Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust, Khajuria Samant, Bonde Camilla, Skouby Knud Erik


Варианты приобретения
Цена: 8276.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-23
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Khajuria Samant, Bonde Camilla, Skouby Knud Erik
Название:  Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust
ISBN: 9788793379428
Издательство: Mare Nostrum (Eurospan)
Издательство: River Publishers
Классификация:

ISBN-10: 8793379420
Обложка/Формат: Paperback
Страницы: 154
Вес: 0.23 кг.
Дата издания: 31.07.2015
Язык: English
Иллюстрации: Illustrations, color
Размер: 23.39 x 15.60 x 0.84 cm
Читательская аудитория: General (us: trade)
Подзаголовок: Cybersecurity, privacy and trust
Рейтинг:
Поставляется из: США


Ethical Hacking and Cybersecurity: A Beginner`s Guide to Understand Cyber Security and Ethical Hacking. Protect Your Business and Your Family from Cyb

Автор: Academy Itc
Название: Ethical Hacking and Cybersecurity: A Beginner`s Guide to Understand Cyber Security and Ethical Hacking. Protect Your Business and Your Family from Cyb
ISBN: 1914346092 ISBN-13(EAN): 9781914346095
Издательство: Неизвестно
Рейтинг:
Цена: 4821.00 р.
Наличие на складе: Нет в наличии.

Описание: Dоеѕ thе word "hacking" ѕсаrе уоu? Do you know if your personal information was stolen from your account? Have you always wanted to learn how to protect your system from such attacks? Do you want to learn the secrets of ethical hackers?
If you answered yes to all these questions, you've come to the right place.

Gеnеrаllу, hасkіng has earned a nеgаtіvе rерutаtіоn аnd hаѕ bесоmе аѕѕосіаtеd with суbеrаttасkѕ аnd breaches іn суbеrѕесurіtу.

But this is not always truе. If this is your fіrѕt bооk on hасkіng, уоu wіll become mоrе acquainted wіth the wоrld оf hасkіng аѕ thіѕ bооk gіvеѕ a simple overview оf ethical hacking.

Thе term "еthісаl hасkеr" еmеrgеd in thе lаtе 1970s whеn thе US government hіrеd expert groups саllеd "red tеаmѕ" tо hack their оwn computer system.

Hасkеrѕ are суbеr-еxреrtѕ who lаwfullу or іllеgаllу hасk. Yоu enter the ѕесurіtу ѕуѕtеm оf a соmрutеr network to rеtrіеvе оr rесоllесt іnfоrmаtіоn.


This book will talk about:


  • WHAT IS ETHICAL HACKING
  • WHO SHOULD I PROTECT MY BUSINESS FROM?
  • SKILLS EVERY HACKER NEEDS
  • DIFFERENT TYPES OF HACKING OVER THE YEARS
  • HACKING RISKS FOR BUSINESSES
  • PROTECTING BUSINESSES FROM CYBERCRIME
  • PROTECTING YOUR FAMILY FROM CYBER ATTACKS
  • SECRET SOCIAL MEDIA HACKS YOU WANT TO TRY NOW
  • ..AND MUCH, MUCH MORE


This book bundle is perfect for beginners, a comprehensive guide that will show you the easy way to overcoming cybersecurity, computer hacking, wireless network and penetration testing.


So if you want to learn more about Cybersecurity and Ethical Hacking, scroll up and click "add to cart"


Ethical Hacking and Cybersecurity: A Beginner`s Guide to Understand Cyber Security and Ethical Hacking. Protect Your Business and Your Family from Cyb

Автор: Itc Academy
Название: Ethical Hacking and Cybersecurity: A Beginner`s Guide to Understand Cyber Security and Ethical Hacking. Protect Your Business and Your Family from Cyb
ISBN: 1914346998 ISBN-13(EAN): 9781914346996
Издательство: Неизвестно
Рейтинг:
Цена: 5235.00 р.
Наличие на складе: Нет в наличии.

Описание: ★ Get this book with 55% discount. LAST DAYS ★
Dоеѕ thе word "hacking" ѕсаrе уоu? Do you know if your personal information was stolen from your account? Have you always wanted to learn how to protect your system from such attacks? Do you want to learn the secrets of ethical hackers?
If you answered yes to all these questions, you've come to the right place.

Gеnеrаllу, hасkіng has earned a nеgаtіvе rерutаtіоn аnd hаѕ bесоmе аѕѕосіаtеd with суbеrаttасkѕ аnd breaches іn суbеrѕесurіtу.

But this is not always truе. If this is your fіrѕt bооk on hасkіng, уоu wіll become mоrе acquainted wіth the wоrld оf hасkіng аѕ thіѕ bооk gіvеѕ a simple overview оf ethical hacking.

Thе term "еthісаl hасkеr" еmеrgеd in thе lаtе 1970s whеn thе US government hіrеd expert groups саllеd "red tеаmѕ" tо hack their оwn computer system.

Hасkеrѕ are суbеr-еxреrtѕ who lаwfullу or іllеgаllу hасk. Yоu enter the ѕесurіtу ѕуѕtеm оf a соmрutеr network to rеtrіеvе оr rесоllесt іnfоrmаtіоn.


This book will talk about:


  • WHAT IS ETHICAL HACKING
  • WHO SHOULD I PROTECT MY BUSINESS FROM?
  • SKILLS EVERY HACKER NEEDS
  • DIFFERENT TYPES OF HACKING OVER THE YEARS
  • HACKING RISKS FOR BUSINESSES
  • PROTECTING BUSINESSES FROM CYBERCRIME
  • PROTECTING YOUR FAMILY FROM CYBER ATTACKS
  • SECRET SOCIAL MEDIA HACKS YOU WANT TO TRY NOW
  • ..AND MUCH, MUCH MORE


This book bundle is perfect for beginners, a comprehensive guide that will show you the easy way to overcoming cybersecurity, computer hacking, wireless network and penetration testing.


So if you want to learn more about Cybersecurity and Ethical Hacking, scroll up and click "add to cart"


Cyber Security for Beginners: A Complete Guide to Getting Started in Cybersecurity and Ethical Hacking

Автор: Treu Peter
Название: Cyber Security for Beginners: A Complete Guide to Getting Started in Cybersecurity and Ethical Hacking
ISBN: 1801541388 ISBN-13(EAN): 9781801541381
Издательство: Неизвестно
Рейтинг:
Цена: 2757.00 р.
Наличие на складе: Нет в наличии.

Описание:

If you want to protect yourself and your family from the increasing risk of cyber-attacks, then keep reading.

Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism will be the book you'll want to read to understand why cybersecurity is so important, and how it's impacting everyone . Each day, cybercriminals look for ways to hack into the systems and networks of major corporations and organizations-financial institutions, our educational systems, healthcare facilities and more. Already, it has cost billions of dollars in losses worldwide.

This is only the tip of the iceberg in cybercrime. Needless to mention that individuals are terrorized by someone hacking into their computer, stealing personal and sensitive information, opening bank accounts and purchasing with their credit card numbers.


In this Book you will learn:


  • PRINCIPLES UNDERLIE CYBERSECURITY WHY IS CYBERSECURITY SO CRITICAL?


  • CYBER-SECURITY EDUCATIONAL PROGRAM: WHO NEEDS MY DATA?


  • The CYBERSECURITY Commandments: On the Small Causes of Big Problems


  • CYBER SECURITY AND INFORMATION SECURITY MARKET TRENDS 2020


  • NEW US CYBERSECURITY STRATEGIES


  • WHAT IS A HACKER?


  • ETHICAL HACKING FOR BEGINNERS


  • HACK BACK A DO-IT-YOURSELF



BUY THIS BOOK NOW AND GET STARTED TODAY Scroll up and click the BUY NOW BUTTON

Cyber Security for Beginners: A Complete Guide to Getting Started in Cybersecurity and Ethical Hacking

Автор: Treu Peter
Название: Cyber Security for Beginners: A Complete Guide to Getting Started in Cybersecurity and Ethical Hacking
ISBN: 1801586047 ISBN-13(EAN): 9781801586047
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Нет в наличии.

Описание:

If you want to protect yourself and your family from the increasing risk of cyber-attacks, then keep reading.

Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism will be the book you'll want to read to understand why cybersecurity is so important, and how it's impacting everyone . Each day, cybercriminals look for ways to hack into the systems and networks of major corporations and organizations-financial institutions, our educational systems, healthcare facilities and more. Already, it has cost billions of dollars in losses worldwide.

This is only the tip of the iceberg in cybercrime. Needless to mention that individuals are terrorized by someone hacking into their computer, stealing personal and sensitive information, opening bank accounts and purchasing with their credit card numbers.


In this Book you will learn:


  • PRINCIPLES UNDERLIE CYBERSECURITY WHY IS CYBERSECURITY SO CRITICAL?


  • CYBER-SECURITY EDUCATIONAL PROGRAM: WHO NEEDS MY DATA?


  • The CYBERSECURITY Commandments: On the Small Causes of Big Problems


  • CYBER SECURITY AND INFORMATION SECURITY MARKET TRENDS 2020


  • NEW US CYBERSECURITY STRATEGIES


  • WHAT IS A HACKER?


  • ETHICAL HACKING FOR BEGINNERS


  • HACK BACK A DO-IT-YOURSELF



BUY THIS BOOK NOW AND GET STARTED TODAY Scroll up and click the BUY NOW BUTTON

Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui

Автор: Evans Lester
Название: Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui
ISBN: 1647481740 ISBN-13(EAN): 9781647481742
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then keep reading...

Two manuscripts in one book:

  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner's Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Do you create tons of accounts you will never again visit?

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?

Does your password contain a sequence of numbers, such as "123456"?

Do you automatically click all links and download all email attachments coming from your friends?

This book will show you just how incredibly lucky you are that nobody's hacked you before.

With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.

With plenty of examples, this book will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.

From the crudest forums to the most sophisticated online services, there is a war going on and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.

In part 1 of this book, you will learn about:

  • How the internet is held together with a pinky swear
  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • Equally preposterous defense from those attacks
  • How people in charge don't even realize what hacking means
  • How there's only one surefire way to protect against hacking
  • Research on past, present, and future hacking methods
  • Difference between good and bad hackers
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon
  • And much, much more

Some of the topics covered in part 2 of this book include:

  • Fighting against companies
  • Ethical Hacking Defined
  • War on the internet
  • Engineer's mind
  • The Almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi
  • And much, much more

So if you want to learn more about Cybersecurity and Ethical Hacking, scroll up and click "add to cart"

Developing a Cybersecurity Immune System for Industry 4.0

Автор: by SERGEI PETRENKO
Название: Developing a Cybersecurity Immune System for Industry 4.0
ISBN: 877022188X ISBN-13(EAN): 9788770221887
Издательство: Taylor&Francis
Рейтинг:
Цена: 14851.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author’s research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks.

The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity.

This book contains four chapters:

  • 1. Cyber Immunity Concept of the Industry 4.0;
  • 2. Mathematical Framework for Immune Protection of Industry 4.0;
  • 3. Trends and prospects of the development of Immune Protection of Industry 4.0;
  • 4. From detecting cyber-attacks to self-healing Industry 4.0;
Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT

Автор: Wiem Tounsi
Название: Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT
ISBN: 1786304481 ISBN-13(EAN): 9781786304483
Издательство: Wiley
Рейтинг:
Цена: 22010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminals, but also to stay one step ahead.

Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems

Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing

Автор: Grid Alan
Название: Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing
ISBN: 1914045084 ISBN-13(EAN): 9781914045080
Издательство: Неизвестно
Рейтинг:
Цена: 4414.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Why Straitening Your Cybersecurity is Crucial in 2020 ? If You are Looking to Protect Your Data and Sleep More Peacefully at Night Read On...


Cyber-crime nowadays is continuously rising, and many individuals or smaller businesses are facing problems due to ineffective Cybersecurity, people feel that their data is safe, but even companies are attacked daily. It might be offensive to hear, but most cyber-criminals will have much more expertise than you or your average employee when it comes to digital crime; They can sell your data on the black market or use it for personal goals like: extract your bank information. There are also other personal reasons, such as ego, others appreciation and personal satisfaction.


We've scoured the entire Cybersecurity world, researching the practices of both security experts and ordinary Internet users like ourselves. Our recommendations cover the most significant threats you or your business face and show you the best methods for protecting your identity and personal data.

Each subtopic of this book has been explored in great depth to sensitize you about cybersecurity and how it is going to affect international relations and geopolitical situations across the world.

It covers the following topics:


  • What is Cyber Security?
  • The 5 Most Common Mistakes in Cybersecurity
  • Cyber Attacks and Vulnerabilities
  • Systems That Are Vulnerable to Cyber-Attacks
  • Improving Effectively Your Security
  • What does it mean to be an Ethical Hacker?
  • How to Inhibits Adware


...And much more

This book is for anyone who has an interest in Cybersecurity. You don't need to have any prior knowledge of it . You should just need to have a working knowledge of computers and the internet.

With this guide, we want to give you a simple, effective, and realistic framework for Boosting your Cybersecurity-one that you can achieve quickly.

Ready to Improve Your Cybersecurity? Click "Buy Now"


Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including

Автор: Scripting Alan
Название: Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including
ISBN: 191410501X ISBN-13(EAN): 9781914105012
Издательство: Неизвестно
Рейтинг:
Цена: 3028.00 р.
Наличие на складе: Нет в наличии.

Описание:

You Are A Few Steps Away From Securing Your Online Transactions And Hacking Your Data Will Be A Thing Of The Past


Do you know that hackers are big threats to your business only and they are ready to damage and destroy you and your data by snooping at everything you are doing without knowing anything?Do you want to give yourself peace of mind, freedom, choice, and security in all your dealings on the internet? Do you want to know how you can protect your server and your data no matter how skillful a hacker can be?


This easy-to-use, step-by-step book goes a step further to show you about different techniques and methods as well as ways hackers can get into your network, steal your data, and cause severe damages to you. No matter what you do online, some bad actors are keeping a close look at you, ready to devour you and your assets.

If you are tired of spinning the wheel about your security online, buy this book. Its approach draws from various ways, guidelines, tips, and examples about how hackers can tap into any form of your vulnerabilities on the internet and steal your data. This book teaches how you can secure yourself from these bad actors so they will never crack into your network. What are the steps to take so you can be safe and secure? This book walks you through the entire process.


Some of the things that this book discusses include:

  • Deep understanding of hacking and hackers
  • Different types of hackers and how they operate
  • The process of hacking
  • How to prepare before hacking (with the detailed process)
  • The five phases of hacking
  • How you can delete tracks in a system and stay anonymous
  • How you can become exposed to the internet
  • The process of installing Kali Linux
  • How you can work with Kali Linux
  • What is a wireless network and how you can scan networks and servers
  • Everything you need to know about WEP cracking and the tools to do the job
  • The best way you can use to install Nmap on Linux
  • How you can understand the risks your system is facing
  • How to know your enemies on the internet and how you can win when you have the right tools
  • Everything you need to know about wireless hacking domination as well as testing methodology and the best tools for the job
  • How you can crack WEP/WPA encryptions
  • What are the hacking techniques?
  • How you can scan and map your network
  • How you can defend against attacks
  • Some facts you need to know about cybersecurity and cyber-attacks
  • What is cryptography, and how does it work?
  • Symmetric and asymmetric encryption
  • Different ways you can use to secure important files online without hacking coming near them not to talk of touching them
  • How you can use VPN to protect internet traffic
  • How you can crack the encryption
  • What are the flaws in web applications and websites

Plus tons of more examples and details.


If you'd like to know new ways hackers manipulate their ways into your server and how you can guard against these attacks, buy this book

If you'd like to know everything about framework attacks and penetration testing measures, buy this book

If you'd like to know simple yet powerful ways to protect your website so it can run smoothly without the fear of perpetrators, buy this book

Not only will this book change your life forever, but it will also change the way you look at online security, hackers, and how you need to stay secure online


Get your copy of this book by clicking the "Buy Now" button

Journal of Cyber Security and Mobility 2-1

Автор: Dutta Ashutosh, Lee Ruby, Prasad R. Neeli
Название: Journal of Cyber Security and Mobility 2-1
ISBN: 879298259X ISBN-13(EAN): 9788792982599
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 5518.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Two masterpieces of piano literature of entirely different character: The very lively three-movement Piano Concerto in G major is characterized, with regard to style, by jazz influences, especially in the first and third movements, but by late Romantic and impressionist influences in the middle movement. Ravel himself called it `a concerto in the truest sense of this generic term: With that, I want to say that it has been written in the spirit of the concertos by Mozart and Saint-Saens.`The one-movement concerto in D major for the left hand combines powerful monumental sounds with a slender exotic orchestration. Commissioned by the Austrian pianist Paul Wittgenstein whose right arm had to be amputated following a war injury, the one-movement piano setting seems amazingly complete all the same. The technical realization of this piece is a real challenge for the pianist, but the work fascinates by its intensity, power, sensuality, exoticism and beauty. Besetzung:piano and orchestra

Journal of Cyber Security and Mobility 2-2

Автор: Jain Shweta
Название: Journal of Cyber Security and Mobility 2-2
ISBN: 8792982662 ISBN-13(EAN): 9788792982667
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 5518.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Pedro Chirino entered the Society of Jesus in February 1580 and arrived in the Philippines in June 1590. He was one of the pioneers of the Philippine Jesuit Mission who started and consolidated the Jesuit apostolate in the Philippines. This work is the first history, not just of the Jesuit missions, but also of the Catholic missions in the Philippines, and served as the source for later histories.

Cybersecurity and Privacy: Bridging the Gap

Автор: Samant Khajuria, Lene Sorensen, Knud Erik Skouby
Название: Cybersecurity and Privacy: Bridging the Gap
ISBN: 8793519664 ISBN-13(EAN): 9788793519664
Издательство: Taylor&Francis
Рейтинг:
Цена: 11023.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Addresses the issue of cybersecurity and privacy. Technical topics discussed include cybersecurity; encryption; privacy policy; trust; security and the Internet of Things; Botnets; data risks; cloudbased services; and visualization.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия