Conversations in Cyberspace

Conversations in Cyberspace

Conversations in Cyberspace

Giulio D'Agostino / Giulio D’Agostino

22,86 €
IVA incluido
Disponible
Editorial:
Business Expert Press
Año de edición:
2019
Materia
Privacidad y protección de datos
ISBN:
9781948976701
22,86 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world. The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some of the key figures in industrial control systems (ICS), advanced persistent threat (APT) and online/deep web members organizations. It aims to be an introduction to the relationships between security, OSINT and the vast and complex world hiding in the deep web. The information provided will be beneficial to security professionals and system administrators interested in exploring today’s concerns in database design, privacy and security-by-design, and deep web members organizations, including Cicada 3301, the Unknowns, Anonymous, and more.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
  • El derecho al olvido
    Lowry Pressly
    Cada día disminuye la parte de nuestra vida que no está bajo vigilancia y que no se convierte en datos. Podemos configurar los parámetros de privacidad en nuestros dispositivos y redes sociales, pero sabemos que nuestros esfuerzos son insignificantes ante el capitalismo de vigilancia y la manipulación algorítmica. En nuestra era hiperconectada, muchos han comenzado a preguntars...
    Disponible

    25,95 €

  • Windows Server 2016 Security, Certificates, and Remote Access Cookbook
    Jordan Krause
    ...
    Disponible

    47,31 €

  • The Abilene Net
    Gregg Powers
    ...
    Disponible

    20,31 €

Otros libros del autor

  • Data Security in Cloud Computing, Volume II
    Giulio D'Agostino / Giulio D’Agostino
    This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of se...
    Disponible

    43,18 €

  • Data Security in Cloud Computing, Volume I
    Giulio D'Agostino / Giulio D’Agostino
    This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of se...
    Disponible

    43,09 €