Filter
(found 2148 products)
Book cover image
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current ...
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
https://magrudy-assets.storage.googleapis.com/9781522582410.jpg
236.250000 USD

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Hardback
Book cover image
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs ...
Cybersecurity Education for Awareness and Compliance
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.
https://magrudy-assets.storage.googleapis.com/9781522578475.jpg
204.750000 USD

Cybersecurity Education for Awareness and Compliance

Hardback
Book cover image
This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression. Its main aim is to bridge the ...
e-Citizens: Toward a New Model of (Inter)active Citizenry
This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services offered by governments, private institutions, and commercial companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflow, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. The purpose of this book is to help in outlining and understanding a realistic scenario of what we can term e-Citizenry. It identifies today's citizen, who is surrounded by an abundance of digital services, as an e-Citizen and explores the transition from their traditional role and behaviour to new ones. The respective chapters presented here will lay the foundation of the technological and social environment in which this societal transition takes place. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.
https://magrudy-assets.storage.googleapis.com/9783030007454.jpg
78.740000 USD

e-Citizens: Toward a New Model of (Inter)active Citizenry

by Alfredo M. Ronchi
Hardback
Book cover image
With DApps built on the Ethereum blockchain, users can establish persistent, reliable ownership records for actions such as buying a car or a house with smart contracts to enforce blockchain-based verification before a transaction can be completed. Building Ethereum DApps introduces readers to decentralized applications based on the Ethereum blockchain ...
Building Ethereum D Apps: Decentralized Applications on the Ethereum Blockchain
With DApps built on the Ethereum blockchain, users can establish persistent, reliable ownership records for actions such as buying a car or a house with smart contracts to enforce blockchain-based verification before a transaction can be completed. Building Ethereum DApps introduces readers to decentralized applications based on the Ethereum blockchain platform. They'll discover how to design smart contracts to enforce transaction rules, and then implement them in Ethereum's JavaScript-like Solidity language. Key Features * Understanding decentralized applications and the underlying technologies * Learning the key components of the Ethereum platform * Implementing smart contracts in Solidity Audience Written for developers with intermediate experience in an OO language or in JavaScript. Some understanding and experience with blockchain concepts is helpful. Author Bio Roberto Infante is an independent software development consultant who specializes in finance. Throughout his career, he has worked on a variety of innovative projects, such as the first internet mortgage approval system in the UK and one of the first online insurance underwriting systems in London.
https://magrudy-assets.storage.googleapis.com/9781617295157.jpg
41.990000 USD

Building Ethereum D Apps: Decentralized Applications on the Ethereum Blockchain

by Roberto Infante
Paperback / softback
Book cover image
This edited volume explores the intersection between philosophy and computing. It features work presented at the 2016 annual meeting of the International Association for Computing and Philosophy. The 23 contributions to this volume neatly represent a cross section of 40 papers, four keynote addresses, and eight symposia as they cut ...
On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence: Themes from IACAP 2016
This edited volume explores the intersection between philosophy and computing. It features work presented at the 2016 annual meeting of the International Association for Computing and Philosophy. The 23 contributions to this volume neatly represent a cross section of 40 papers, four keynote addresses, and eight symposia as they cut across six distinct research agendas. The volume begins with foundational studies in computation and information, epistemology and philosophy of science, and logic. The contributions next examine research into computational aspects of cognition and philosophy of mind. This leads to a look at moral dimensions of man-machine interaction as well as issues of trust, privacy, and justice. This multi-disciplinary or, better yet, a-disciplinary investigation reveals the fruitfulness of erasing distinctions among and boundaries between established academic disciplines. This should come as no surprise. The computational turn itself is a-disciplinary and no former discipline, whether scientific, artistic, or humanistic, has remained unchanged. Rigorous reflection on the nature of these changes opens the door to inquiry into the nature of the world, what constitutes our knowledge of it, and our understanding of our place in it. These investigations are only just beginning. The contributions to this volume make this clear: many encourage further research and end with open questions.
https://magrudy-assets.storage.googleapis.com/9783030017996.jpg
167.990000 USD

On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence: Themes from IACAP 2016

Hardback
Book cover image
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features Protect your financial environment with cybersecurity practices and methodologies Identify vulnerabilities such as data manipulation and fraudulent transactions Provide end-to-end protection within organizations Book DescriptionOrganizations have always been a target of cybercrime. ...
Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features Protect your financial environment with cybersecurity practices and methodologies Identify vulnerabilities such as data manipulation and fraudulent transactions Provide end-to-end protection within organizations Book DescriptionOrganizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn Understand the cyber threats faced by organizations Discover how to identify attackers Perform vulnerability assessment, software testing, and pentesting Defend your financial cyberspace using mitigation techniques and remediation plans Implement encryption and decryption Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is forHands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
https://magrudy-assets.storage.googleapis.com/9781788836296.jpg
47.240000 USD

Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches

by Milad Aslaner, Dr. Erdal Ozkaya
Paperback / softback
Book cover image
Sexting, cyberbullying, revenge porn, online predators... all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children's hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology's many benefits and opportunities. Raising Humans in a ...
Raising Humans In A Digital World: Helping Kids Build A Healthy Relationship With Technology
Sexting, cyberbullying, revenge porn, online predators... all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children's hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology's many benefits and opportunities. Raising Humans in a Digital World shows how digital kids must learn to navigate this environment, through developing social-emotional skills balancing virtual and real life building safe and healthy relationships avoiding cyberbullies and online predators protecting personal information identifying and avoiding fake news and questionable content becoming positive role models and leaders. This book is packed with at-home discussion topics and enjoyable activities that any busy family can slip into their daily routine. Full of practical tips grounded in academic research and hands-on experience, today's parents finally have what they've been waiting for--a guide to raising digital kids who will become the positive and successful leaders our world desperately needs. Praise for Raising Humans in a Digital World If you need practical, positive advice on how to handle your and your kids' digital lives, look no further. This book tackles the risks and addresses the potential harms, while keeping our eyes on the prize of the remarkable rewards that the online world brings. --Stephen Balkam, founder & CEO, Family Online Safety Institute Raising Humans in a Digital World is not only a timely book, it's essential reading for every parent, grandparent, and teacher. Diana Graber empowers you through her educational (proven and practical) curriculum and engages you through anecdotal stories. --Sue Scheff, founder of Parents' Universal Resource Experts and author of Shame Nation, Google Bomb, and Wit's End Brilliant, compelling, and essential are the first words that came to my mind when reading Diana Graber's Raising Humans in a Digital World. Diana not only taps her own exemplary expertise but also assembles a who's who of digital thought leaders to deliver a treasure trove of pragmatic advice via an engaging storytelling style. --Alan Katzman, founder and CEO, Social Assurity LLC Diana Graber not only shows parents how to create safe and responsible relationships in this ever-changing digital world, but she gives them the powerful tools to navigate through the many aspects of what is required to keep kids safe online. The misuse of technology and the cruel behaviors that take place daily by kids and teens can be changed, and Graber shows this in her informative and educational book Raising Humans in a Digital World. The book should be every parent's bible as a resource to ensure that their children are responsible and safe. --Ross Ellis, founder and CEO, STOMP Out Bullying This beautifully written book gives you the tools to raise healthy kids in a digital world. The anecdotes underscore the thoughtfulness of today's youth and their hunger for learning how to navigate their world well, instead of just being warned off by fearful adults. It is thoughtfully organized and theoretically sound, and will empower parents to have some of those much-needed conversations with their kids. --Dr. Pamela Rutledge, director, Media Psychology Research Center and faculty member, Fielding Graduate University
https://magrudy-assets.storage.googleapis.com/9780814439791.jpg
18.890000 USD

Raising Humans In A Digital World: Helping Kids Build A Healthy Relationship With Technology

by Diana Graber
Paperback / softback
Book cover image
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications ...
Becoming the Hacker: The Playbook for Getting Inside the Mind of the Attacker
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book DescriptionBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is forThe reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.
https://magrudy-assets.storage.googleapis.com/9781788627962.jpg
41.990000 USD

Becoming the Hacker: The Playbook for Getting Inside the Mind of the Attacker

by Adrian Pruteanu
Paperback / softback
Book cover image
Discover simple strategies for protecting your personal and confidential information on and offline with this essential and easy-to-understand guide. We all know that the internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots ...
200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline
Discover simple strategies for protecting your personal and confidential information on and offline with this essential and easy-to-understand guide. We all know that the internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store-and even you have the ability to unknowingly reveal your private information to everyone from thieves to busybodies. But you don't need to hire a specialist to keep your information safe-you can do it yourself with these 200+ easy-to-implement tactics, some of which include: -Shredding hard copies of bills - Turning off Bluetooth when not in use - Using a firewall - Hiding spare keys in an unusual place Keeping your information secure lies in your hands-make sure you're not putting yourself at risk in your daily habits with this essential guide.
https://magrudy-assets.storage.googleapis.com/9781721400126.jpg
18.75 USD

200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline

by Jeni Rogers
Paperback / softback
Book cover image
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority ...
Privacy in Mobile and Pervasive Computing
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly-making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of-and ability to enjoy-privacy, but also look at what constitutes privacy in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
https://magrudy-assets.storage.googleapis.com/9781681731179.jpg
57.700000 USD

Privacy in Mobile and Pervasive Computing

by Florian Schaub, Marc Langheinrich
Paperback / softback
Book cover image
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority ...
Privacy in Mobile and Pervasive Computing
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly-making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of-and ability to enjoy-privacy, but also look at what constitutes privacy in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
https://magrudy-assets.storage.googleapis.com/9781681734583.jpg
78.700000 USD

Privacy in Mobile and Pervasive Computing

by Florian Schaub, Marc Langheinrich
Hardback
Book cover image
This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. ...
Cloud Computing Basics
This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. It also provides a detailed understanding of the benefits of cloud computing that can encourage enterprises to switch to the cloud. Features: - Provides a basic understanding of the computing paradigm of cloud computing - Gives a brief introduction to cloud computing, its architecture, and the Hadoop distributed file system - Deals with cloud management concepts like scalable, fault tolerance, resiliency, provisioning, asset management, cloud governance, high availability, disaster recovery, and multi-tenancy - Includes case studies on MS Azure, Google, Amazon Web Services, Aneka, etc.
https://magrudy-assets.storage.googleapis.com/9781683923503.jpg
52.450000 USD

Cloud Computing Basics

by T B Rehman
Paperback / softback
Book cover image
Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features Understand the concept of Dark Net and Deep Web Use Tor to extract data and maintain anonymity Develop a security framework using Deep web evidences Book DescriptionThe overall world wide web is divided into ...
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features Understand the concept of Dark Net and Deep Web Use Tor to extract data and maintain anonymity Develop a security framework using Deep web evidences Book DescriptionThe overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis What you will learn Access the Deep Web and the Dark Web Learn to search and find information in the Dark Web Protect yourself while browsing the Dark Web Understand what the Deep Web and Dark Web are Learn what information you can gather, and how Who this book is forThis book is targeted towards security professionals, security analyst, or any stakeholder interested in learning the concept of deep web and dark net. No prior knowledge on Deep Web and Dark Net is required
https://magrudy-assets.storage.googleapis.com/9781789133363.jpg
31.490000 USD

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

by Sion Retzkin
Paperback / softback
Book cover image
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on ...
Understanding Security Issues
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
https://magrudy-assets.storage.googleapis.com/9781501515231.jpg
32.42 USD

Understanding Security Issues

by Stanley Siegel, Chris Williams, Scott Donaldson
Paperback / softback
Book cover image
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect ...
Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret. In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: How can I protect myself at home, on a personal level, away from the office? McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple Brilliance in the Basics habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from: Identify theft Compromising your children Lost money Lost access to email and social media accounts Digital security is one of the most important, and least understood, aspects of our daily lives. But it doesn't have to be. Thanks to its clear instruction, friendly tone, and practical strategies, Cyber Smart will help you rest more easily, knowing you and your family are protected from digital attack.
https://magrudy-assets.storage.googleapis.com/9781119559610.jpg
20.950000 USD

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

by Bart R. McDonough
Paperback / softback
Book cover image
Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals of Bug Bounty Hunting Hands-on experience on using different tools for bug hunting Learn to write a bug bounty report according to the different vulnerabilities and its analysis Book DescriptionBug bounty programs are the ...
Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals of Bug Bounty Hunting Hands-on experience on using different tools for bug hunting Learn to write a bug bounty report according to the different vulnerabilities and its analysis Book DescriptionBug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers. This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed. This book will get you started with bug bounty hunting and its fundamentals. What you will learn Learn the basics of bug bounty hunting Hunt bugs in web applications Hunt bugs in Android applications Analyze the top 300 bug reports Discover bug bounty hunting research methodologies Explore different tools used for Bug Hunting Who this book is forThis book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing. This book does not require any knowledge on bug bounty hunting.
https://magrudy-assets.storage.googleapis.com/9781788626897.jpg
41.990000 USD

Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs

by Shahmeer Amir, Carlos A. Lozano
Paperback / softback
Book cover image
This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of ...
Designing for Privacy and its Legal Framework: Data Protection by Design and Default for the Internet of Things
This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.
https://magrudy-assets.storage.googleapis.com/9783319986234.jpg
157.490000 USD

Designing for Privacy and its Legal Framework: Data Protection by Design and Default for the Internet of Things

by Aurelia Tamo-Larrieux
Hardback
Book cover image
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to ...
Handbook of Mobile Data Privacy
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
https://magrudy-assets.storage.googleapis.com/9783319981604.jpg
188.990000 USD

Handbook of Mobile Data Privacy

Hardback
Book cover image
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and ...
Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.
https://magrudy-assets.storage.googleapis.com/9781522576280.jpg
231.000000 USD

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention

by Sunita Vikrant Dhavale
Hardback
Book cover image
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book DescriptionKali Linux is ...
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book DescriptionKali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is forThis fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book
https://magrudy-assets.storage.googleapis.com/9781789341768.jpg
47.240000 USD

Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition

by Shakeel Ali, Tedi Heriyanto, Lee Allen, Gerard Johansen, Damian Boodoo, Alex Samm, Shiva V. N Parasram
Paperback / softback
Book cover image
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been ...
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed. The Internet of Broken Things is not merely a cautionary tale, though. It makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.
https://magrudy-assets.storage.googleapis.com/9781541773837.jpg
31.500000 USD

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat

by John P Carlin, Garrett M. Graff
Hardback
Book cover image
Cyber Security for Seniors
https://magrudy-assets.storage.googleapis.com/9781794698055.jpg
10.450000 USD

Cyber Security for Seniors

by Steve Krantz
Paperback / softback
Book cover image
Password Notebook Vault
https://magrudy-assets.storage.googleapis.com/9781795305129.jpg
6.290000 USD

Password Notebook Vault

by Heart of Sunshine Publishing
Paperback / softback
Book cover image
Cybersecurity: What You Need to Know about Computer and Cyber Security, Social Engineering, the Internet of Things + an Essential Guide to Ethical Hacking for Beginners
https://magrudy-assets.storage.googleapis.com/9781794647237.jpg
15.520000 USD

Cybersecurity: What You Need to Know about Computer and Cyber Security, Social Engineering, the Internet of Things + an Essential Guide to Ethical Hacking for Beginners

by Lester Evans
Paperback / softback
Book cover image
Shit I Cannot Remember: Internet Password Log Book. Protect Yourself Online with This Vault with Floral and Marble Cover
https://magrudy-assets.storage.googleapis.com/9781798130759.jpg
7.340000 USD

Shit I Cannot Remember: Internet Password Log Book. Protect Yourself Online with This Vault with Floral and Marble Cover

by Happiness Your Own Way
Paperback / softback
Book cover image
Cryptocurrency Bitcoin Private Key Password Keeper Journal
https://magrudy-assets.storage.googleapis.com/9781797686172.jpg
10.400000 USD

Cryptocurrency Bitcoin Private Key Password Keeper Journal

by Ruks Rundle
Paperback / softback
Book cover image
Cryptocurrency Bitcoin Private Key Password Keeper Journal
https://magrudy-assets.storage.googleapis.com/9781797685298.jpg
10.400000 USD

Cryptocurrency Bitcoin Private Key Password Keeper Journal

by Ruks Rundle
Paperback / softback
Book cover image
Happy 65th Birthday: 65 Years Loved, Say Happy Birthday and Show Your Love with This Adorable Password Book. Way Better Than a Birthday Card!
https://magrudy-assets.storage.googleapis.com/9781799050858.jpg
6.290000 USD

Happy 65th Birthday: 65 Years Loved, Say Happy Birthday and Show Your Love with This Adorable Password Book. Way Better Than a Birthday Card!

by Karlon Douglas, Level Up Designs
Paperback / softback
Book cover image
No Prob Llama: Cute Llama Unicorn 60 Days Personal Food Journal & Fitness Diary for Women & Teens Daily Gratitude with Prompts, Small Exercise Log Book
https://magrudy-assets.storage.googleapis.com/9781798515679.jpg
8.390000 USD

No Prob Llama: Cute Llama Unicorn 60 Days Personal Food Journal & Fitness Diary for Women & Teens Daily Gratitude with Prompts, Small Exercise Log Book

by Ladymberries Publishing
Paperback / softback
Page 1 of 40