205 rezultatov
- 
                  
                    
                  
                  
  
  
     Data Power(2021) THATCHER, JIM E.,DALTON, CRAIG M.An introduction to learning how to protect ourselves and organise against Big DataVezava: Mehka35,63 € Data Power(2021) THATCHER, JIM E.,DALTON, CRAIG M.An introduction to learning how to protect ourselves and organise against Big DataVezava: Mehka35,63 €
- 
                  
                    
                  
                  
  
  
     Handbook of Applied Cryptography(1996) MENEZES, ALFRED J. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA),VAN OORSCHOT, PAUL C. (OTTAWA, ONTARIO, CANADA),VANSTONE, SCOTT A. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA)Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatVezava: Trda259,41 € Handbook of Applied Cryptography(1996) MENEZES, ALFRED J. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA),VAN OORSCHOT, PAUL C. (OTTAWA, ONTARIO, CANADA),VANSTONE, SCOTT A. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA)Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatVezava: Trda259,41 €
- 
                  
                    
                  
                  
  
  
     Biometrics(2018) FAIRHURST, MICHAEL (PROFESSOR OF COMPUTER VISION, UNIVERSITY OF KENT)With the rise of digital technologies the need for effective means of identification has grown enormously. Biometrics is the rapidly growing science of identifying individuals through biological characteristics, from iris patterning to voice recognition.Vezava: Mehka14,01 € Biometrics(2018) FAIRHURST, MICHAEL (PROFESSOR OF COMPUTER VISION, UNIVERSITY OF KENT)With the rise of digital technologies the need for effective means of identification has grown enormously. Biometrics is the rapidly growing science of identifying individuals through biological characteristics, from iris patterning to voice recognition.Vezava: Mehka14,01 €
- 
                  
                    
                  
                  
  
  
     Hardware Security(2018) BHUNIA, SWARUP (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA),TEHRANIPOOR, MARK M., PH.D. (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA)Vezava: Mehka127,96 € Hardware Security(2018) BHUNIA, SWARUP (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA),TEHRANIPOOR, MARK M., PH.D. (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA)Vezava: Mehka127,96 €
- 
                  
                    
                  
                  
  
  
     Google Hacking for Penetration Testers(2015) GARDNER, BILL (BILL GARDNER OSCP, I-NET+, SECURITY+, ASST. PROF. AT MARSHALL UNIVERSITY),LONG, JOHNNY (SECURITY RESEARCHER, FOUNDER OF HACKERS FOR CHARITY),BROWN, JUSTIN (INFORMATION SECURITY PROFESSIONAL AT ONE WORLDS LAB)Vezava: Mehka77,10 € Google Hacking for Penetration Testers(2015) GARDNER, BILL (BILL GARDNER OSCP, I-NET+, SECURITY+, ASST. PROF. AT MARSHALL UNIVERSITY),LONG, JOHNNY (SECURITY RESEARCHER, FOUNDER OF HACKERS FOR CHARITY),BROWN, JUSTIN (INFORMATION SECURITY PROFESSIONAL AT ONE WORLDS LAB)Vezava: Mehka77,10 €
- 
                  
                    
                  
                  
  
  
     Internet of Things(2020) SHACKELFORD, SCOTT J. (CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, INDIANA UNIVERSITY BLOOMINGTON)Vezava: Mehka15,41 € Internet of Things(2020) SHACKELFORD, SCOTT J. (CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, INDIANA UNIVERSITY BLOOMINGTON)Vezava: Mehka15,41 €
- 
                  
                    
                  
                  
  
  
     Industry Unbound(2021) WALDMAN, ARI EZRA (NORTHEASTERN UNIVERSITY, BOSTON)Using rich first-hand sources, Waldman provides an unprecedented account of how tech companies undermine privacy law from the inside. Industry Unbound brings together seemingly separate issues–discourse, law, and design–to reveal tech companies' strategieVezava: Trda39,19 € Industry Unbound(2021) WALDMAN, ARI EZRA (NORTHEASTERN UNIVERSITY, BOSTON)Using rich first-hand sources, Waldman provides an unprecedented account of how tech companies undermine privacy law from the inside. Industry Unbound brings together seemingly separate issues–discourse, law, and design–to reveal tech companies' strategieVezava: Trda39,19 €
- 
                  
                    
                  
                  
  
  
     CISM Certified Information Security Manager Study Guide(2022) CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME)Vezava: Mehka64,53 € CISM Certified Information Security Manager Study Guide(2022) CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME)Vezava: Mehka64,53 €
- 
                  
                    
                  
                  
  
  
     Network Security Assessment 3e(2017) MCNAB, CHRISHow secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testingVezava: Mehka56,06 € Network Security Assessment 3e(2017) MCNAB, CHRISHow secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testingVezava: Mehka56,06 €
- 
                  
                    
                  
                  
  
  
     (R)evolution(2020) QUENOY, IRINA DUPresents a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies.Vezava: Trda361,56 € (R)evolution(2020) QUENOY, IRINA DUPresents a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies.Vezava: Trda361,56 €
- 
                  
                    
                  
                  
  
  
     Introduction to Mathematical Cryptography(2014) HOFFSTEIN, JEFFREY,PIPHER, JILL,SILVERMAN, JOSEPH H.An Introduction to Mathematical CryptographyVezava: Trda96,46 € Introduction to Mathematical Cryptography(2014) HOFFSTEIN, JEFFREY,PIPHER, JILL,SILVERMAN, JOSEPH H.An Introduction to Mathematical CryptographyVezava: Trda96,46 €
- 
                  
                    
                  
                  
  
  
     Freedom to Think(2022) ALEGRE, SUSIEThe story of our most fundamental human right - and why it is in grave dangerVezava: Trda33,27 € Freedom to Think(2022) ALEGRE, SUSIEThe story of our most fundamental human right - and why it is in grave dangerVezava: Trda33,27 €
- 
                  
                    
                  
                  
  
  
      
- 
                  
                    
                  
                  
  
  
     Intercept(2016) CORERA, GORDONFrom Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present and futureVezava: Mehka21,02 € Intercept(2016) CORERA, GORDONFrom Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present and futureVezava: Mehka21,02 €
- 
                  
                    
                  
                  
  
  
     Data Protection Officer(2021) JOHNSSEN, FILIP,EDVARDSEN, SOFIAThis practical guide to the DPO role encompasses the key activities you’ll need to manage to succeed as a DPO. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips alsVezava: Mehka35,63 € Data Protection Officer(2021) JOHNSSEN, FILIP,EDVARDSEN, SOFIAThis practical guide to the DPO role encompasses the key activities you’ll need to manage to succeed as a DPO. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips alsVezava: Mehka35,63 €
- 
                  
                    
                  
                  
  
  
     The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future(2021) GEOFFREY CAINVezava: Trda35,64 € The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future(2021) GEOFFREY CAINVezava: Trda35,64 €
 
     
     
     
      




 
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
          





 
              
             
              
             
              
             
              
            