комп'ютерна безпека

  1. G

    Придбаний Книга IAPP CIPP \u002F US Certified Information Privacy Professional Study Guide (Джо Шеллі)

    Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the current CIPP exam for 2024-2025! Information privacy has become a critical and central concern for small and large...
  2. G

    Придбаний Книга Cyber Security Management and Strategic Intelligence (Пітер Трім)

    Within the organization, the cyber security manager fulfils an important and policy-oriented role. Working alongside the risk manager, the Information Technology (IT) manager, the security manager and others, the cyber security manager’s role is to ensure that intelligence and security manifest...
  3. G

    Придбаний Книга Space Piracy: Preparing for a Criminal Crisis in Orbit (Г'ю Тейлор)

    Comprehensive exploration of humanity's potential for criminal activities in outer space Space Piracy: Preparing for a Criminal Crisis in Orbit is a forward-thinking resource that considers, analyzes, and provides solutions to the influence of the ignoble side of humanity in the realm of outer...
  4. G

    Придбаний Книга Practical Lock Picking: A Physical Penetration Tester's Training Guide (Девіант Оллам)

    Learn how to pick simple and complex locks alike with full-color illustrations and the best teacher around -- Deviant Ollam! Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming...
  5. G

    Придбаний Книга Cyber Security Foundations: Fundamentals, Technology and Society (Гвідо Шмітц)

    Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to understand the cyber security landscape. It is a key textbook for postgraduate and undergraduate students taking modules related to cyber security and information security, as...
  6. G

    Придбаний Книга Code Dependent. How AI Is Changing Our Lives (Мадхуміта Мургія)

    A riveting and revealing exploration of the world created by computer algorithms and its impact on individuals, from the workers across the globe who feed artificial intelligence systems with data to the impact of algorithms on our own behaviour, as consumers and citizens. Shortlisted for the...
  7. G

    Придбаний Книга Інформаційна безпека у контексті сучасних технологій інформаційно-психологічного протиборства (Валентин Петрик)

    У навчальному посібнику розкриваються сутність інформаційної безпеки, сучасні технології та практика їх застосування у проведенні інформаційних війн, спеціальних інформаційних операцій і акцій інформаційного впливу проти України. Приведено багато прикладів щодо проявів інформаційної агресії...
  8. G

    Придбаний Книга 100 Top Tips - Stay Safe Online and Protect Your Privacy (Нік Вандом)

    100 Top Tips - Stay Safe Online and Protect Your Privacy contains tips covering all aspects of staying as safe as possible in the online world. These include: Detailing the types of threats that are out there Ensuring that passwords for all of your devices are as secure as possible Identifying...
  9. G

    Придбаний Книга Medical Device Cybersecurity for Engineers and Manufacturers, Second Edition (Аксель Вірт)

    Medical Device Cybersecurity for Engineers and Manufacturers, Second Edition removes the mystery from cybersecurity engineering and regulatory processes and practices, showing medical device manufacturers how to produce and maintain devices that meet evolving regulatory expectations and reduce...
  10. G

    Придбаний Книга The Art of Mac Malware, Volume 2: Detecting Malicious Software (Патрік Вордл)

    Macs have become a popular target of cyber-criminals, and there are few effective defences against these pernicious threats - until now. The second volume of The Art of Mac Malware is the first book to cover state-of-the-art programming techniques and security tools for detecting and countering...
  11. G

    Придбаний Книга From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 3) (Аль Марчелла)

    In Book 3, fifth and sixth graders are maturing, becoming more independent, and online activities are second nature. From Street‑smart to Web‑wise®: A Cyber Safety Training Manual Built for Teachers and Designed for Children isn’t just another book — it’s a passionate call to action for...
  12. G

    Придбаний Книга Differential Privacy (Сімсон Л. Гарфінкель)

    A robust yet accessible introduction to the idea, history, and key applications of differential privacy the gold standard of algorithmic privacy protection. Differential privacy (DP) is an increasingly popular, though controversial, approach to protecting personal data. DP protects confidential...
  13. G

    Придбаний Книга Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture (Гері Арчер)

    Формат: Скан PDf https://www.yakaboo.ua/ua/cloud-native-data-security-with-oauth-a-scalable-zero-trust-architecture.html
  14. G

    Придбаний Книга Cryptography (Панос Лурідас)

    A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics. We all keep secrets—from our gym locker codes to our email passwords to our online interactions. And we choose to share those secrets only...
  15. G

    Придбаний Книга The Other Miss Jones: A twisty, gripping psych thriller that you won't be able to put down (Софі Флінн)

    Two women. One name. A terrifying, deadly secret. She shares your name. It’s how you meet the other Sally Jones, sparking an unusual friendship that you grow to trust, especially when your dad dies and your dream job is in danger. So when she disappears suddenly, you are worried she may be in...
  16. G

    Придбаний Книга Як не стати овочем (Оксана Мороз)

    Книга є частиною соціального проекту з навчання 440 000 українських вчителів інформаційній гігієні. 10 грн від продажу кожної книги йдуть на забезпечення нею кожного українського вчителя. Як часто вам здається, що вас дурять в інтернеті? Або ви усвідомлюєте, що це маніпуляція чи шахрайство...
  17. G

    Придбаний Електронна книга Кібербезпека та ризики цифрової трансформації компаній (Юрій Когут)

    Практичний посібник підготовлено експертом з більш ніж 20-ти річним практичним досвідом в сфері кібербезпеки та корпоративної безпеки бізнесу, та є першим українським виданням, в якому акумульовані теоретичні знання та практичний досвід, системно розкриті питання та технології забезпечення...
  18. G

    Придбаний Електронна книга Кібервійни, кібертероризм, кіберзлочинність (концепції, стратегії, технології). Практичний посібник (Юрій Когут)

    У книзі розкриті питання щодо основних концепцій, технологій та стратегій здійснюваних зараз у світі кібервійн, асиметричних, гібридних, мере-жевоцентричних (мережевих), інформаційних війн, засад теорії проведення спеціальних інформаційних операцій, проблем та перспектив застосування кіберзброї...
  19. G

    Придбаний Електронна книга Технології блокчейн та криптовалюта. Ризики та кібербезпека (Юрій Когут)

    В книзі розкриваються питання щодо теоретичних засад обігу криптовалю-ти, історії та особливостей становлення криптовалюти як грошового сурогату та віртуальної валюти, особливостей криптовалютних правовідносин, правового статусу та державного регулювання ринку віртуальних активів та обігу...
  20. G

    Придбаний Електронна книга Межі соцмережі. Медіаграмотність для дітей (Олена Хобта)

    Усі мешканці нашої планети живуть у світі інформації. Раніше ми отримували її з газет та журналів, а зараз — із соціальних мереж. Ми споживаємо інформацію та навіть створюємо її там. Що приховує цей цікавий однак небезпечний світ соціальних мереж? Як відрізнити правду від фейку? Як упоратися...
  21. G

    Придбаний Електронна книга Cyber Warfare And Security Ensuring For Critical Infrastructure Facilities (Юрій Когут)

    This book is a kind of discussion and analysis of developing a national security system and the technologies for ensuring the stability of critical infrastructure in the face of rapidly growing cyber risks and a new phenomenon today: the transnational nature of international terrorism in...
  22. G

    Придбаний Електронна книга Artificial intelligence and security (Юрій Когут)

    The book is devoted to the actual vectors and problems of the development of artificial intelligence as a security tool and intellectual weapon of the future. The book also sets out practical developments on the potential, current trends and prospects for integrating artificial intelligence into...
  23. G

    Придбаний Книга Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English (Денні Черрі)

    Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to...
  24. G

    Придбаний Книга Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations (Ніранджан Редді)

    Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for...
  25. G

    Придбаний Книга Ethical Hacking and Penetration Testing Guide (Рафай Балох)

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day...
  26. G

    Придбаний Книга Managing the Human Factor in Information Security: How to win over staff and influence business managers (Девід Лейсі)

    With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years'...
  27. G

    Придбаний Книга SSCP Systems Security Certified Practitioner Practice Exams (Нік Мітропулос)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Hundreds of accurate practice questions and in-depth answer explanations to use in preparation for the...
  28. G

    Придбаний Книга Advanced Cybersecurity Technologies (Ральф Мозлі)

    Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides...
  29. G

    Придбаний Книга Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks (Девіант Оллам)

    Learn intensive key-based attacks against physical locks from the master -- Deviant Ollam Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack...
  30. G

    Придбаний Книга Computer Security (Дітер Голлманн)

    Completely updated and up-to-the-minute textbook for courses on computer science. The third edition has been completely revised to include new advances in software and technology over the last few years. Provides sections on Windows NT, CORBA and Java which are not examined in comparable...
  31. G

    Придбаний Книга Practical Cryptology and Web Security (П. К. Юень)

    A hands-on, comprehensive guide, which gives students a practical insight into all aspects of web security and cryptography. Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing...
  32. G

    Придбаний Книга Information Security Policies, Procedures, and Standards: A Practitioner's Reference (Дуглас Дж. Лендолл)

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the...
  33. G

    Придбаний Книга Pseudorandomness and Cryptographic Applications (Майкл Лубі)

    A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that...
  34. G

    Придбаний Книга The CISO’s Transformation: Security Leadership in a High Threat Landscape (Радж Бадвар)

    The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge...
  35. G

    Придбаний Книга Enterprise Security Architecture: A Business-Driven Approach (Ніколас Шервуд)

    Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a framework for developing and...
  36. G

    Придбаний Книга Blockchain Systems and Communication Networks: From Concepts to Implementation (Мубашир Хусейн Рехмані)

    This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks. It covers blockchain applications, algorithms, architectures, design and implementation, and security and...
  37. G

    Придбаний Книга The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms (Радж Бадвар)

    This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this...
  38. G

    Придбаний Книга Hands-on Incident Response and Digital Forensics (Майк Шевард)

    Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and...
  39. G

    Придбаний Книга Exam Ref MS-500 Microsoft 365 Security Administration (Ед Фішер)

    Prepare for Microsoft Exam MS-500: Demonstrate your real-world knowledge of Microsoft 365 security implementation and administration, including identity, access, threat and information protection, governance, and compliance. Designed for professionals with Microsoft security experience, this...
  40. G

    Придбаний Книга The Zero Trust Framework and Privileged Access Management (PAM) (Равіндра Дас)

    This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at...
  41. G

    Придбаний Книга How to Catch a Phish: A Practical Guide to Detecting Phishing Emails (Ніколас Олес)

    Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization...
  42. G

    Придбаний Книга Absolute Essentials of Ethereum (Пол Ділан-Енніс)

    Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications. Written by an experienced educator, each chapter is designed to progress...
  43. G

    Придбаний Книга Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp (Ітан Коуен)

    Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization...
  44. G

    Придбаний Книга The Foundations of EU Data Protection Law (Орла Лінскі)

    Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions...
  45. G

    Придбаний Книга Guide to Network Defense and Countermeasures (Доун Вівер)

    GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis...
  46. G

    Придбаний Книга Zero Trust Networks (Даг Барт)

    Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a...
  47. G

    Придбаний Книга Cybersecurity (Дуейн К. Вілсон)

    An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics. It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber...
  48. G

    Придбаний Книга Hands-On Smart Contract Development with Solidity and Ethereum: From Fundamentals to Deployment (Девід Г. Гувер)

    Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform. You’ll get up to...
  49. G

    Придбаний Книга What Do We Know and What Should We Do About Internet Privacy? (Пол Бернал)

    Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the...
  50. G

    Придбаний Книга Application Architecture Patterns for Web 3.0: Design Patterns and Use Cases for Modern and Secure Web3 Applications (Стефано Темпеста)

    Over the past three years, the landscape of blockchain technology has undergone remarkable transformation, extending far beyond its association with cryptocurrencies especially with the emergence of Web3 applications. Web 3.0 is built using artificial intelligence, machine learning, and the...
  51. G

    Придбаний Книга Public Key Cryptosystems (Есра Бас)

    This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the...
  52. G

    Придбаний Книга Empowered or Left Behind: Use of Technology During COVID-19 (ДіДі М. Беннетт Гейл)

    Focused on the United States, this book summarizes the secondary impacts of COVID-19 due to the increased use of technology. Establishing the global response of social distancing, mandates for non-essential business, and working from home, the book centers on the disparate guidance provided...
  53. G

    Придбаний Книга Information Security Management Principles (Аманда Фінч)

    In today’s technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. Written in an...
  54. G

    Придбаний Книга The Closing of the Auditor’s Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Modern Auditing (Девід Дж. О'Ріган)

    In The Closing of the Auditor’s Mind?, author David J. O’Regan describes internal auditing as an important "binding agent" of social cohesion, for the accountability of individuals and organizations and also at aggregated levels of social trust. However, O’Regan also reveals that internal...
  55. G

    Придбаний Книга Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting (Рафай Балох)

    In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This book, penned by an expert in the field...
  56. G

    Придбаний Книга A Reference Manual for Data Privacy Laws and Cyber Frameworks (Равіндра Дас)

    As the world is becoming more digital and entwined together, the cybersecurity threat landscape has no doubt become a daunting one. For example, typical threat variants of the past, especially those of phishing, have now become much more sophisticated and covert in nature. A lot of this has been...
  57. G

    Придбаний Книга Cybersecurity and Cyberwar: What Everyone Needs to Know® (Аллан Фрідман)

    Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American...
  58. G

    Придбаний Книга Leadership Fundamentals for Cybersecurity in Public Policy and Administration: Lessons for the Global South (Донавон Джонсон)

    In an increasingly interconnected and digital world, this book provides comprehensive guidance on cybersecurity leadership specifically tailored to the context of public policy and administration in the Global South. Author Donavon Johnson examines a number of important themes, including the key...
  59. G

    Придбаний Книга Generative AI: Phishing and Cybersecurity Metrics (Равіндра Дас)

    The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For...
  60. G

    Придбаний Книга Generative AI and Digital Forensics (Равіндра Дас)

    In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at...
  61. G

    Придбаний Книга Generative AI and Cyberbullying (Равіндра Дас)

    Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly. For example, not only is the near-99% remote workforce now a reality, but businesses today are taking incident response and disaster recovery much more seriously these days as well. But another area that...
  62. G

    Придбаний Книга Real-World Bug Hunting: A Field Guide to Web Hacking (Пітер Яворські)

    Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter...
  63. G

    Придбаний Книга Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence and Machine Learning (Діпак Бхатта)

    Remove your doubts about AI and explore how this technology can be future-proofed using blockchain's smart contracts and tamper-evident ledgers. With this practical book, system architects, software engineers, and systems solution specialists will learn how enterprise blockchain provides...
  64. G

    Придбаний Книга Situational Privacy and Self-Disclosure: Communication Processes in Online Environments (Філіпп К. Мазур)

    Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people’s privacy perceptions and behaviors, a situational perspective needs to be adopted. To this end, the book is divided into three parts. Part I advances the...
  65. G

    Придбаний Книга Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Денніс Андрісс)

    Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way. Practical Binary Analysis is the first book of its kind to...
  66. G

    Придбаний Книга Privacy Engineering (Нішант Бхаджарія)

    PrivacyEngineering is a hands-on guide to building a modern and flexible privacy program for your organization. It helps map essential legal requirements into practical engineering techniques that you can implement right away. The book develops your strategic understanding of data governance and...
  67. G

    Придбаний Книга Privacy-Preserving Machine Learning (Ді Чжуан)

    Privacy-Preserving Machine Learning is a practical guide to keeping ML data anonymous and secure. You'll learn the core principles behind different privacy preservation technologies, and how to put theory into practice for your own machine learning. Complex privacy-enhancing technologies are...
  68. G

    Придбаний Книга Data Analytics for Internal Auditors (Річард Е. Каскаріно)

    There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary...
  69. G

    Придбаний Книга Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (OccupyTheWeb)

    This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. Many aspiring...
  70. G

    Придбаний Книга Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations (Морей Дж. Хабер)

    See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors...
  71. G

    Придбаний Книга Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program (Шон Лайонс)

    This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s...
  72. G

    Придбаний Книга Hacking the Hacker: Learn From the Experts Who Take Down Hackers (Роджер А. Граймс)

    Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's...
  73. G

    Придбаний Книга Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto (Роджер А. Граймс)

    Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized...
  74. G

    Придбаний Книга Blockchain for Real World Applications (Рішабх Гарг)

    Blockchain for Real World Applications A comprehensive examination of blockchain architecture and its key characteristics Blockchain architecture is a way of recording data such that it cannot be altered or falsified. Data is recorded in a kind of digital ledger called a blockchain, copies of...
  75. G

    Придбаний Книга Data Governance Success: Growing and Sustaining Data Governance (Рупа Маханті)

    While good data is an enterprise asset, bad data is an enterprise liability. Data governance enables you to effectively and proactively manage data assets throughout the enterprise by providing guidance in the form of policies, standards, processes and rules and defining roles and...
  76. G

    Придбаний Книга Ransomware Protection Playbook (Роджер А. Граймс)

    Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran...
  77. G

    Придбаний Книга Secure Communications: Applications and Management (Роджер Дж. Саттон)

    If you need to know more about communication's security management, this is the perfect book for you... Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by...
  78. G

    Придбаний Книга IT Audit, Control, and Security (Роберт Р. Мьоллер)

    When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT...
  79. G

    Придбаний Книга Intelligence-Driven Incident Response: Outwitting the Adversary (Ребекка Браун)

    Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyberthreat intelligence mindset will you truly understand the value of that...
  80. G

    Придбаний Книга Street Coder (Седат Капаноглу)

    Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make...
  81. G

    Придбаний Книга Cryptographic and Information Security Approaches for Images and Videos (С. Рамакрішнан)

    This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application...
  82. G

    Придбаний Книга Data Governance and Data Management: Contextualizing Data Governance Drivers, Technologies, and Tools (Рупа Маханті)

    This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and...
  83. G

    Придбаний Книга Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications (Санджиб Сінха)

    Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will...
  84. G

    Придбаний Книга Cryptographic and Information Security Approaches for Images and Videos: Approaches for Images and Videos (С. Рамакрішнан)

    This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application...
  85. G

    Придбаний Книга Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit (Сагар Рахалкар)

    Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process...
  86. G

    Придбаний Книга Introduction to Computer and Network Security: Navigating Shades of Gray (Річард Р. Брукс)

    Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical...
  87. G

    Придбаний Книга Professional Windows Desktop and Server Hardening (Роджер А. Граймс)

    Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating...
  88. G

    Придбаний Книга Sarbanes-Oxley Guide for Finance and Information Technology Professionals (Санджай Ананд)

    Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals "Effective SOX programs enlist the entire organization to build and monitor a compliant control environment. However, even the best SOX programs are inefficient at best, ineffective at worst, if there is a lack...
  89. G

    Придбаний Книга Net Privacy: How We Can Be Free in an Age of Surveillance (Саша Моліторіш)

    The internet is unprecedented and ubiquitous. Everyone can watch everyone and be watched back, now or later, again and again. What does this mean for privacy? In our digital world, we are confused by privacy – what is public, what is private? We are also challenged by it, the conditions of...
  90. G

    Придбаний Книга Data Governance and Compliance: Evolving to Our Current High Stakes Environment (Рупа Маханті)

    This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines. Given the continuously evolving and complex regulatory landscape and the growing number...
  91. G

    Придбаний Книга Secure Multiparty Computation and Secret Sharing (Іван Б'єрре Дамгорд)

    This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts. In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource...
  92. G

    Придбаний Книга How to Use Customer Data: Navigating GDPR, DPDI and a Future with Marketing AI (Сачіко Шойнінг)

    Data-driven marketing is a huge aspect of any modern-day marketing plan, but balancing customers' privacy concerns with the latest innovations can be a complex challenge. When done right, data-driven marketing can build customer trust for sustainable long-term value. This is precisely where How...
  93. G

    Придбаний Книга Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing (Роджер А. Граймс)

    Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most...
  94. G

    Придбаний Книга The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting (Марк Моровчинські)

    Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to...
  95. G

    Придбаний Книга Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Скотт Шапіро)

    Hacking, espionage, war and cybercrime as you've never read about them before Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National Committee network, grabbed what it...
  96. G

    Придбаний Книга Memetic War: Online Resistance in Ukraine (Тіне Манк)

    Memetic War analyses memetic warfare included in cyber war and aims to develop a framework for understanding the parameters included in utilising this concept in Ukraine as a part of civic resistance. In the Ukrainian war, an informal defence tactic has developed to uphold the information flow...
  97. G

    Придбаний Книга Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science (Синтія Е. Вінстон-Проктор)

    Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation. Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place...
  98. G

    Придбаний Книга Cyber Warfare: Its Implications on National Security (Санджив Релія)

    Each era brings with it new techniques and methods of waging a war. While military scholars and experts have mastered land, sea, air and space warfare, time has come that they studied the art of cyberwar too. Our neighbours have acquired the capabilities to undertake this new form of asymmetric...
  99. G

    Придбаний Книга The Internet of Things: What Everyone Needs to Know® (Скотт Дж. Шакелфорд)

    The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry...
  100. G

    Придбаний Книга What Do We Know and What Should We Do About Internet Privacy? (Пол Бернал)

    Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the...
  101. G

    Придбаний Книга Radical Reporting: Writing Better Audit, Risk, Compliance, and Information Security Reports (Сара І. Джеймс)

    "If I were giving out an award for 'book of the year' for internal audit professionals, I would certainly award it to her outstanding manuscript: Radical Reporting: Writing Better Audit, Risk, Compliance and Information Security Reports." - Richard Chambers, Former President and CEO, The...
  102. G

    Придбаний Книга The Zero Trust Framework: Threat Hunting & Quantum Mechanics (Равіндра Дас)

    The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology...
  103. G

    Придбаний Книга IT Governance and Information Security: Guides, Standards, and Frameworks (Абделькебір Сахід)

    IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes...
  104. G

    Придбаний Книга Cyber War versus Cyber Realities: Cyber Conflict in the International System (Брендон Валеріано)

    In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of...
  105. G

    Придбаний Книга The Internet of Things: What Everyone Needs to Know® (Скотт Дж. Шакелфорд)

    The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry...
  106. G

    Придбаний Книга Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats (Сара Армстронг-Сміт)

    To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber...
  107. G

    Придбаний Книга Цифрові громадяни. Як виробити здорові диджитал-навички у ваших дітей (Річард Кулатта)

    Коли справа доходить до виховання дітей у цифровому світі, усі батьки почуваються непідготовленими та пригніченими. Ми побоюємося, що наші діти пристрастяться до онлайн-ігор, стануть жертвами кібербулінгу або заблукають у кролячій норі соціальних мереж. Ми попереджаємо їх про все, чого не можна...
  108. G

    Придбаний Книга Межі соцмережі. Медіаграмотність для дітей (Олена Хобта)

    Усі мешканці нашої планети живуть у світі інформації. Раніше ми отримували її з газет та журналів, а зараз — із соціальних мереж. Ми споживаємо інформацію та навіть створюємо її там. Що приховує цей цікавий однак небезпечний світ соціальних мереж? Як відрізнити правду від фейку? Як упоратися...
Угорі