In the digital age, the line between connection and intrusion, between interest and obsession, between communication and harassment has become dangerously thin.
Stalking is no longer confined to phy……続きを見る
¿Qué es "observar" sino el acto de examinar atentamente, prestar atención detallada y analizar minuciosamente un objeto, evento o situación? ¿Y cómo puede esta palabra tan simple transformar la form……続きを見る
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost eve……続きを見る
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served a……続きを見る
This is Part 4 of a series of quick learning guides for Oracle designers, developers and managers including database administrators. Part 4 introduces early entrants with basic Oracle skills to the ……続きを見る
To break a code, you have to put yourself in the mind of your enemy in order to probe the strengths and weaknesses of their systems. It's a game of bluff and doublebluff. The Story of Codebreaking d……続きを見る
Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves.
The world has changed. Today, every time you make a site live, you……続きを見る
An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and "Cyber Czar" Eric Rosenbach Cyberattacks continue to grow in number, intensity, and sophisti……続きを見る
Master the Fundamentals of Oracle Database 12c
Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core database concepts, the role of the administrator, and ……続きを見る
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in inf……続きを見る
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead t……続きを見る