Government Privacy Threats
444円 This Weekly Digest of posts from the Workers' Edge blog highlights the dangers posed by unfettered surveillance activities conducted by law enforcement and agencies at the local, state, and federal level. Topic include the return of the general warrant for phone searches, the dismantling of the '...
Datenschutz
3,179円 Dieses Lehrbuch behandelt schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewährleistung von Anonymität im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen Überblick über gängige Verfah...
International Conflicts in Cyberspace - B...
300円 Conflict in cyberspace is not a new phenomenon, but the legality of hostile cyber activity at a state level remains imperfectly defined. While the United States and its allies are in general agreement on the legal status of conflict in cyberspace, China, Russia, and a number of like-minded nation...
Hackercool Mar 2017
752円 Here's what you will find in the Hackercool March 2017 Issue . Real Time Hacking Scenario - Hacking my friends (Cont'd) : In the last issue, we have seen how hackers bypass antivirus and hack their victims. In this issue we will learn about privilege escalation. Not Just Another Tool : Everyb...
Russian Cyber Attack - Grizzly Steppe Rep...
300円 Cyber attacks are a real threat to our country. This report presents the opposed views of USA and Russia on cyber security and gives insight into the activities of the Russian civilian and military intelligence Services (RIS) conducted during the 2016 U.S. presidential election campaign. The Griz...
IT Security Concepts
436円 I wanted to pose an interesting philosophical question namely why is information security necessary. Information technology (IT) offers many career paths and information security is one of the fastest-growing tracks for IT professionals. PC security, otherwise called digital security or IT securi...
Android Security Cookbook
3,946円 Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to ...
Move Fast and Break Things
1,957円 A Financial Times 'Best Thing I Read This Year' LONGLISTED FOR THE FT & MCKINSEY BUSINESS BOOK OF THE YEAR AWARD Google. Amazon. Facebook. The modern world is defined by vast digital monopolies turning ever-larger profits. Those of us who consume the content that feeds them are farmed for the pur...
Kali Linux Intrusion and Exploitation Coo...
5,638円 Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments About This Book Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits Improve your testing efficiency with the use of automated...
Securing Communication of Legacy Applicat...
750円 Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make nece...
Mr. Robot and Philosophy
2,647円 Philosophers shine a light on the dark world of the hacker underground, corporate cybersecurity, and injustice in contemporary capitalist society as portrayed in the popular pessimistic techno-thriller, Mr. Robot.
Metasploit Bootcamp
5,638円 Master the art of penetration testing with Metasploit Framework in 7 days About This Book A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days Carry out penetration testing in complex and highly-secured environments. Learn techniques to Integrate Metasploit...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!