Privacidad y protección de datos

/ Seguridad informática / Privacidad y protección de datos (278)

Libros Eliminar filtro Eliminar filtro Seguridad informática Eliminar filtro Privacidad y protección de datos Eliminar filtro Quitar filtros
  • Penetration Testing
    Kevin M. Henry / Kevin MHenry
    Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guid...
    Disponible

    38,06 €

  • Advanced Penetration Testing for Highly-Secured Environments
    Lee Allen / TBD
    ...
    Disponible

    86,93 €

  • Cloud Computing Assessing the Risks
    Bernard Golden / It Governance / Jared Carstensen
    Do you trust the Cloud? Should you trust the Cloud?’Cloud Computing’ are the words on everyone’s lips - it’s the latest technology, the way forward. But how safe is the Cloud? Is it reliable? How secure will your information be?Cloud Computing: Assessing the risks looks at these challenges from a real-world perspective, with industry experts sharing experiences and answers to t...
    Disponible

    50,79 €

  • 21st Century Chinese Cyberwarfare
    William T. Hagestad / William THagestad
    Military doctrine of The People’s Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy’s command and control infrastructure will significantly improve its chances of ultimate victory.But the Chinese 21st century approach to cyberwarfare is both more...
    Disponible

    96,47 €

  • Strategic and Practical Approaches for Information Security Governance
    Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Informat...
    Disponible

    256,39 €

  • Optimizing Information Security and Advancing Privacy Assurance
    Hamid Nemati
    Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enfor...
    Disponible

    255,88 €

  • Microsoft Windows Intune 2.0
    David Overton
    ...
    Disponible

    71,43 €

  • An Introduction to Hacking and Crimeware
    Victoria Loewengart
    Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of mal...
    Disponible

    18,17 €

  • CRIME On eBay
    Michael Ford
    If you have been using eBay for a while, chances are you’ve been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sent a payment and received nothing. Maybe you sent the auction item and the buyer reversed the payment. What do you do? Complaining on a message board may be a release emotionally but it does not recover your money or the item. It a...
    Disponible

    10,83 €

  • The Hidden Corporation
    David Schlesinger
    If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.Follow cybersecurity specialist Nancy ...
    Disponible

    15,30 €

  • ICT Ethics and Security in the 21st Century
    Marian Quigley
    The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption of and access to new products, tools, and software. ICT Ethics and Security in the 21st Century: New Developments and Applications highlights ethical dilemmas and security challenges posed by the rise of more recent technologies a...
    Disponible

    236,42 €

  • Non-Functional Properties in Service Oriented Architecture
    Service Oriented Architecture (SOA) is the paradigm for software and system specification, design, implementation and management that intends to shape and dominate IT and business landscapes in the near future. Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods offers a selection of chapters that cover three important aspects related to...
    Disponible

    236,58 €

  • Cyber Security, Cyber Crime and Cyber Forensics
    Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as...
    Disponible

    236,20 €

  • Security and Privacy Assurance in Advancing Technologies
    Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental agencies, and individuals must find ways to address the associated security and privacy implications of their actions and beh...
    Disponible

    236,81 €

  • Personal Data Privacy and Protection in a Surveillance Era
    In recent years, with rapidly advancing technology and a more globalized culture, the importance of privacy has become paramount. The legal protection of privacy against these new technological threats is a major discussion point in Europe as well as in the United States. Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices spans a number of in...
    Disponible

    236,50 €

  • Security in Virtual Worlds, 3D Webs, and Immersive Environments
    Alan Rea
    Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications, very little is written about the issues and techniques one must consider when creating, deploying, interacting within, and managing them securely. ...
    Disponible

    236,35 €

  • Moodle 1.9 Top Extensions Cookbook
    Michael De Raadt
    ...
    Disponible

    65,04 €

  • Cyber Terrorism
    Andrew M. Colarik / Andrew MColarik
    ...
    Disponible

    78,98 €

  • Applied Cryptography for Cyber Security and Defense
    In today’s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, ...
    Disponible

    236,53 €

  • Swanson on Internal Auditing
    Dan Swanson
    Raising the Bar provides a fascinating insight into the key issues facing the internal auditor. The author, Dan Swanson, is a seasoned internal audit professional who is well known in the field of internal auditing, governance, compliance and risk management. For many years, he has spearheaded drives to share and debate new developments that affect the work of the internal audi...
    Disponible

    63,72 €

  • Pervasive Information Security and Privacy Developments
    Hamid Nemati
    Privacy and security concerns are at the forefront of research and critical study in the prevalence of information technology. Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy. This refere...
    Disponible

    236,72 €

  • Chaos Synchronization and Cryptography for Secure Communications
    Santo Banerjee
    Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the co...
    Disponible

    237,16 €

  • E-Strategies for Technological Diffusion and Adoption
    Kamel Sherif
    Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role it plays in the diffusion of knowledge sharing, community development, and equality. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development provides comprehensive coverage and...
    Disponible

    236,45 €

  • Multimedia Forensics and Security
    Chang-Tsun Li
    As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwi...
    Disponible

    236,56 €

  • Computer Security, Privacy and Politics
    Ramesh Subramanian
    The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism-all of these have a profound effect on our daily computing operations and habits, with major political and s...
    Disponible

    131,78 €

  • Cybercrime
    Denise M. Chatam
    Cybercrime: Secure IT or Lose IT looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements. 3 ...
    Disponible

    21,03 €

  • Identity Theft
    Jay Mason
    Identity Theft: A Comprehensive Guide, enables readers to understand, prevent and recover from the crime of identity theft. Included in the book are chapters on how to safeguard your computer, how to avoid scams, 40 ways to prevent identity theft, 20 things to do if you are a victim of identity theft, how to order your free credit report and FACTA.Thorough information is provid...
    Disponible

    12,53 €

  • Secure E-Government Web Services
    ...
    Disponible

    93,33 €

  • Configuring Ipcop Firewalls
    Barrie Dempster / James Eaton-Lee
    This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop u...
    Disponible

    57,62 €

  • Privacy Protection for E-Services
    George Yee
    ...
    Disponible

    88,64 €


01 02 03 04 05 06 07 08 09 10