Privacidad y protección de datos

/ Seguridad informática / Privacidad y protección de datos (278)

Libros Eliminar filtro Eliminar filtro Seguridad informática Eliminar filtro Privacidad y protección de datos Eliminar filtro Quitar filtros
  • Practical Web Penetration Testing
    Gus Khawaja
    ...
    Disponible

    58,19 €

  • Student Data Privacy
    Linnette Attai / Linnette J Attai
    Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology ...
    Disponible

    38,05 €

  • The Five Anchors of Cyber Resilience
    phillimon zongo
    Cybersecurity is a key priority for company directors, business executives, chief information security officers, and risk-management professionals across all sectors.In The Five Anchors of CYBER Resilience, Phil Zongo, an award-winning cybersecurity expert, strips away the ambiguity and complexity associated with cyber security, and offers practical guidance to reduce cyber-ris...
    Disponible

    25,73 €

  • Student Data Privacy
    Linnette Attai / Linnette J Attai
    Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology ...
    Disponible

    74,05 €

  • Glossary of Cyber Warfare, Cyber Crime and Cyber Security
    Dan Remenyi / Richard L Wilson
    There has always been some degree of controversy surrounding computers and computers have always been vulnerable. In the early days of computing there were cases of theft and criminal damage to new computer installations. Computers have been shot at and even bombed, causing extensive damage.Over the years there have been many attempts at computer fraud. One of the most celebrat...
    Disponible

    29,78 €

  • Cyber Wars
    Charles Arthur
    ...
    Disponible

    22,72 €

  • Practical Network Scanning
    Ajay Singh
    ...
    Disponible

    58,53 €

  • Security and Privacy in Smart Sensor Networks
    Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emergin...
    Disponible

    282,45 €

  • Windows Server 2016 Security, Certificates, and Remote Access Cookbook
    Jordan Krause
    ...
    Disponible

    42,09 €

  • Handbook of Research on Information Security in Biomedical Signal Processing
    Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accura...
    Disponible

    426,08 €

  • Security and Privacy Management, Techniques, and Protocols
    Yassine Maleh
    The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examin...
    Disponible

    285,12 €

  • Online Danger
    Dr. Eric Cole
    Unsafe at Download Speeds teaches those who are not 100% confident in their cyber security what they need to know to be safe online. ...
    Disponible

    15,86 €

  • GNU SASL 1.8 Reference Manual
    Simon Josefsson
    The GNU SASL Manual gives the reader an understanding of the SASL framework and the GNU SASL implementation, and how the GNU SASL library is used in an application. The manual can be used as a reference manual to get just the information needed about any particular interface of the library. Experienced programmers might want to start looking at the examples at the end of the ma...
    Disponible

    16,56 €

  • Romance Scam Survivor
    Jan Marshall
    "How could you give money to someone you’ve never met?"That’s the first question most people ask.For Jan Marshall, life was good. She had worked hard, set herself up well, and was looking for a companion to share her future with. Just as countless thousands around the world do, every day, she turned to online dating.In just a few months, Jan believed she was ‘in love’. She acce...
    Disponible

    15,42 €

  • SSH Mastery
    Michael W Lucas
    “One of the best technical writers in the networking and security environments.” – Midwest Book ReviewSecure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing.Lose the confusion.SSH Mastery rescues you from sifting through decades of obsolete online tutorials and quickly makes you an SSH journeyman. You’ll learn to eliminate ...
    Disponible

    31,97 €

  • SSH Mastery
    Michael W Lucas
    “One of the best technical writers in the networking and security environments.” – Midwest Book ReviewSecure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing.Lose the confusion.SSH Mastery rescues you from sifting through decades of obsolete online tutorials and quickly makes you an SSH journeyman. You’ll learn to eliminate ...
    Disponible

    21,94 €

  • Security, Privacy, and Anonymization in Social Networks
    B. K. Tripathy / BKTripathy / Kiran Baktha
    Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities is a pivotal reference source for the most up-to-date research on edge clustering models and we...
    Disponible

    203,12 €

  • Enterprise Cloud Security and Governance
    Zeal Vora
    ...
    Disponible

    66,00 €

  • Security in the Digital World
    Graham Day
    “Love the fact that it jumped in with 10 top tips for security, a great opening to the book… Excellent section on phishing emails/vishing/smishing, with great practical examples …”Christopher Wright, Wright-CandA Consulting LtdProtect yourself from cyber threats and risksCyberspace, the Internet, computer networks, the digital world – call it what you will – is always developin...
    Disponible

    25,04 €

  • IN Security
    Jane Frankland
    Women are fundamentally different to men and, when it comes to cybersecurity, one thing is certain…IF YOU’RE SHORT ON WOMEN YOU’RE LESS SAFE.Women matter in cybersecurity because of the way they view and deal with risk. Typically, women are more risk averse, compliant with rules, and embracing of organisational controls and technology than men. They’re also extremely intuitive ...
    Disponible

    31,61 €

  • SECURITY AND PRIVACY IN AN IT WORLD
    Craig MacKinder
    Regulatory compliance has historically been a concern of only a company’s legal and finance departments. However, as e-commerce continues to dominate retail both in the United States and abroad, regulatory compliance is now a major area of concern for IT managers, everyone on executive teams, and entire boards of directors.Amid a recoiling global marketplace and bigger and more...
    Disponible

    11,81 €

  • Secure Enough?
    Bryce Austin
    There have been distinct turning point moments in human history, such as when “germ theory” explained how to control many diseases, or how cholesterol levels helped to predict heart disease. The list goes on. All of these moments have one thing in common: the risk of radiation, germs, and cholesterol cannot be seen or felt. They are difficult to understand from a visceral stand...
    Disponible

    41,42 €

  • Locking the Cookie Jar
    R. Scott Alvord
    Learn how to protect yourself and your business against embezzlement, identity theft, and online hackers. Learn how the bad guys do it and how to avoid being a victim of cybercrime. Also learn a valuable hacker-proof password technique that is unique for each account and can even be safely written down! Includes sections on Embezzlement Schemes, Hacking the Hacker's Mind, H...
    Disponible

    16,32 €

  • Sitting Duck
    The World's Leading Experts
    How better to describe an easy cybercrime target than a Sitting Duck? Sitting Ducks have been vulnerable prey from time immemorial. Cybercriminals, like most criminals, will first zero in on the easiest targets – Sitting Ducks.Alongside the exponential growth of the World Wide Web, there is a parallel cyberworld, sinister in nature, sometimes called the Dark Web, fostered and o...
    Disponible

    24,59 €

  • Metasploit for Beginners
    Sagar Rahalkar
    An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics.Key Features:Carry out penetration testing in highly-secured environments with MetasploitLearn to bypass different defenses to gain access into different systems.A step-by-step guide ...
    Disponible

    50,49 €

  • ModSecurity Handbook, Second Edition
    Christian Folini / Ivan Ristic
    ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book will teach you how to monitor activity on your web sites and protect them from attack.Situated between your web sites and the world, web application firewalls provide an additional...
    Disponible

    57,44 €

  • Mastering Kali Linux for Web Penetration Testing
    Michael McPhee
    ...
    Disponible

    71,73 €

  • Metasploit Bootcamp
    Nipun Jaswal
    ...
    Disponible

    63,99 €

  • Screen Resolution
    Brett Lee / David Morris
    A must-read for parents and carers!Internet security is a major factor in keeping children safe online. Parental intervention and control is what works and a must for EVERY parent or carer of younger children or teenagers.Brett has spent thousands of hours online as an Internet detective pretending to be a teenager, hunting down and prosecuting child sex offenders.In Screen Re...
    Disponible

    23,99 €

  • Kali Linux Intrusion and Exploitation Cookbook
    Dhruv Shah / Ishan Girdhar
    Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsKey Features:Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsImprove your testing efficiency with the use of automated vulnerability scannersWork through step-by-step recipes to detect a wide array of vulner...
    Disponible

    67,11 €


01 02 03 04 05 06 07 08 09 10