber Frauds, Scams and their Victims

    Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are...
    $118.00

    Add to Cart The item has been added
Online safety and behaviour