Filter
(found 1595 products)
Book cover image
Act now and get savvy to ensure your kids can enjoy the best of the internet and social media - without the risks. This practical go-to guide explains all the digital dangers kids face when they visit chat rooms, share selfies, use apps, and explore the internet. Worried about what ...
Parent Alert How To Keep Your Kids Safe Online
Act now and get savvy to ensure your kids can enjoy the best of the internet and social media - without the risks. This practical go-to guide explains all the digital dangers kids face when they visit chat rooms, share selfies, use apps, and explore the internet. Worried about what their own teenagers get up to, best friends Nadia Sawalha and Kaye Adams team up with international security expert Will Geddes. They ask the questions, and Will gives the answers, with simple action plans, preventative steps, and advice on how to recognise the warning signs. Your child's experiences online can potentially impact them for many years to come. Learn how to avoid internet dangers and help them stay safe online.
https://magrudy-assets.storage.googleapis.com/9780241350706.jpg
25.20 USD

Parent Alert How To Keep Your Kids Safe Online

by Kaye Adams, Nadia Sawalha, Will Geddes
Paperback / softback
Book cover image
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to ...
Social Engineering: The Science of Human Hacking
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the system in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
https://magrudy-assets.storage.googleapis.com/9781119433385.jpg
49.47 USD

Social Engineering: The Science of Human Hacking

by Christopher Hadnagy
Paperback / softback
Book cover image
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They ...
Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections such as Web Services, RESTful web services, Web Services Description Langugage, Universal Description Discovery and Integration, Service discovery and interfaces, Domain-specific security and privacy architectures, Location bases services, Sercurity Services and Markup languages.
https://magrudy-assets.storage.googleapis.com/9783319942889.jpg
104.990000 USD

Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback
Book cover image
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections ...
Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.
https://magrudy-assets.storage.googleapis.com/9789811086564.jpg
157.490000 USD

Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I

Paperback
Book cover image
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning ...
Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788839235.jpg
41.990000 USD

Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus

by Ajay Singh Chauhan
Paperback
Book cover image
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game changing hacks that make organizations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack ...
Cyber Wars: Hacks that Shocked the Business World
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game changing hacks that make organizations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders and this book provides a deep insight into understanding how they work, how hackers think as well as giving invaluable advice on staying vigilant and avoiding the security mistakes and oversights that can lead to downfall. No organization is safe but by understanding the context within which we now live and what the hacks of the future might look like, you can minimize the threat. In Cyber Wars, you will learn how hackers in a TK Maxx parking lot managed to steal 94m credit card details costing the organization $1bn; how a 17 year old leaked the data of 157,000 TalkTalk customers causing a reputational disaster; how Mirai can infect companies' Internet of Things devices and let hackers control them; how a sophisticated malware attack on Sony caused corporate embarrassment and company-wide shut down; and how a phishing attack on Clinton Campaign Chairman John Podesta's email affected the outcome of the 2016 US election.
https://magrudy-assets.storage.googleapis.com/9780749482008.jpg
25.58 USD

Cyber Wars: Hacks that Shocked the Business World

by Charles Arthur
Paperback
Book cover image
This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security ...
Windows Server 2016 Security, Certificates, and Remote Access Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016
This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say networking we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.
https://magrudy-assets.storage.googleapis.com/9781789137675.jpg
31.490000 USD

Windows Server 2016 Security, Certificates, and Remote Access Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016

by Jordan Krause
Paperback
Book cover image
The Pro-Hacker's Guide to Hacking: Hacking the Right Way, the Smart Way
https://magrudy-assets.storage.googleapis.com/9781721871599.jpg
9.450000 USD

The Pro-Hacker's Guide to Hacking: Hacking the Right Way, the Smart Way

by Anuj Mishra
Paperback
Book cover image
The Hacker-Proof Internet Address Password Book - Classic Motor: Alphabetical Website Username & Password Organizer Logbook Notebook
https://magrudy-assets.storage.googleapis.com/9781723362255.jpg
8.160000 USD

The Hacker-Proof Internet Address Password Book - Classic Motor: Alphabetical Website Username & Password Organizer Logbook Notebook

by Atlantic Journals
Paperback
Book cover image
Password Book: Cool Cat Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)
https://magrudy-assets.storage.googleapis.com/9781724462817.jpg
7.340000 USD

Password Book: Cool Cat Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)

by Chris Din
Paperback
Book cover image
Password Book: Marble Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal 2)
https://magrudy-assets.storage.googleapis.com/9781724463357.jpg
7.340000 USD

Password Book: Marble Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal 2)

by Evan Dean
Paperback
Book cover image
Password Logbook: Beautiful Flowers, 8.5 X 11 the Personal Internet Address & Password Log Book with Tabs Alphabetized, Internet Password Logbook, Password Organizer Notebook
https://magrudy-assets.storage.googleapis.com/9781724626301.jpg
8.390000 USD

Password Logbook: Beautiful Flowers, 8.5 X 11 the Personal Internet Address & Password Log Book with Tabs Alphabetized, Internet Password Logbook, Password Organizer Notebook

by Daisy Creative Journal
Paperback
Book cover image
The Hacker-Proof Internet Address Password Book - Flower Field: Alphabetical Website Username & Password Organizer Logbook Notebook
https://magrudy-assets.storage.googleapis.com/9781723339677.jpg
8.160000 USD

The Hacker-Proof Internet Address Password Book - Flower Field: Alphabetical Website Username & Password Organizer Logbook Notebook

by Atlantic Journals
Paperback
Book cover image
Pentesting Azure: The Definitive Guide to Testing and Securing Deployments
https://magrudy-assets.storage.googleapis.com/9781593278632.jpg
58.00 USD

Pentesting Azure: The Definitive Guide to Testing and Securing Deployments

by Matt Burrough
Paperback
Book cover image
Password Book: Internet Address and Password Logbook
https://magrudy-assets.storage.googleapis.com/9781718093621.jpg
7.340000 USD

Password Book: Internet Address and Password Logbook

by Dagwood Malvin
Paperback
Book cover image
Password Book: Kitten Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)
https://magrudy-assets.storage.googleapis.com/9781724466822.jpg
8.390000 USD

Password Book: Kitten Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)

by Kevin Alsop
Paperback
Book cover image
Password Book: Marble Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)
https://magrudy-assets.storage.googleapis.com/9781724463326.jpg
7.340000 USD

Password Book: Marble Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)

by Evan Allen
Paperback / softback
Book cover image
Password Book: Cool Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)
https://magrudy-assets.storage.googleapis.com/9781724462541.jpg
7.340000 USD

Password Book: Cool Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)

by Chris Aiden
Paperback / softback
Book cover image
The Hacker-Proof Internet Address Password Book - Phonograph: Alphabetical Website Username & Password Organizer Logbook Notebook
https://magrudy-assets.storage.googleapis.com/9781723363429.jpg
8.160000 USD

The Hacker-Proof Internet Address Password Book - Phonograph: Alphabetical Website Username & Password Organizer Logbook Notebook

by Atlantic Journals
Paperback
Book cover image
The Hacker-Proof Internet Address Password Book - Double Donut: Alphabetical Website Username & Password Organizer Logbook Notebook
https://magrudy-assets.storage.googleapis.com/9781723346835.jpg
8.160000 USD

The Hacker-Proof Internet Address Password Book - Double Donut: Alphabetical Website Username & Password Organizer Logbook Notebook

by Atlantic Journals
Paperback
Book cover image
Password Book: Floral Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)
https://magrudy-assets.storage.googleapis.com/9781724466815.jpg
7.340000 USD

Password Book: Floral Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal)

by Kevin Hill
Paperback
Book cover image
Password Book: Classic Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal 3)
https://magrudy-assets.storage.googleapis.com/9781724463708.jpg
7.340000 USD

Password Book: Classic Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal 3)

by Ben Callin
Paperback
Book cover image
The Hacker-Proof Internet Address Password Book - Antique Desk Design: Alphabetical Website Username & Password Organizer Logbook Notebook
https://magrudy-assets.storage.googleapis.com/9781723337789.jpg
8.160000 USD

The Hacker-Proof Internet Address Password Book - Antique Desk Design: Alphabetical Website Username & Password Organizer Logbook Notebook

by Atlantic Journals
Paperback
Book cover image
Let Your Dreams Lead: Password Journal: Black Blue Life Quotes, the Personal Internet Address & Password Log Book with Tabs Alphabetized, Large Print Password Book 8.5 X 11 Internet Password Logbook, Password Organizer Notebook
https://magrudy-assets.storage.googleapis.com/9781723565571.jpg
8.390000 USD

Let Your Dreams Lead: Password Journal: Black Blue Life Quotes, the Personal Internet Address & Password Log Book with Tabs Alphabetized, Large Print Password Book 8.5 X 11 Internet Password Logbook, Password Organizer Notebook

by Successlife Planner
Paperback / softback
Book cover image
2019 Blog Planner: Colorful Floral Art Design, 2019 Weekly Monthly Planner, Daily Blogger Posts for 12 Months, Calendar Social Media Marketing, Large Size 8.5 X 11 Bogging Manager Schedule
https://magrudy-assets.storage.googleapis.com/9781724607485.jpg
8.390000 USD

2019 Blog Planner: Colorful Floral Art Design, 2019 Weekly Monthly Planner, Daily Blogger Posts for 12 Months, Calendar Social Media Marketing, Large Size 8.5 X 11 Bogging Manager Schedule

by Daisy Creative Journal
Paperback
Book cover image
Organizer: Discreet Internet Password Book (Large Print with A-Z Tabs) with Red Roses Cover
https://magrudy-assets.storage.googleapis.com/9781724209726.jpg
7.340000 USD

Organizer: Discreet Internet Password Book (Large Print with A-Z Tabs) with Red Roses Cover

by Password Keeper Books
Paperback
Book cover image
Password Book: Funny Dog Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal 2)
https://magrudy-assets.storage.googleapis.com/9781724466808.jpg
7.340000 USD

Password Book: Funny Dog Internet Address & Password Logbook to Protect Usernames and Passwords: Modern Password Keeper, Vault, Notebook and Online Organizer (Password Journal 2)

by Kevin Bevan
Paperback
Book cover image
Password Logbook: Colorful Art Floral, 8.5 X 11 the Personal Internet Address & Password Log Book with Tabs Alphabetized, Internet Password Logbook, Password Organizer Notebook
https://magrudy-assets.storage.googleapis.com/9781724626349.jpg
8.390000 USD

Password Logbook: Colorful Art Floral, 8.5 X 11 the Personal Internet Address & Password Log Book with Tabs Alphabetized, Internet Password Logbook, Password Organizer Notebook

by Daisy Creative Journal
Paperback
Book cover image
Don't Be the Same. Be Better: Password Log, Internet Address Logbook
https://magrudy-assets.storage.googleapis.com/9781718097292.jpg
8.390000 USD

Don't Be the Same. Be Better: Password Log, Internet Address Logbook

by Malvin Cherrill
Paperback
Book cover image
The Language of Cybersecurity
https://magrudy-assets.storage.googleapis.com/9781937434625.jpg
27.250000 USD

The Language of Cybersecurity

Paperback
Page 1 of 40