Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust, Khajuria Samant, Bonde Camilla, Skouby Knud Erik


Варианты приобретения
Цена: 8276.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2026-05-10
Ориентировочная дата поставки: Июнь
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Khajuria Samant, Bonde Camilla, Skouby Knud Erik
Название:  Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust
ISBN: 9788793379428
Издательство: Mare Nostrum (Eurospan)
Издательство: River Publishers
Классификация:

ISBN-10: 8793379420
Обложка/Формат: Paperback
Страницы: 154
Вес: 0.23 кг.
Дата издания: 31.07.2015
Язык: English
Иллюстрации: Illustrations, color
Размер: 23.39 x 15.60 x 0.84 cm
Читательская аудитория: General (us: trade)
Подзаголовок: Cybersecurity, privacy and trust
Рейтинг:
Поставляется из: США


Cybersecurity and Privacy: Bridging the Gap

Автор: Samant Khajuria, Lene Sorensen, Knud Erik Skouby
Название: Cybersecurity and Privacy: Bridging the Gap
ISBN: 8793519664 ISBN-13(EAN): 9788793519664
Издательство: Taylor&Francis
Рейтинг:
Цена: 11023.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Addresses the issue of cybersecurity and privacy. Technical topics discussed include cybersecurity; encryption; privacy policy; trust; security and the Internet of Things; Botnets; data risks; cloudbased services; and visualization.

Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En

Автор: Evans Lester
Название: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En
ISBN: 1647482747 ISBN-13(EAN): 9781647482749
Издательство: Неизвестно
Рейтинг:
Цена: 5938.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Do you create tons of accounts you will never again visit? Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts? Does your password contain a sequence of numbers, such as "123456"? This book will show you just how incredibly lucky you are that nobody`s hacked you before.

Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui

Автор: Evans Lester
Название: Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui
ISBN: 1647481740 ISBN-13(EAN): 9781647481742
Издательство: Неизвестно
Рейтинг:
Цена: 3563.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then keep reading...

Two manuscripts in one book:

  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner's Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Do you create tons of accounts you will never again visit?

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?

Does your password contain a sequence of numbers, such as "123456"?

Do you automatically click all links and download all email attachments coming from your friends?

This book will show you just how incredibly lucky you are that nobody's hacked you before.

With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.

With plenty of examples, this book will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.

From the crudest forums to the most sophisticated online services, there is a war going on and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.

In part 1 of this book, you will learn about:

  • How the internet is held together with a pinky swear
  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • Equally preposterous defense from those attacks
  • How people in charge don't even realize what hacking means
  • How there's only one surefire way to protect against hacking
  • Research on past, present, and future hacking methods
  • Difference between good and bad hackers
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon
  • And much, much more

Some of the topics covered in part 2 of this book include:

  • Fighting against companies
  • Ethical Hacking Defined
  • War on the internet
  • Engineer's mind
  • The Almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi
  • And much, much more

So if you want to learn more about Cybersecurity and Ethical Hacking, scroll up and click "add to cart"

Developing a Cybersecurity Immune System for Industry 4.0

Автор: by SERGEI PETRENKO
Название: Developing a Cybersecurity Immune System for Industry 4.0
ISBN: 877022188X ISBN-13(EAN): 9788770221887
Издательство: Taylor&Francis
Рейтинг:
Цена: 14851.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author’s research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks.

The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity.

This book contains four chapters:

  • 1. Cyber Immunity Concept of the Industry 4.0;
  • 2. Mathematical Framework for Immune Protection of Industry 4.0;
  • 3. Trends and prospects of the development of Immune Protection of Industry 4.0;
  • 4. From detecting cyber-attacks to self-healing Industry 4.0;
Hci for Cybersecurity, Privacy and Trust: Second International Conference, Hci-CPT 2020, Held as Part of the 22nd Hci International Conference, Hcii 2

Автор: Moallem Abbas
Название: Hci for Cybersecurity, Privacy and Trust: Second International Conference, Hci-CPT 2020, Held as Part of the 22nd Hci International Conference, Hcii 2
ISBN: 3030503089 ISBN-13(EAN): 9783030503086
Издательство: Springer
Рейтинг:
Цена: 6097.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Human Factors in Cybersecurity.- Privacy and Trust.- Usable Security Approaches.

Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT

Автор: Wiem Tounsi
Название: Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT
ISBN: 1786304481 ISBN-13(EAN): 9781786304483
Издательство: Wiley
Рейтинг:
Цена: 22010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminals, but also to stay one step ahead.

Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems

Constructing Cybersecurity: Power, Expertise and the Internet Security Industry

Автор: Whiting Andrew
Название: Constructing Cybersecurity: Power, Expertise and the Internet Security Industry
ISBN: 1526123320 ISBN-13(EAN): 9781526123329
Издательство: NBN International
Рейтинг:
Цена: 16830.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book provides a critique of dominant cybersecurity knowledge that draws upon original constructivist analysis of the expert discourse within the internet security industry. The book argues that this expertise helps explain the probematic common sense that sees cybersecurity conflated with national security. -- .

Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing

Автор: Grid Alan
Название: Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing
ISBN: 1914045084 ISBN-13(EAN): 9781914045080
Издательство: Неизвестно
Рейтинг:
Цена: 4414.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Why Straitening Your Cybersecurity is Crucial in 2020 ? If You are Looking to Protect Your Data and Sleep More Peacefully at Night Read On...


Cyber-crime nowadays is continuously rising, and many individuals or smaller businesses are facing problems due to ineffective Cybersecurity, people feel that their data is safe, but even companies are attacked daily. It might be offensive to hear, but most cyber-criminals will have much more expertise than you or your average employee when it comes to digital crime; They can sell your data on the black market or use it for personal goals like: extract your bank information. There are also other personal reasons, such as ego, others appreciation and personal satisfaction.


We've scoured the entire Cybersecurity world, researching the practices of both security experts and ordinary Internet users like ourselves. Our recommendations cover the most significant threats you or your business face and show you the best methods for protecting your identity and personal data.

Each subtopic of this book has been explored in great depth to sensitize you about cybersecurity and how it is going to affect international relations and geopolitical situations across the world.

It covers the following topics:


  • What is Cyber Security?
  • The 5 Most Common Mistakes in Cybersecurity
  • Cyber Attacks and Vulnerabilities
  • Systems That Are Vulnerable to Cyber-Attacks
  • Improving Effectively Your Security
  • What does it mean to be an Ethical Hacker?
  • How to Inhibits Adware


...And much more

This book is for anyone who has an interest in Cybersecurity. You don't need to have any prior knowledge of it . You should just need to have a working knowledge of computers and the internet.

With this guide, we want to give you a simple, effective, and realistic framework for Boosting your Cybersecurity-one that you can achieve quickly.

Ready to Improve Your Cybersecurity? Click "Buy Now"


Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats

Автор: Mukherjee Aditya
Название: Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats
ISBN: 1789806291 ISBN-13(EAN): 9781789806298
Издательство: Неизвестно
Рейтинг:
Цена: 8458.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: After prominent market leaders have been impacted by advanced cyber threats, network security has become a top priority in terms of successfully keeping attackers from breaching networks. This book will help you design a robust network security ecosystem that helps prevent traditional and new and evolving attacks.

Journal of Cyber Security and Mobility 2-1

Автор: Dutta Ashutosh, Lee Ruby, Prasad R. Neeli
Название: Journal of Cyber Security and Mobility 2-1
ISBN: 879298259X ISBN-13(EAN): 9788792982599
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 5518.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Two masterpieces of piano literature of entirely different character: The very lively three-movement Piano Concerto in G major is characterized, with regard to style, by jazz influences, especially in the first and third movements, but by late Romantic and impressionist influences in the middle movement. Ravel himself called it `a concerto in the truest sense of this generic term: With that, I want to say that it has been written in the spirit of the concertos by Mozart and Saint-Saens.`The one-movement concerto in D major for the left hand combines powerful monumental sounds with a slender exotic orchestration. Commissioned by the Austrian pianist Paul Wittgenstein whose right arm had to be amputated following a war injury, the one-movement piano setting seems amazingly complete all the same. The technical realization of this piece is a real challenge for the pianist, but the work fascinates by its intensity, power, sensuality, exoticism and beauty. Besetzung:piano and orchestra

Journal of Cyber Security and Mobility 2-2

Автор: Jain Shweta
Название: Journal of Cyber Security and Mobility 2-2
ISBN: 8792982662 ISBN-13(EAN): 9788792982667
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 5518.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Pedro Chirino entered the Society of Jesus in February 1580 and arrived in the Philippines in June 1590. He was one of the pioneers of the Philippine Jesuit Mission who started and consolidated the Jesuit apostolate in the Philippines. This work is the first history, not just of the Jesuit missions, but also of the Catholic missions in the Philippines, and served as the source for later histories.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия