Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Android Apps Security: Mitigate Hacking Attacks and Security Breaches, Gunasekera Sheran


Варианты приобретения
Цена: 7685.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Англия: Есть  Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября

Добавить в корзину
в Мои желания

Автор: Gunasekera Sheran
Название:  Android Apps Security: Mitigate Hacking Attacks and Security Breaches
ISBN: 9781484216811
Издательство: Springer
Классификация:

ISBN-10: 1484216814
Обложка/Формат: Paperback
Страницы: 294
Вес: 0.54 кг.
Дата издания: 01.09.2020
Язык: English
Размер: 25.40 x 17.78 x 1.65 cm
Ссылка на Издательство: Link
Поставляется из: Германии
Описание: 1. Introduction.- 2. Recap of Secure Development Principles.- 3. Changes in Security Architecture.- 4. Security when Building Apps to Scale.- 5. Testing the Security of Your App (this covers pentesting and bug bounties).- 6. The Toolbag.- 7. Rooting an Android phone. 8. Looking at your Apps Data through a Root shell.- Bypassing SSL Pinning (the holy grail of hacking apps).- 10. Reverse Engineering Android Apps.- 11. Incident Response.



Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy

Автор: Robert H. Sloan, Richard Warner
Название: Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy
ISBN: 0815356625 ISBN-13(EAN): 9780815356622
Издательство: Taylor&Francis
Рейтинг:
Цена: 8420.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The wave of data breaches raises two pressing questions: Why don`t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.

Information Security: Cyberattacks, Data Breaches and Security Controls

Автор: Paul Scholz
Название: Information Security: Cyberattacks, Data Breaches and Security Controls
ISBN: 1536158801 ISBN-13(EAN): 9781536158809
Издательство: Nova Science
Рейтинг:
Цена: 32312.00 р.
Наличие на складе: Невозможна поставка.

Описание: Federal agencies and our nations critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information. Yet, cyber-based intrusions and attacks on federal and nonfederal systems have become not only more numerous and diverse, but also more damaging and disruptive as discussed in chapter 1. The IRS has a demanding responsibility to collect taxes, process tax returns, and enforce the nations tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the sensitive financial and taxpayer information that reside on those systems. As part of its audit of IRSs fiscal year 2017 and 2016 financial statements, GAO assessed whether controls over financial and tax processing systems were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information as reported in chapter 2. Reliance on a global supply chain introduces multiple risks to federal information systems. Chapter 3 highlights information security risks associated with the supply chains used by federal agencies to procure IT systems. The Office of Personnel Management (OPM) collects and maintains personal data on millions of individuals, including data related to security clearance investigations. In June 2015, OPM reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate but related incident had compromised its systems and the files related to background investigations for 21.5 million individuals. From February 2015 through August 2017, multiple reviews of OPMs information security were conducted. Four reports based on these reviews were issued. The reports contained 80 recommendations for improving the agencys security posture. Chapter 4 reviews relevant documents and artifacts reflecting OPMs actions and progress toward implementing the 80 recommendations contained in the four reports, and assessed the actions against the intent of the recommendations. CDC is responsible for detecting and responding to emerging health threats and controlling dangerous substances. In carrying out its mission, CDC relies on information technology systems to receive, process, and maintain sensitive data. Accordingly, effective information security controls are essential to ensure that the agencys systems and information are protected from misuse and modification. Chapter 5 reviews the extent to which CDC has taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement. Federal agencies are dependent on information systems to carry out operations. The risks to these systems are increasing as security threats evolve and become more sophisticated. To reduce the risk of a successful cyberattack, agencies can deploy intrusion detection and prevention capabilities on their networks and systems. Chapter 6 determined the reported effectiveness of agencies implementation of the governments approach and strategy; the extent to which DHS and OMB have taken steps to facilitate the use of intrusion detection and prevention capabilities to secure federal systems; and the extent to which agencies reported implementing capabilities to detect and prevent intrusions. Recent large-scale data breaches of public and private entities have put hundreds of millions of people at risk of identity theft or other harm. Chapter 7 reviews issues related to consumers options to address risks of harm from data breaches and examines information and expert views on the effectiveness of consumer options to address data breach risks. While Chapter 8 considers the answer to this question: what legal obligations do Internet companies have to prevent and respond to data breaches? Then discusses several factors Congress might consider when weighing future legislation.

Telehealth Security: An Examination of Variance in Telehealth Security Breaches

Автор: Dr. Seria D. Lakes DSc
Название: Telehealth Security: An Examination of Variance in Telehealth Security Breaches
ISBN: 0692291865 ISBN-13(EAN): 9780692291863
Издательство: Неизвестно
Цена: 3102.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Data Security Breaches and Privacy in Europe

Автор: Rebecca Wong
Название: Data Security Breaches and Privacy in Europe
ISBN: 1447155858 ISBN-13(EAN): 9781447155850
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered.

Security Breaches and Threat Prevention in the Internet of Things

Автор: Jeyanthi N., Thandeeswaran R.
Название: Security Breaches and Threat Prevention in the Internet of Things
ISBN: 1522522964 ISBN-13(EAN): 9781522522966
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 26195.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Cybersecurity Breaches and Issues Surrounding Online Threat Protection

Автор: Michelle Moore
Название: Cybersecurity Breaches and Issues Surrounding Online Threat Protection
ISBN: 1522519416 ISBN-13(EAN): 9781522519416
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents the latest scholarly research on the various types of unauthorized access or damage to electronic data. This publication features extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, and is designed for academics, researchers, computer engineers, graduate students, and practitioners.

Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks

Автор: Rains Tim
Название: Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks
ISBN: 1800206011 ISBN-13(EAN): 9781800206014
Издательство: Неизвестно
Рейтинг:
Цена: 17287.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.

Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events

Автор: Thompson Eric C.
Название: Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
ISBN: 1484256077 ISBN-13(EAN): 9781484256077
Издательство: Springer
Рейтинг:
Цена: 7685.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Beginning-Intermediate user level

Control Your Erp Destiny: Reduce Project Costs, Mitigate Risks, and Design Better Business Solutions

Автор: Phillips Steven
Название: Control Your Erp Destiny: Reduce Project Costs, Mitigate Risks, and Design Better Business Solutions
ISBN: 0692512772 ISBN-13(EAN): 9780692512777
Издательство: Неизвестно
Цена: 7654.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The history of ERP has shown that leaving the fate of your Enterprise Resource Planning project in the hands of software consultants and vendors may only create a false sense of security. Regardless of all the right intentions, software consultants are not all-knowing, have a limited ability to control the keys to success, and are the beneficiaries of cost overruns. When it comes to software vendors, I can say only one thing: The sales people will be long gone when it comes time to implement.


This is the first book to present comprehensive strategies and techniques that enable organizations to take charge of their ERP projects to drive success. The author describes how to become less dependent on outside consultants, significantly reduce implementation and support costs, mitigate project risks, and design business solutions that work for your company.


This book also contains hundreds of tips to create internal project ownership, select ERP software, manage service providers, transfer software knowledge, develop the right implementation strategies, establish a realistic schedule and budget, and streamline business processes. It is a guide to making informed decisions during each project phase. The information is applicable to new implementations and system upgrades.

Fiscal Monitor, October 2019: How to Mitigate Climate Change

Название: Fiscal Monitor, October 2019: How to Mitigate Climate Change
ISBN: 1498321224 ISBN-13(EAN): 9781498321228
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 5544.00 р.
Наличие на складе: Нет в наличии.

Описание: This report emphasizes the environmental, fiscal, economic, and administrative case for using carbon taxes, or similar pricing schemes such as emission trading systems, to implement climate mitigation strategies. It provides a quantitative framework for understanding their effects and trade-offs with other instruments and applies it to the largest advanced and emerging economies. Alternative approaches, like “feebates” to impose fees on high polluters and give rebates to cleaner energy users, can play an important role when higher energy prices are difficult politically. At the international level, the report calls for a carbon price floor arrangement among large emitters, designed flexibly to accommodate equity considerations and constraints on national policies. The report estimates the consequences of carbon pricing and redistribution of its revenues for inequality across households. Strategies for enhancing the political acceptability of carbon pricing are discussed, along with supporting measures to promote clean technology investments.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия