Privacidad y protección de datos

/ Seguridad informática / Privacidad y protección de datos (157)

Libros Eliminar filtro Eliminar filtro Seguridad informática Eliminar filtro Privacidad y protección de datos Eliminar filtro Quitar filtros
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • How to Keep Your Stuff Safe Online
    Raef Meeuwisse
    Any everyday person can protect themselves from the majority of online cybercrime.  All you have to do is follow some basic security steps, most of which are completely FREE to implement.This short guide is designed to be an easy and quick read that helps you identify and implement basic but highly effective security in a matter of hours.  The main security guidance is covered ...
    Disponible

    7,26 €

  • Learn Social Engineering
    Dr. Erdal Ozkaya / DrErdal Ozkaya
    ...
    Disponible

    61,18 €

  • El sujeto de derecho digital
    Eden van Pelt
    En un mundo cada vez más interconectado, la digitalización no solo redefine nuestras interacciones, sino también nuestra identidad jurídica. Este libro examina cómo el derecho configura, controla y emancipa al sujeto en la era digital, analizando las tensiones entre normatividad y libertad en un entorno dominado por el capitalismo informacional y la vigilancia algorítmica. A tr...
    Disponible

    25,00 €

  • The Domains of Identity
    Kaliya Young
    'The Domains of Identity' defines sixteen coherent yet comprehensive categories of interactions which cause personally identifiable information to be stored in databases. Discussions of identity management are often confusing; enumerating these domains and describing their characteristics clarifies which problems arise and how they can be solved within each domain. ...
    Disponible

    51,96 €

  • The Modern Parent
    Martine Oglethorpe
    If you’re a parent in this digital age, then it’s likely the following rings true for you:You want your kids to feel safe and in control of their digital world.You want them to be able to navigate the risks in that world with confidence.You want them to grow, thrive, connect, create and collaborate despite those risks.You’re also aware that to achieve the above, you need to be ...
    Disponible

    17,52 €

  • Learn Computer Forensics
    William Oettinger
    ...
    Disponible

    52,56 €

  • Digital Forensics with Kali Linux - Second Edition
    Shiva V. N. Parasram
    Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement ...
    Disponible

    52,17 €

  • Metasploit 5.0 for Beginners, Second Edition
    Sagar Rahalkar
    A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey Features Perform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with the latest features and improvements in the Metasploit Framework 5.0 Analyze, find, exploit, and gain acce...
    Disponible

    44,27 €

  • Practical Mobile Forensics - Fourth Edition
    Heather Mahalik / Oleg Skulkin / Rohit Tamma
    ...
    Disponible

    59,35 €

  • Learn Azure Sentinel
    Gary Bushey / Richard Diver
    Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environmentKey FeaturesSecure your network, infrastructure, data, and applications on Microsoft Azure effectivelyIntegrate artificial intelligence, threat analysis, and automation for optimal security solutionsInvestigate possible security breaches and...
    Disponible

    52,86 €

  • Cybersecurity Attacks - Red Team Strategies
    Johann Rehberger
    ...
    Disponible

    60,73 €

  • CODASPY'19
    CODASPY'19
    It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and devel...
    Disponible

    137,99 €

  • Notebook
    Faith V Summers
    Protect yourself against identity theft and account hacking with this discrete and clever password log book!This discrete and handy password journal allows you to keep all your user names and passwords perfectly safe and easily accessible, at the same time. You can even leave this notebook out in plain sight, no one will ever guess what it contains. Get one for your home and an...
    Disponible

    16,47 €

  • CYBERWARFARE
    Larry Bell
    Cyberwarfare: Targeting America, Our Infrastructure, and Our Future identifies and elaborates previous examples and current actions involving American cybersecurity forces, allies and adversaries that pose imminent national and personal security dangers. By “cyber war,” we are generally referring to a foreign (or even domestic) government-level nation-state actions that are int...
    Disponible

    19,75 €

  • ISO/IEC 27701
    Alan Shipman / Steve Watkins
    An ideal primer for anyone implementing a PIMS (privacy information management system) based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001. It has been designed to integrate with ISO 27001 to extend an existing ISMS (information security management system) with additional requirements, enab...
    Disponible

    18,26 €

  • Digital Forensics and Incident Response - Second Edition
    Gerard Johansen
    Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for effective incident response- Explore real-life scenarios that effectively use threat intelligence and modeling techniquesBook ...
    Disponible

    83,41 €

  • Cybersecurity For Beginners
    Yuri A. Bogachev
    If you want to protect yourself and your family from the increasing risk of cyber-attacks, then keep reading.Cybersecurity for Beginners: Discover the Trade’s Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism will be the book you’ll want to read to understand why cybersecurity is so important, and how it’s impacting everyone who uses the Inter...
    Disponible

    9,73 €

  • Hacking For Beginners
    Yuri A. Bogachev
    Do you want to keep your personal data safe from prying eyes?Do you want to look behind the scenes of major attacks and hacking incidents?Do you want to keep your own computer and the network safe from hacking attacks?The world of hacking has often gotten a bad reputation thanks to the individuals who are unscrupulous with the work they do. But there are many ethical hackers ou...
    Disponible

    11,14 €

  • Cybersecurity
    Lester Evans
    If you want to avoid getting hacked, having your information spread and risking financial loss, then keep reading...Do you create tons of accounts you will never again visit?Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?Does your password contain a sequence of numbers, such as “123456”?Do you automatically click all links an...
    Disponible

    21,54 €

  • Darknet Secrets
    Yuri A. Bogachev
    If You Want To Take Back Your Right To Privacy in 2019, Then Keep Reading…Do you want to surf the web anonymously without leaving your tracks?Do you want to protect your data from being misused for manipulative ads?Do you want to keep prying eyes off you and your family’s private data?Over the last decade, the World Wide Web has been evolving from a pioneering experience and in...
    Disponible

    11,16 €

  • Cybersecurity
    Lester Evans
    If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then keep reading...Two manuscripts in one book: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare Ethical Hacking: The Ultim...
    Disponible

    21,05 €

  • Elementary... the Art and Science of Finding Information
    Alan Millington / Mark Monday / Miguel Fernandez
    What you don’t know can hurt you. What you do know can make you successful.The Information Age has given us a soup of useful and not-so-usable facts and fiction. This is your guide to gaining information superiority in the new era. ...
    Disponible

    35,43 €

  • Building an Effective Cybersecurity Program
    Tari Schreider
    When I was writing the first edition of this book, I knew that certain aspects of it would become dated owing to rapid changes in the cybersecurity industry, threat landscape and providers. Two years later I take full measure of all that has evolved in the cybersecurity world. Increasing zero-day attacks, growth of state-sponsored adversaries and consolidation of cybersecurity ...
    Disponible

    114,87 €

  • EU GDPR & EU-U.S. Privacy Shield
    Alan Calder
    Get a clear understanding of the EU GDPR (General Data Protection Regulation) and the EU-U.S. Privacy Shield with this essential pocket guide, which explains: The terms and definitions used within the GDPR and the EU-U.S. Privacy Shield The key requirements of the GDPR How to comply with the Regulation The GDPR unifies data protection across the EU. It applies to every or...
    Disponible

    18,75 €

  • Cybersecurity
    Trust Genics
    Cybersecurity Issues Challenge Literally EveryoneIn today’s connected world, everyone benefits from cybersecurityCyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk.At an individual level, a cybersecurity attack can result in everything from identit...
    Disponible

    15,00 €

  • Algorithms
    Trust Genics
    Discover How Algorithms Shape & Impact Our WorldGrab your chance to own this comprehensive guide by Trustgenics Including Algorithms: An Introduction to The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance Technology, Optimize Habits, Learn Faster & Your Improve Life Algorithms: Discover The Computer Science and Artificial Intelligence Used t...
    Disponible

    14,24 €

  • Cyber Security
    Matt Reyes
    Want to Keep Your Devices and Networks Safe from Cyberattacks with Just a Few Easy Steps? Read on.Technology can seem like a blessing or a curse, depending on the circumstances. Giving us extraordinary capabilities that once weren’t even imaginable, technology can make life better on all fronts.On the flip side, maybe you’ve heard, or even uttered yourself, the frustrating refr...
    Disponible

    14,70 €

  • Cybersecurity Is Everybody's Business
    Craig W. Schober / Scott N. Schober
    Since publication of his first book, Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.There are 30 million small businesses currently ...
    Disponible

    20,04 €

  • The Weaponization of AI and the Internet
    Larry Bell
    ...
    Disponible

    12,16 €


01 02 03 04 05 06