Add Wish List Add to Cart The item has been added Bug Bounty from Scratch Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key Features- Prepare to participate in a bug bounty program- Discover your first bug and claim your reward upon successful detection- Go through... RRP: $89.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Smart Boundaries Shaping a World of Respect: Guarding the Innocence of YouthEmbark on a transformative journey with "Smart Boundaries: Safe Children - A Parent's Handbook", your essential guide to cultivating an environment where innocence thrives and awareness grows... RRP: $29.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Scam! Does this sound familiar?"This call is to inform you about an arrest warrant filed under your name. Please call us back at XXX-XXX-XXXX immediately to resolve this legal matter."If you receive a voicemail like this, your first instinct might be to call... RRP: $26.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Analytics This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Future Connected Technologies This book summarizes the progress in the research and provides step by step guide towards every aspect of cloud and other connected technologies. The book also covers the security aspects in the field of Cloud computing, Fog/Edge computing, IoT, etc. RRP: $149.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy Trends in Cloud Computing and Big Data This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration. RRP: $121.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to the Cyber Ranges With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cyber Security and Intelligent Analytics The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions,... RRP: $113.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Parent Handbook for Online Safety Internet safety should be like driving. We should teach it before we provide the keys to the car, and we should help guide our children into the right and wrong decisions of "the road." Tech safety doesn't have to feel overwhelming to parents! This... RRP: $18.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Dawn of Distrust In "Dawn of Distrust: Technological Threads Weaving a Trustless Society," embark on a riveting exploration into a future where trust is a relic of the past and transparency reigns supreme. Delve into the intricacies of a society transformed by... RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Microsoft System Center 2012 Endpoint Protection Cookbook RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IT Audit Field Manual Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manualKey Features:- Secure and audit endpoints in Windows environments for robust defense- Gain practical skills in... RRP: $89.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Leveraging the Potential of Artificial Intelligence in the Real World This book is a combination between the smart healthcare system and the intelligent transportation system based on the AI. Each chapter presents cutting-edge research and practical applications. RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Shadow Codes Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Digital Age." Tailored for tech enthusiasts, cybersecurity students, or simply the curious, this book unravels the mysteries of digital spying, making it an... RRP: $29.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Happily Ever Cyber! Are your family, your business, and your data safe from cyber threats?Our world has dramatically changed, and we rely on technology for everything we do, but according to recent studies, there is a new victim of identity theft every two seconds. Identity... RRP: $30.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Microsoft Forefront Identity Manager 2010 R2 Handbook RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Python Ethical Hacking from Scratch Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey Features:Get hands-on with ethical hacking and learn to think like a... RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Learning Bitcoin RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Python Forensics RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Access and Control in Digital Humanities Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful... RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Txting 2 Talking In a world where our phones can be used for anything, from checking the weather to finding a drug store, we have found ourselves no longer able to live without our device. It is not more than centimetres, even millimetres, from us at all times. It is our... RRP: $44.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added EU-Datenschutz-Grundverordnung Dieses Buch enthält neben der EU-Datenschutz-Grundverordnung auch die neue Datenschutzrichtlinie für die Strafverfolgung. Die amtlichen Begründungen sind ebenso abgedruckt. In dieser Textausgabe wurden die Erwägungsgründe ihren Rechtsvorschriften... RRP: $55.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Language of Cybersecurity The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists. Anyone who uses any kind of computing device needs to understand the importance of cybersecurity,... RRP: $49.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Penetration Testing for Highly-Secured Environments RRP: $137.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Nagios Core Administrators Cookbook RRP: $114.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CYBERSECURITY FOR BEGINNERS Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?Do you want to know what tools and techniques are used in Cybersecurity?Do you want to know what daily tasks you must do to protect your Infrastructure?If the answer is... RRP: $47.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Ethical Password Cracking Investigate how password protection works and delve into popular cracking techniques for penetration testing and retrieving dataKey Features:- Gain guidance for setting up a diverse password-cracking environment across multiple platforms- Explore tools... RRP: $85.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Research on Digital Violence and Discrimination Studies Digital violence continues to increase, especially during times of crisis. Racism, bullying, ageism, sexism, child pornography, cybercrime, and digital tracking raise critical social and digital security issues that have lasting effects. Digital violence... RRP: $610.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Metasploit RRP: $114.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Primer Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities.Today, Information Technology products and services face insidious threats from advanced malware that, if left unchecked, are... RRP: $35.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Managing Cyber Risk in the Financial Sector Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation,... RRP: $398.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Enigma The book analyzes the issues related to cyber technology. It presents the existing reality of cyber environment in India and delves into detailed analysis of issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of US and... RRP: $105.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Raising Humans in a Digital World Digital literacy advocate Diana Graber demystifies the complicated digital landscape facing today's kids and provides answers for parents and teachers eager to show them how to use technology as an empowering force in their lives and in their role as... RRP: $36.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Schnelleinstieg in die Informationssicherheit Informationssicherheit ist aktueller denn je. Gerade die Angriffe der jüngsten Zeit auf die Informationssicherheit der Unternehmen und Organisationen zeigen die Notwendigkeit eines intakten Informationssicherheitssystems.Mit dem aktualisierten Stand 2021... RRP: $76.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Infosec Strategies and Best Practices Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey Features:Convert the theory of your security certifications into actionable changes to secure your organizationDiscover how... RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Combating Denial-of-Service Attacks Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks' shortcomings. The implementation and upkeep of a strong... RRP: $915.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more... RRP: $486.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Cyber Path Journeying the cyber path is not a walk in the park. Rather, it is an Odyssean experience. For Odysseus, it took ten years on his journey back to Ithaca filled with hazardous events. When traversing the numerous cyber paths between source and... RRP: $34.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added ASIACCS '18 <p>We are pleased to present herein the proceedings of the 13th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2018) held in Incheon, Korea, June 4-8, 2018.</p> <p>ASIACCS 2018 is organized by AsiaCCS 2018... RRP: $474.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Online File Sharing It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading,... RRP: $244.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Edge Computing The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge... RRP: $257.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Invisibility Toolkit First, The Bad NewsYour sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Big Brother is alive and well and wants to eat your freedom as if you were Neo in The Matrix! The... RRP: $35.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Passwort-Logbuch - Passwort Liste - digitaler Nachlass/Erbe - Erinnerungsbuch - Nachschlagebuch - Notizbuch - Einlogbuch - Internet Organizer In unserer heutigen digitalen Welt ist es wichtig, dass wir auf unsere Passworte und Einlogdaten gut achten. Auch unser Digitaler Nachlass ist zu organisieren. Die folgenden Tipps sollen helfen, alles Wesentliche zu bedenken, damit Ihr Digitaler Nachlass... RRP: $17.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When using these apps, many users trustfully log everything from diet to sleep patterns... RRP: $543.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Modern Theories and Practices for Cyber Ethics and Security Compliance In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in... RRP: $497.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Developing Safer Online Environments for Children As the digital world assumes an ever-increasing role in the daily lives of the public, opportunities to engage in crimes increase as well. The prevention of cyber aggression is an ongoing challenge due to its multifaceted nature and the difficulties in... RRP: $543.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added PAM Mastery Pluggable Authentication Modules: Threat or Menace?PAM is one of the most misunderstood parts of systems administration. Many sysadmins live with authentication problems rather than risk making them worse. PAM’s very nature makes it unlike any... RRP: $70.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security Threats and Challenges Facing Human Life Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The... RRP: $257.00 Add to Cart The item has been added