Identity thieves can do an awful lot of bad once they have your personal information. And increasingly smartphone users are being hacked because they don't understand how to configure or use their d……続きを見る
Well, we've been warned that this time would come - probably from the earlier eighties on. Yes, computers have finally taken over and if you doubt it, we're here to convince you - but not because we……続きを見る
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices.... The authors have heaps of experience in the topics and bring……続きを見る
Easy, Powerful Code Security Techniques for Every PHP Developer
Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or ……続きを見る
The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker……続きを見る
In-depth counterintelligence tactics to fight cyber-espionage
"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot
Expose, pursue, and prosecute the perpetrato……続きを見る
Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring……続きを見る
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of……続きを見る
Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters……続きを見る
The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these ……続きを見る
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data……続きを見る
Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last……続きを見る
Bitcoin is going wild, with a valuation that has gone from zero to higher than $6,000 in just eight years. Altcoins are springing up like mushrooms; some will thrive and others will fade away. Block……続きを見る
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very ……続きを見る
著者:Janet Amber
出版社: Personal Growth
発売日: 2018年08月26日
Thank you for your interest in this booklet. The "The Basics" series, is a series of booklets designed to help you get the basics or foundations about a subject. Time is one of our most precious res……続きを見る
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in……続きを見る
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the ……続きを見る
Battlefield Forensics for Persian Gulf States provides an illustrative reference of various weapons, toolmarks, headstamps, and other traits in order to identify the origins of a variety of guns, ca……続きを見る
Get up to speed with planning, deploying, and managing Microsoft Office 365 services and gain the skills you need to pass the MS-101 exam
Key Features
Explore everything from mobile device manageme……続きを見る
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacks
Key Features
Understand SQL injection and its effe……続きを見る
Personenbezogene Daten, für die keine rechtliche Grundlage mehr vorliegt, müssen von Verantwortlichen im Sinne der DSGVO gelöscht werden. Ein wirksames Löschkonzept ist also für die eigene Datenschu……続きを見る
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and re……続きを見る
Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security
Cloud technology has changed the way we approach technology. It’s also given rise to a new set of security……続きを見る
A detailed guide to preparing for the MS-700 exam and earning associate-level Microsoft Teams administrator certification Key Features • Plan and design your Microsoft Teams deployment • Prepare, im……続きを見る
A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threatsKey FeaturesLearn to protect your Windows environment using zero-tru……続きを見る
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon. Putting terrorism into historical perspective……続きを見る
Les systèmes d'acquisition et de contrôle des données (SCADA) et les systèmes de contrôle industriels (ICS) sont les pierres angulaires de l'infrastructure critique. Les réseaux SCADA ont été conçus……続きを見る
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers agains……続きを見る
Digitale Aufklärung – für mehr Selbstbestimmung & Sicherheit
Für alle interessierten Verbraucher, denen ihre digitale Privatsphäre wichtig ist
Vorsicht Cyberkriminalität: Wie Kriminelle in unsere P……続きを見る
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. Thi……続きを見る