L'ebook che non si limita a mostrare come funzionano le tecniche di exploit, ma spiega come svilupparle, ritorna in due ebook.Jon Erickson guida il lettore in un percorso di iniziazione alle tecnich……続きを見る
著者:Rae A. Stonehouse
出版社: Live For Excellence Productions (LFEP)
発売日: 2026年02月04日
They Stole $2,180.47 from My Payoneer Account in 60 Days. Here's How You Can Stop Them in 90 Seconds.
Every day, thousands of authors receive messages that look legitimateーa friendly fellow writer,……続きを見る
When 32 million people's darkest secrets exploded across the internet, the world watched marriages crumble, careers end, and lives lost. This is the story of the hack that changed everything.
On Jul……続きを見る
In 2016, hackers nearly pulled off the perfect crimeーand a typo saved the global banking system.
On a quiet Thursday evening in Dhaka, cybercriminals infiltrated Bangladesh Bank and initiated 35 fr……続きを見る
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape
In today’s data-driven world, protecting personal informat……続きを見る
Reimagine the future of the internet
All our devices and gadgetsーfrom our refrigerators to our home security systems, vacuum cleaners, and stereosーare going online, just like our computers did. Bu……続きを見る
著者:Jon Erickson
出版社: No Starch Press
発売日: 2008年02月01日
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ha……続きを見る
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders g……続きを見る
INSTANT USA TODAY BESTSELLER!
National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and……続きを見る
This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications. The ……続きを見る
IAM & Cybersecurity: Strategies for Protecting Digital Assets offers a comprehensive exploration into the vital role of Identity and Access Management (IAM) in securing today's digital world. Whethe……続きを見る
Are you ready to embark upon a compelling exploration of the haunting world of online sex trafficking? “The Cyber Pimp" unveils the dark web's role, social media's influence, and the tools used by t……続きを見る
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibiliti……続きを見る
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.
This comprehensive work focu……続きを見る
Il Master in Cybersicurezza copre tutti gli aspetti fondamentali dell'hacking etico, della sicurezza informatica e delle tecnologie di difesa. Il corso inizia con un'introduzione alla differenza tra……続きを見る
Proteggere la propria privacy online è una sfida costante in un mondo sempre più connesso e digitale. Le grandi aziende tecnologiche raccolgono sempre più dati sui nostri comportamenti online e offl……続きを見る
Cognitive Risk is a book about the least understood but most pervasive risk to mankind – human decision-making. Cognitive risks are subconscious and unconscious influence factors on human decision-m……続きを見る
Master the art of web exploitation with real-world techniques on SAML, WordPress, IoT, ElectronJS, and Ethereum smart contracts Purchase of the print or Kindle book includes a free PDF eBookKey Feat……続きを見る
The rich, untold origin story of the ubiquitous web cookieーwhat’s wrong with it, why it’s being retired, and how we can do better.
Consent pop-ups continually ask us to download cookies to our comp……続きを見る
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand ……続きを見る
著者:Owen Jones
出版社: Megan Publishing Services
発売日: 2015年10月14日
Welcome to "Internet Ideas" - a beginner's manual, your guide to mastering the digital realm with confidence and understanding. In today's interconnected world, the Internet has become an essential ……続きを見る
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical I……続きを見る
The official report that has shaped the international debate about NSA surveillance
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-l……続きを見る
著者:Jessica Stone
出版社: Taylor & Francis
発売日: 2021年12月29日
The newly updated Digital Play Therapy focuses on the responsible integration of technology into play therapy during and after the COVID-19 pandemic.
With respect for the many different modalities a……続きを見る
Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over a……続きを見る
L’innovazione sta scardinando i parametri del vissuto individuale e collettivo, tanto da rovesciare l’interrogativo su cosa l’uomo possa fare della tecnologia nel suo inverso: cosa la tecnologia pos……続きを見る
著者:Mark O'Neill
出版社: McGraw Hill LLC
発売日: 2012年09月01日
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You’ll also find details on Security Asserti……続きを見る
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in inf……続きを見る
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about th……続きを見る
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you ……続きを見る