Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Philosophy of Cybersecurity, Olejnik, Lukasz


Варианты приобретения
Цена: 16078.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-18
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Olejnik, Lukasz
Название:  Philosophy of Cybersecurity
ISBN: 9781032527604
Издательство: Taylor&Francis
Классификация:















ISBN-10: 1032527609
Обложка/Формат: Hardback
Страницы: 232
Вес: 0.57 кг.
Дата издания: 18.09.2023
Иллюстрации: 8 line drawings, black and white; 8 illustrations, black and white
Размер: 234 x 156
Читательская аудитория: Tertiary education (us: college)
Рейтинг:
Поставляется из: Европейский союз


Cybersecurity lessons from covid-19

Автор: Slade, Robert
Название: Cybersecurity lessons from covid-19
ISBN: 0367682699 ISBN-13(EAN): 9780367682699
Издательство: Taylor&Francis
Рейтинг:
Цена: 7501.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and structured by the domains of information security, this book looks at what the crisis teaches us about security.

Cybersecurity in humanities and social sciences :

Автор: Hugo Loiseau, Daniel Ventre , Hartmut Aden
Название: Cybersecurity in humanities and social sciences :
ISBN: 1786305399 ISBN-13(EAN): 9781786305398
Издательство: Wiley
Рейтинг:
Цена: 22010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies.

After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential.

It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?

Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications

Автор: Kumar Gautam, Singh Om Prakash, Saini Hemraj
Название: Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications
ISBN: 0367702169 ISBN-13(EAN): 9780367702168
Издательство: Taylor&Francis
Рейтинг:
Цена: 22202.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics.

Developing a Cybersecurity Immune System for Industry 4.0

Автор: by SERGEI PETRENKO
Название: Developing a Cybersecurity Immune System for Industry 4.0
ISBN: 877022188X ISBN-13(EAN): 9788770221887
Издательство: Taylor&Francis
Рейтинг:
Цена: 14851.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author’s research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks.

The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity.

This book contains four chapters:

  • 1. Cyber Immunity Concept of the Industry 4.0;
  • 2. Mathematical Framework for Immune Protection of Industry 4.0;
  • 3. Trends and prospects of the development of Immune Protection of Industry 4.0;
  • 4. From detecting cyber-attacks to self-healing Industry 4.0;
The Ethics of Cybersecurity

Автор: Christen Markus, Gordijn Bert, Loi Michele
Название: The Ethics of Cybersecurity
ISBN: 3030290557 ISBN-13(EAN): 9783030290559
Издательство: Springer
Рейтинг:
Цена: 11878.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues.

Hacking with Kali Linux: A Comprehensive Guide for Beginners to Learn Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing

Автор: Mach Dylan
Название: Hacking with Kali Linux: A Comprehensive Guide for Beginners to Learn Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing
ISBN: 1801792232 ISBN-13(EAN): 9781801792233
Издательство: Неизвестно
Рейтинг:
Цена: 5511.00 р.
Наличие на складе: Нет в наличии.

Описание:

★ 55% OFF for Bookstores! ★ Discounted Retail Price ★

Buy it NOW and let your customers get addicted to this amazing book!

Hacking with Kali Linux: A Comprehensive Guide for Beginners to Learn Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing

Автор: Mach Dylan
Название: Hacking with Kali Linux: A Comprehensive Guide for Beginners to Learn Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing
ISBN: 1801792240 ISBN-13(EAN): 9781801792240
Издательство: Неизвестно
Рейтинг:
Цена: 4683.00 р.
Наличие на складе: Нет в наличии.

Описание:

★ 55% OFF for Bookstores! ★ Discounted Retail Price ★


Buy it NOW and let your customers appreciate this book!

Networking Hacking: 2 Books in 1: Networking for Beginners, Hacking with Kali Linux - Easy Guide to Learn Cybersecurity, Wireless, LTE, Ne

Автор: Mach Dylan
Название: Networking Hacking: 2 Books in 1: Networking for Beginners, Hacking with Kali Linux - Easy Guide to Learn Cybersecurity, Wireless, LTE, Ne
ISBN: 1801792569 ISBN-13(EAN): 9781801792561
Издательство: Неизвестно
Рейтинг:
Цена: 4959.00 р.
Наличие на складе: Нет в наличии.

Описание:

★ 55% OFF for Bookstores! ★ Discounted Retail Price ★


Let your customers get addicted to this amazing book!

Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet

Автор: Snowden John
Название: Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet
ISBN: 1801147396 ISBN-13(EAN): 9781801147392
Издательство: Неизвестно
Рейтинг:
Цена: 3573.00 р.
Наличие на складе: Нет в наличии.

Описание:

Do you know what is hacking? Do you want to learn about cyber security? Are you unaware of mistakes made in cybersecutity?

This book is for you This book teaches cyber security, how to defend themselves and defend against cyber-attacks. This book covers the latest security threats and defense strategies. Cyber security starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What you will learn

  • The importance of hacking.
  • Use cyber security kill chain to understand the attack strategy
  • Common cyber attacks
  • Benefits of cyber security.
  • Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy
  • Identify different types of cyber-attacks, such as SQL injection, malware and social engineering threats such as phishing emails
  • Weigh the pros and cons of popular cybersecurity strategies of the past two decades
  • Implement and then measure the outcome of a cybersecurity strategy
  • Get an in-depth understanding of the security and hacking.
  • Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud
  • Learn demand of cyber security.

This open access book provides an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those problems.

Who this book is for 

For the IT professional venturing into the IT security domain, IT pen testers, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

WHAT ARE YOU WAITING FOR ORDER YOUR COPY NOW......

Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including

Автор: Scripting Alan
Название: Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including
ISBN: 1914105095 ISBN-13(EAN): 9781914105098
Издательство: Неизвестно
Рейтинг:
Цена: 4551.00 р.
Наличие на складе: Нет в наличии.

Описание:

You Are A Few Steps Away From Securing Your Online Transactions And Hacking Your Data Will Be A Thing Of The Past


Do you know that hackers are big threats to your business only and they are ready to damage and destroy you and your data by snooping at everything you are doing without knowing anything?Do you want to give yourself peace of mind, freedom, choice, and security in all your dealings on the internet? Do you want to know how you can protect your server and your data no matter how skillful a hacker can be?


This easy-to-use, step-by-step book goes a step further to show you about different techniques and methods as well as ways hackers can get into your network, steal your data, and cause severe damages to you. No matter what you do online, some bad actors are keeping a close look at you, ready to devour you and your assets.

If you are tired of spinning the wheel about your security online, buy this book. Its approach draws from various ways, guidelines, tips, and examples about how hackers can tap into any form of your vulnerabilities on the internet and steal your data. This book teaches how you can secure yourself from these bad actors so they will never crack into your network. What are the steps to take so you can be safe and secure? This book walks you through the entire process.


Some of the things that this book discusses include:

  • Deep understanding of hacking and hackers
  • Different types of hackers and how they operate
  • The process of hacking
  • How to prepare before hacking (with the detailed process)
  • The five phases of hacking
  • How you can delete tracks in a system and stay anonymous
  • How you can become exposed to the internet
  • The process of installing Kali Linux
  • How you can work with Kali Linux
  • What is a wireless network and how you can scan networks and servers
  • Everything you need to know about WEP cracking and the tools to do the job
  • The best way you can use to install Nmap on Linux
  • How you can understand the risks your system is facing
  • How to know your enemies on the internet and how you can win when you have the right tools
  • Everything you need to know about wireless hacking domination as well as testing methodology and the best tools for the job
  • How you can crack WEP/WPA encryptions
  • What are the hacking techniques?
  • How you can scan and map your network
  • How you can defend against attacks
  • Some facts you need to know about cybersecurity and cyber-attacks
  • What is cryptography, and how does it work?
  • Symmetric and asymmetric encryption
  • Different ways you can use to secure important files online without hacking coming near them not to talk of touching them
  • How you can use VPN to protect internet traffic
  • How you can crack the encryption
  • What are the flaws in web applications and websites

Plus tons of more examples and details.


If you'd like to know new ways hackers manipulate their ways into your server and how you can guard against these attacks, buy this book

If you'd like to know everything about framework attacks and penetration testing measures, buy this book

If you'd like to know simple yet powerful ways to protect your website so it can run smoothly without the fear of perpetrators, buy this book

Not only will this book change your life forever, but it will also change the way you look at online security, hackers, and how you need to stay secure online


Get your copy of this book by clicking the "Buy Now" button

Hacking with Kali Linux: A Comprehensive Beginner`s Guide to Learn Ethical Hacking. Practical Examples to Learn the Basics of Cybersecurity. In

Автор: Itc Academy
Название: Hacking with Kali Linux: A Comprehensive Beginner`s Guide to Learn Ethical Hacking. Practical Examples to Learn the Basics of Cybersecurity. In
ISBN: 1801880441 ISBN-13(EAN): 9781801880442
Издательство: Неизвестно
Рейтинг:
Цена: 5511.00 р.
Наличие на складе: Нет в наличии.

Описание:

Get this book with 55% discount. LAST DAYS


Are you fascinated by the idea of Hacking?

Wouldn't you learn the secrets of ethical hackers?

Wouldn't you learn professional hacking techniques?

If your answer is YES, then this is the perfect book for you


Who is a Hacker?


A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access and are classified according to the intent of their actions.

Hасkіng is thе general tеrm that is uѕеd tо іdеntіfу аttеmрtѕ by persons or uѕеrѕ tо mаkе off with уоur e-mail rесоrdѕ, соmрutеr system, nеtwоrk соnnесtіоnѕ, аnd Internet ѕесurіtу settings.

Put, іt іѕ аn еffоrt by hackers аnd оthеr ѕhаdу individuals to uѕе the Web оr lосаl network tо intrude on уоur PC оr laptop аnd steal уоur іmроrtаnt information.

A computer uѕеr саn bе саllеd a hасkеr if hе or she ѕоmеhоw gеtѕ thе е-mаіl ассоunt password or Fасеbооk ассоunt nаmе оf оthеr individuals аnd uѕеѕ thеm tо ѕtеаl реrѕоnаl іnfоrmаtіоn.

In this guidebook, we are going to take a look at some of the ways that we can learn about wireless penetration, and how a hacker is able to get onto your system and take advantage, often without you having any idea.

In this book, you will learn about


  • The Basic of Cybersecurity
  • How to Install Kali Linux
  • Wireless Network Hacking and how to Scan Network
  • Kali Tools
  • Basic of VPN, TOR and PROXY CHAINS and How to Use them for Security
  • How to Hack a Wireless Network
  • Practical Hacking Examples


Even if you are a complete beginner, this book will act as your guide to enter into the world of ethical hacking and cybersecurity.

Why are you waiting still? Go grab this hell of a hacking book now.


Scroll up and click BUY NOW button


Ethical Hacking and Cybersecurity: A Beginner`s Guide to Understand Cyber Security and Ethical Hacking. Protect Your Business and Your Family from Cyb

Автор: Itc Academy
Название: Ethical Hacking and Cybersecurity: A Beginner`s Guide to Understand Cyber Security and Ethical Hacking. Protect Your Business and Your Family from Cyb
ISBN: 1914346998 ISBN-13(EAN): 9781914346996
Издательство: Неизвестно
Рейтинг:
Цена: 5235.00 р.
Наличие на складе: Нет в наличии.

Описание: ★ Get this book with 55% discount. LAST DAYS ★
Dоеѕ thе word "hacking" ѕсаrе уоu? Do you know if your personal information was stolen from your account? Have you always wanted to learn how to protect your system from such attacks? Do you want to learn the secrets of ethical hackers?
If you answered yes to all these questions, you've come to the right place.

Gеnеrаllу, hасkіng has earned a nеgаtіvе rерutаtіоn аnd hаѕ bесоmе аѕѕосіаtеd with суbеrаttасkѕ аnd breaches іn суbеrѕесurіtу.

But this is not always truе. If this is your fіrѕt bооk on hасkіng, уоu wіll become mоrе acquainted wіth the wоrld оf hасkіng аѕ thіѕ bооk gіvеѕ a simple overview оf ethical hacking.

Thе term "еthісаl hасkеr" еmеrgеd in thе lаtе 1970s whеn thе US government hіrеd expert groups саllеd "red tеаmѕ" tо hack their оwn computer system.

Hасkеrѕ are суbеr-еxреrtѕ who lаwfullу or іllеgаllу hасk. Yоu enter the ѕесurіtу ѕуѕtеm оf a соmрutеr network to rеtrіеvе оr rесоllесt іnfоrmаtіоn.


This book will talk about:


  • WHAT IS ETHICAL HACKING
  • WHO SHOULD I PROTECT MY BUSINESS FROM?
  • SKILLS EVERY HACKER NEEDS
  • DIFFERENT TYPES OF HACKING OVER THE YEARS
  • HACKING RISKS FOR BUSINESSES
  • PROTECTING BUSINESSES FROM CYBERCRIME
  • PROTECTING YOUR FAMILY FROM CYBER ATTACKS
  • SECRET SOCIAL MEDIA HACKS YOU WANT TO TRY NOW
  • ..AND MUCH, MUCH MORE


This book bundle is perfect for beginners, a comprehensive guide that will show you the easy way to overcoming cybersecurity, computer hacking, wireless network and penetration testing.


So if you want to learn more about Cybersecurity and Ethical Hacking, scroll up and click "add to cart"



ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия