Privacidad y protección de datos

/ Seguridad informática / Privacidad y protección de datos (278)

Libros Eliminar filtro Eliminar filtro Seguridad informática Eliminar filtro Privacidad y protección de datos Eliminar filtro Quitar filtros
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • How to Keep Your Stuff Safe Online
    Raef Meeuwisse
    Any everyday person can protect themselves from the majority of online cybercrime.  All you have to do is follow some basic security steps, most of which are completely FREE to implement.This short guide is designed to be an easy and quick read that helps you identify and implement basic but highly effective security in a matter of hours.  The main security guidance is covered ...
    Disponible

    6,66 €

  • Security Breaches and Threat Prevention in the Internet of Things
    As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategie...
    Disponible

    236,13 €

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
    Rawat
    While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile a...
    Disponible

    256,74 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
    Disponible

    22,04 €

  • Cryptographic Solutions for Secure Online Banking and Commerce
    Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking an...
    Disponible

    262,60 €

  • National Security and Counterintelligence in the Era of Cyber Espionage
    Eugenie de Silva
    As technology continues to advance, the threats imposed on these innovations also continue to grow and evolve. As such, law enforcement specialists diligently work to counteract these threats, promote national safety, and defend the individual rights of citizens. National Security and Counterintelligence in the Era of Cyber Espionage highlights technological advancements in int...
    Disponible

    262,41 €

  • Handbook of Research on Information Security and Assurance
    Jatinder NDGupta
    While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to ...
    Disponible

    348,16 €

  • Learn Social Engineering
    Dr. Erdal Ozkaya / DrErdal Ozkaya
    ...
    Disponible

    61,18 €

  • Managerial Guide for Handling Cyber-Terrorism and Information Warfare
    Janczewski
    ...
    Disponible

    85,70 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Trust and Technology in a Ubiquitous Modern Environment
    In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-main...
    Disponible

    236,44 €

  • The Domains of Identity
    Kaliya Young
    'The Domains of Identity' defines sixteen coherent yet comprehensive categories of interactions which cause personally identifiable information to be stored in databases. Discussions of identity management are often confusing; enumerating these domains and describing their characteristics clarifies which problems arise and how they can be solved within each domain. ...
    Disponible

    180,64 €

  • The Domains of Identity
    Kaliya Young
    'The Domains of Identity' defines sixteen coherent yet comprehensive categories of interactions which cause personally identifiable information to be stored in databases. Discussions of identity management are often confusing; enumerating these domains and describing their characteristics clarifies which problems arise and how they can be solved within each domain. ...
    Disponible

    51,96 €

  • Personal Data Protection and Legal Developments in the European Union
    Maria Tzanou
    In the age of technological advancement, including the emergence of artificial intelligence, big data, and the internet of things, the need for privacy and protection has risen massively. This phenomenon has led to the enforcement of two major legal directives in the European Union (EU) that aim to provide vigorous protection of personal data. There is a need for research on th...
    Disponible

    327,95 €

  • Ultimate GDPR Practitioner Guide (2nd Edition)
    Stephen R Massey
    The Ultimate GDPR Practitioner Guide (2nd Edition) provides those tasked with implementing Data Protection processes, useful information and supporting case law to aid in achieving compliance with GDPR. The second edition is crammed with new and updated advice, guidance and templates and also includes a copy of the full regulation text and the supporting recitals. ...
    Disponible

    23,58 €

  • The Modern Parent
    Martine Oglethorpe
    If you’re a parent in this digital age, then it’s likely the following rings true for you:You want your kids to feel safe and in control of their digital world.You want them to be able to navigate the risks in that world with confidence.You want them to grow, thrive, connect, create and collaborate despite those risks.You’re also aware that to achieve the above, you need to be ...
    Disponible

    17,52 €

  • Learn Computer Forensics
    William Oettinger
    ...
    Disponible

    52,56 €

  • Digital Forensics with Kali Linux - Second Edition
    Shiva V. N. Parasram
    Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement ...
    Disponible

    52,17 €

  • Metasploit 5.0 for Beginners, Second Edition
    Sagar Rahalkar
    A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey Features Perform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with the latest features and improvements in the Metasploit Framework 5.0 Analyze, find, exploit, and gain acce...
    Disponible

    44,27 €

  • Modern Theories and Practices for Cyber Ethics and Security Compliance
    In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a nee...
    Disponible

    288,52 €

  • Practical Mobile Forensics - Fourth Edition
    Heather Mahalik / Oleg Skulkin / Rohit Tamma
    ...
    Disponible

    59,35 €

  • Learn Azure Sentinel
    Gary Bushey / Richard Diver
    Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environmentKey FeaturesSecure your network, infrastructure, data, and applications on Microsoft Azure effectivelyIntegrate artificial intelligence, threat analysis, and automation for optimal security solutionsInvestigate possible security breaches and...
    Disponible

    52,86 €

  • Web Penetration Testing
    Radhi Shatob
    This Guide is considered Entry-To-Medium level in Websites and Web Applications penetration testing, it is a good starting point for those who want to start their career as a Web Applications Penetration testers or Security analysts. Also, the book would be valuable to Information Security Managers, Systems administrators, Web administrators and Web developers who would like to...
    Disponible

    54,34 €

  • Cybersecurity Attacks - Red Team Strategies
    Johann Rehberger
    ...
    Disponible

    60,73 €

  • CODASPY'19
    CODASPY'19
    It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and devel...
    Disponible

    137,99 €

  • Notebook
    Faith V Summers
    Protect yourself against identity theft and account hacking with this discrete and clever password log book!This discrete and handy password journal allows you to keep all your user names and passwords perfectly safe and easily accessible, at the same time. You can even leave this notebook out in plain sight, no one will ever guess what it contains. Get one for your home and an...
    Disponible

    16,47 €

  • CYBERWARFARE
    Larry Bell
    Cyberwarfare: Targeting America, Our Infrastructure, and Our Future identifies and elaborates previous examples and current actions involving American cybersecurity forces, allies and adversaries that pose imminent national and personal security dangers. By “cyber war,” we are generally referring to a foreign (or even domestic) government-level nation-state actions that are int...
    Disponible

    19,75 €

  • ISO/IEC 27701
    Alan Shipman / Steve Watkins
    An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enab...
    Disponible

    18,26 €


01 02 03 04 05 06 07 08 09 10