Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Enorm rigdom og magt er i dag koncentreret i nye markeder, hvor overvågning af og forudsigelser om vores adfærd bliver købt og solgt. Shoshana Zuboff betegner fænomenet overvågningskapitalisme og kalder det for en lige så stor omvæltning af den menneskelige tilværelse i dag, som den industrielle revolution var det i det 20. århundrede. Der er tale om en hidtil uset magtkonstellation karakteriseret ved ekstreme koncentrationer af viden uden demokratisk tilsyn – og prisen er vores frihed. Med begrænset modstand fra lovgivning og samfund truer overvågningskapitalismen vores nutid og vil dominere vores fremtid – hvis vi tillader det. Anmeldelser “Læs den – den er fremragende!” ★★★★★★ - Altinget ”Det hidtil mest ambitiøse forsøg på at tegne det store billede og forklare baggrunden for digitaliseringens følger, som vi oplever dem som individer og som samfundsborgere ... En fortsættelse af traditionen fra Adam Smith, Max Weber, Karl Polanyi og – tør man sige det – Karl Marx.” – The Observer ”En tilbundsgående researchet, fængende skrevet fortælling om overvågningskapitalismens opståen og dens skadelige virkninger for vores samfund... – New York Times Book Review ”... alle bør læse denne bog som et digitalt selvforsvar. Med stort klarsyn og moralsk mod demonstrerer Zuboff ikke alene, hvordan vores hjerner støvsuges for data, men også hvordan de ændres undervejs, hurtigt og radikalt.” – Naomi Klein, forfatter til Intet bliver som før og No Logo Om forfatteren Shoshana Zuboff er amerikansk socialpsykolog, filosof og professor emerita på Harvard Business School samt ekspert i den digitale revolution. Hun har udgivet en lang række bøger i spændingsfeltet mellem teknologi, psykologi, filosofi og økonomi, og i 1988 skrev hun The age of the Smart Machine: the Future of Work and Power, som blev et skelsættende hovedværk om computeriseringen af vores arbejde og liv.
Databeskyttelsesforordningen og databeskyttelsesloven med kommentarer beskriver reglerne og praksis vedrørende både forordningen og loven, som samlet set fremadrettet vil udgøre reguleringen af databeskyttelsesretten i Danmark.Lovkommentaren er et praktisk redskab for medarbejdere i den offentlige sektor, private virksomheder, foreninger m.v., som er beskæftiget med aktiviteter, der er omfattet af forordningen og loven, og for advokater, revisorer og andre rådgivere. Bogen indeholder relevant praksis fra Datatilsynet og relevante afgørelser fra bl.a. danske domstole, EU-Domstolen og det nye Europæiske Databeskyttelsesråd.
A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies." And there is an entire industry of "black hat" hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys.In A Hacker's Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyse the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political and legal systems to their advantage, at the expense of everyone else.Once you learn how to notice hacks, you'll start seeing them everywhere-and you'll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you.Unchecked, these hacks threaten to upend our financial markets, weaken our democracy and even affect the way we think. And when artificial intelligence starts thinking like a hacker-at inhuman speed and scale-the results could be catastrophic.But for those who would don the "white hat," we can understand the hacking mindset and rebuild our economic, political and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks and realise a more equitable world.
THE NEW YORK TIMES BESTSELLER As seen on The Joe Rogan Experience!A groundbreaking dive into the role psychedelics have played in the origins of Western civilization, and a real-life quest for the Holy Grail.The most influential religious historian of the twentieth century, Huston Smith, once referred to it as the "best-kept secret" in history. Did the Ancient Greeks use drugs to find God? And did the earliest Christians inherit the same, secret tradition? A profound knowledge of visionary plants, herbs and fungi passed from one generation to the next, ever since the Stone Age?There is zero archaeological evidence for the original Eucharist - the sacred wine said to guarantee life after death for those who drink the blood of Jesus. The Holy Grail and its miraculous contents have never been found. In the absence of any hard data, whatever happened at the Last Supper remains an article of faith for today's 2.5 billion Christians. In an unprecedented search for real answers, The Immortality Key examines the archaic roots of the ritual that is performed every Sunday for nearly one third of the planet. Religion and science converge to paint a radical picture of Christianity's founding event...and, after centuries of debate, to solve history's greatest puzzle once and for all.Before the birth of Jesus, the Ancient Greeks found salvation in their own sacraments. Sacred beverages were routinely consumed as part of the so-called Ancient Mysteries - elaborate rites that led initiates to the brink of death. The best and brightest from Athens and Rome flocked to the spiritual capital of Eleusis, where a holy beer unleashed heavenly visions for two thousand years. Others drank the holy wine of Dionysus to become one with the god. In the 1970s, renegade scholars claimed this beer and wine - the original sacraments of Western civilization - were spiked with mind-altering drugs. In recent years, vindication for the disgraced theory has been quietly mounting in the laboratory. The constantly advancing fields of archaeobotany and archaeochemistry have hinted at the enduring use of hallucinogenic drinks in antiquity. And with a single dose of psilocybin, the psychopharmacologists at Johns Hopkins and NYU are now turning self-proclaimed atheists into instant believers. But the smoking gun remains elusive.If these sacraments survived for thousands of years in our remote prehistory, from the Stone Age to the Ancient Greeks, did they also survive into the age of Jesus? Was the Eucharist of the earliest Christians, in fact, a psychedelic Eucharist?With an unquenchable thirst for evidence, Brian C. Muraresku takes the reader on his twelve-year global hunt for proof. He tours the ruins of Greece with its government archaeologists. He gains access to the hidden collections of the Louvre Museum to show the continuity from pagan to Christian wine. He unravels the Ancient Greek of the New Testament with a Catholic priest. He spelunks into the catacombs under the streets of Rome to decipher the lost symbols of Christianity's oldest monuments. He breaches the secret archives of the Vatican to unearth manuscripts never before translated into English. And with leads from the archaeological chemists at the University of Pennsylvania and the Massachusetts Institute of Technology, he unveils the first scientific data for the ritual use of psychedelic drugs in classical antiquity.The Immortality Key reconstructs the suppressed history of women consecrating a forbidden, drugged Eucharist that was later banned by the Church Fathers. Women who were then targeted as witches during the Inquisition, when Europe's sacred pharmacology largely disappeared. Have the scientists of today resurrected this lost technology? Is Christianity capable of returning to its roots?Featuring a Foreword by Graham Hancock, the New York Times bestselling author of America Before: The Key to Earth's Lost Civilization.
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectivesThis fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference.Covers all exam topics, including how to:Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer componentsInstall, configure, and maintain hard drivesManage input devices and removable mediaSet up, upgrade, and maintain Microsoft WindowsTroubleshoot and fix computer problemsInstall printers and other peripheralsConfigure and secure mobile devices>Connect to the InternetSet up wired and wireless networksProtect your personal computer and your networkImplement virtualization and cloud-based technologiesOnline content includes:Practice exams for 1101 & 1102 with hundreds of questionsOne hour of video training from Mike MeyersTotalSim simulations of performance-based questionsA collection of Mike Meyers' favorite shareware and freeware PC tools and utilities
Databeskyttelse i arbejdsretten – fra jura til praksis indeholder en samlet fremstilling af databeskyttelsesretten med fokus på arbejdsretten.Bogen indeholder både en analyse af de nye databeskyttelsesretlige regler og en lang række praktiske anvisninger på, hvordan reglerne kan håndteres i praksis – i form af paradigmer, vejledninger og forslag til forretningsgange.Bogen giver en præcis, konkret og brugbar gennemgang af de nye regler, uden at læseren skal kaste sig ud i nærmere studier af et meget kompliceret retsområde.Databeskyttelse i arbejdsretten – fra jura til praksis er et praktisk værktøj, der henvender sig til medarbejdere i virksomheder, arbejdsgiver- og lønmodtagerorganisationer, advokater, revisorer og andre rådgivere, der beskæftiger sig med persondataretten.Om forfatterneLine Budtz Pedersen er advokat og sektionschef i TDC Group. Hun har mange års erfaring med compliance og har i de seneste år indgående beskæftiget sig med inkorporeringen af databeskyttelsesforordningen.Peer Schaumburg-Müller er vicedirektør i TDC Group, ekstern lektor på CBS og adjungeret professor på Aalborg Universitet. Han er forfatter og medforfatter til en lang række bøger bl.a. inden for arbejdsret.
Get started with Microsoft Intune and explore its many facets, including task automation with Microsoft GraphKey Features:Create and configure your new mobile device management (MDM) environmentBecome an Intune pro by mastering compliance policies, monitoring techniques, reporting practices, and application deployment proceduresLearn how to manage Windows, Android, iOS, and macOS devices using IntunePurchase of the print or Kindle book includes a free PDF eBookBook Description:Microsoft Intune is a cloud-managed mobile device management (MDM) tool that empowers you to manage your end-user device estate across various platforms. While it is an excellent platform, the initial setup and configuration can be a daunting process, and mistakes made early on can be more challenging to resolve later. This book addresses these issues by guiding you through the end-to-end configuration of an Intune environment, incorporating best practices and utilizing the latest functionalities.In addition to setting up your environment, you'll delve into the Microsoft Graph platform to understand the underlying mechanisms behind the web GUI. This knowledge will enable you to automate a significant portion of your daily tasks using PowerShell.By the end of this book, you'll have established an Intune environment that supports Windows, Apple iOS, Apple macOS, and Android devices. You'll possess the expertise to add new configurations, policies, and applications, tailoring an environment to your specific requirements. Additionally, you'll have the ability to troubleshoot any issues that may arise and package and deploy your company applications. Overall, this book is an excellent resource for anyone who wants to learn how to use Microsoft Intune to manage their organization's end-user devices.What You Will Learn:Set up your Intune tenant and associated platform connectionsCreate and deploy device policies to your organization's devicesFind out how to package and deploy your applicationsExplore different ways to monitor and report on your environmentLeverage PowerShell to automate your daily tasksUnderstand the underlying workings of the Microsoft Graph platform and how it interacts with IntuneWho this book is for:This book is for IT professionals, end-user device administrators, and system administrators looking to transition to cloud-managed devices or enhance their current environment.
Provides 100% coverage of every objective on the 2022 CISM examThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, information risk management, information security program development and management, and information security incident management.CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition features learning objectives, exam tips, practice questions, and in-depth explanations. All questions closely match those on the live test in tone, format, and content. Special design elements throughout provide real-world insight and call out potentially harmful situations. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference.Features complete coverage of all 2022 CISM exam domainsOnline content includes 300 practice questions in the customizable TotalTester(TM) exam engineWritten by a cybersecurity expert, author, and lecturer
Over 700 pages of insight into all things cybersecurityCybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization.* Explore the basics of cybersecurity at home and in business* Learn how to secure your devices, data, and cloud-based assets* Test your security to find holes and vulnerabilities before hackers do* Create a culture of cybersecurity throughout an entire organizationThis For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.
"In this hands-on guidebook, Windows security expert and bug hunter Forshaw distills his knowledge and describes the system in great depth. Readers learn the core components and features of the Microsoft Windows threat-mitigation system with in-depth technical discussions and real-world examples"--
Prepare to pass the ISACA CRISC exam with confidence, gain high-value skills, and propel yourself toward IT risk management masteryKey Features:- Gain end-to-end coverage of all the topics assessed in the ISACA CRISC exam- Apply and embed your learning with the help of practice quizzes and self-assessment questions- Have an in-depth guide handy as you progress in your enterprise IT risk management career- Purchase of the print or Kindle book includes a free PDF eBookBook Description:For beginners and experienced IT risk professionals alike, acing the ISACA CRISC exam is no mean feat, and the application of this advanced skillset in your daily work poses a challenge. The ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is a comprehensive guide to CRISC certification and beyond that'll help you to approach these daunting challenges with its step-by-step coverage of all aspects of the exam content and develop a highly sought-after skillset in the process.This book is divided into six sections, with each section equipped with everything you need to get to grips with the domains covered in the exam. There'll be no surprises on exam day - from GRC to ethical risk management, third-party security concerns to the ins and outs of control design, and IDS/IPS to the SDLC, no stone is left unturned in this book's systematic design covering all the topics so that you can sit for the exam with confidence. What's more, there are chapter-end self-assessment questions for you to test all that you've learned, as well as two book-end practice quizzes to really give you a leg up.By the end of this CRISC exam study guide, you'll not just have what it takes to breeze through the certification process, but will also be equipped with an invaluable resource to accompany you on your career path.What You Will Learn:- Adopt the ISACA mindset and learn to apply it when attempting the CRISC exam- Grasp the three lines of defense model and understand risk capacity- Explore the threat landscape and figure out vulnerability management- Familiarize yourself with the concepts of BIA, RPO, RTO, and more- Get to grips with the four stages of risk response- Manage third-party security risks and secure your systems with ease- Use a full arsenal of InfoSec tools to protect your organization- Test your knowledge with self-assessment questions and practice quizzesWho this book is for:If you are a GRC or a risk management professional with experience in the management of IT audits or in the design, implementation, monitoring, and maintenance of IS controls, or are gearing up to take the CRISC exam, then this CRISC book is for you. Security analysts, penetration testers, SOC analysts, PMs, and other security or management professionals and executives will also benefit from this book.Table of Contents- Governance, Risk, and Compliance- CRISC Practice Areas and the ISACA Mindset- Organizational Governance, Policies, and Risk Management- The Three Lines of Defense and Cybersecurity- Legal Requirements and the Ethics of Risk Management- Risk Management Life Cycle- Threat, Vulnerability, and Risk- Risk Assessment Concepts, Standards, and Frameworks- Business Impact Analysis, and Inherent and Residual Risk- Risk Response and Control Ownership- Third-Party Risk Management- Control Design and Implementation- Log Aggregation, Risk and Control Monitoring, and Reporting(N.B. Please use the Read Sample option to see further chapters)
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems. Practical Data Privacy answers important questions such as: What do privacy regulations like GDPR and CCPA mean for my data workflows and data science use cases? What does "anonymized data" really mean? How do I actually anonymize data? How does federated learning and analysis work? Homomorphic encryption sounds great, but is it ready for use? How do I compare and choose the best privacy-preserving technologies and methods? Are there open-source libraries that can help? How do I ensure that my data science projects are secure by default and private by design? How do I work with governance and infosec teams to implement internal policies appropriately?
An introduction to the Python programming language and its most popular tools for scientists, engineers, students, and anyone who wants to use Python for research, simulations, and collaboration.Doing Science with Python introduces readers to the most popular coding tools for scientific research, such as Anaconda, Spyder, Jupyter Notebooks, and JupyterLab, as well as dozens of important Python libraries for working with data, including NumPy, matplotlib, and pandas. No prior programming experience is required! You'll be guided through setting up a professional coding environment, then get a crash course on programming with Python, and explore the many tools and libraries ideal for working with data, designing visualizations, simulating natural events, and more. In the book's applied projects, you'll use these tools to write programs that perform tasks like counting tree rings, creating an interactive science slideshow, and simulating the foraging patterns of animals.
Ich möchte mit diesem Buch eine natürliche, selbstverständliche Sichtweise auf die sonst den Blicken verborgenen weiblichen Genitalien, im Sanskrit "Yoni" genannt, ermöglichen. Das geschieht mit Hilfe von Fotografien, Fotomontagen sowie kreativer, künstlerischer Einbeziehung von Naturbildern und Malerei.Es soll die Schönheit, Vielfältigkeit und Einzigartigkeit der Yoni gezeigt werden. Wir alle können uns dabei erinnern, dass wir fast alle aus dem Inneren unserer Mutter durch dieses - Tor ins Leben - gekommen sind. Die Großartigkeit der Schöpfung und die Achtung vor dem Wunder LEBEN sind der Hintergrund dieses Buches, welches als Aufklärendes Anschauungsmaterial dienen möchte.
I 2016 blev EU's efterhånden så berømte databeskyttelsesforordning vedtaget. I 2018 fik forordningen virkning i dansk ret, og den regulerer i dag store dele af det digitale samfunds databehandling, suppleret af databeskyttelsesloven.Forordningens vagt og upræcist formulerede regler er i dag præciseret i en række retningslinjer, vejledninger, udtalelser og afgørelser fra Det Europæiske Databeskyttelsesråd og Datatilsynet, ligesom en række domme er afsagt siden 2018. Grundlæggende databeskyttelsesret gennemgår de væsentligste dele af den almindelige databeskyttelsesret under inddragelse af dette, nyere materiale.Gennemgangen er struktureret efter en række temaer:· Databeskyttelsesrettens nyere historik, formål og sigte· Databeskyttelsesrettens retskilder· Databeskyttelsesforordningens og –lovens anvendelsesområder· Databeskyttelsesrettens reguleringsmodel og aktører· De grundlæggende behandlingsprincipper· Kravene om behandlingsgrundlag og hjemmel· De registreredes rettigheder· De databeskyttelsesretlige ansvarlighedsregler· Reglerne om overførsler til tredjelande og internationale organisationer· Tilsyn, håndhævelse og sanktioner Bogen er blevet til på baggrund af et ønske om en opdatering af lærebogsmaterialet i databeskyttelsesret på Juridisk Fakultet, Københavns Universitet. Den er skrevet af lektor, ph.d. Hanne Marie Motzfeldt, der har undervist i faget siden 2019.
PC- og onlinesikkerhed er i stigende grad blevet vigtigt for pc-brugere over hele verden. Der er en lang række trusler, der kan ramme dig, når du er på Internettet. Du har måske hørt om en række former for skadelige programmer, der under ét kaldes for malware, og som kan ramme den intetanende pc- og smartphonebruger. Der kan være tale om: Virus – programmer, der smitter og inficerer ens egen og andre pc’er på netværket. Trojanske heste – programmer, som har en skadelig ladning af malware med sig. Spyware – programmer, der udspionerer din gøren og laden på pc’en, og som f.eks. sender dine indtastede kreditkortoplysninger videre til en bagmand. Keyloggere – programmer der registrerer alt, hvad du taster på tastaturet, og sender det til en bagmand. Zombier – din pc kan blive overtaget af en bagmand og skjult indlemmet i et netværk (botnet) af andre zombie-computere, som sammen angriber hjemmesider eller sender store mængder spam ud i verden. Adware – programmer, der viser reklamer på din pc og på hjemmesider, og som er meget irriterende. Ransomware – du kan blive afkrævet en løsesum for at slippe din pc fri for malware, der krypterer dine filer, så du ikke kan læse dem igen. Du lærer om: Identitetstyveri – pas på ikke at få stjålet dine personlige oplysninger, som kriminelle så kan misbruge. Fupbutikker – lær at spotte falske netbutikker, som sælger kopivarer under dække af at være ægte eller sælger dine kreditkortoplysninger. Digitalt selvforsvar – hvordan sikrer du din anonymitet på nettet? Lær om browseranonymitet og andre værktøjer såsom TOR-netværket, der øger din grad af anonymitet på både pc og smartphone. Dine børns onlinesikkerhed – Windows stiller en række værktøjer til rådighed for forældres styring af deres børns brug af pc’en. Læs også hvordan du sikrer dine børns smartphones og tablets. Adgangskoder – hvordan gør man dem sikre? Hvor mange skal man have? Lær også om farerne ved uopfordret tilsendte e-mails: At der kan følge malware med i en vedhæftet fil (bilag) i en e-mail. At du har vundet millioner i et lotteri, uden at du har deltaget i det. At en person har arvet en millionsum, men har brug for en udlænding (dig) til at overføre pengene til sig – mod betaling af en procentdel af arven. At blive mellemmand (muldyr) med en bankkonto til at modtage penge og sende dem videre for et udenlandsk firma – mod at beholde nogle få procent af beløbet. At dit NemID er midlertidigt suspenderet – indtil du oplyser dit NemID-log-ind og uploader et billede af dit nøglekort. Læs om farerne for og hvordan du sikrer dit NemID og netbank. At din PayPal-konto er blevet kompromitteret, og at du derfor skal bekræfte dit log-ind. At du skal sende din Verified-by-Visa-SMS-kode videre per SMS til en bagmand. At en person, du har fået kontakt med via en dating-hjemmeside, akut har brug for mange penge. Heldigvis kan man med oplysning og uddannelse og de rette sikkerhedsprogrammer gardere sig mod disse farer og færdes ret sikkert på nettet alligevel. Denne bog med mange illustrationer beskriver disse farer indgående og oplyser om, hvilke faresignaler du skal være agtpågivende overfor. Der er sammenligninger af antivirusprogrammer med firewall, så du kan se hvilke programmer, der er gode lige nu. Hvis du skulle være blevet ramt af malware, er der også beskrevet nogle fremgangsmåder, hvormed du kan fjerne den igen. Desuden lærer du om sikkerhedskopiering, så du ikke behøver at miste dine filer, hvis du rammes af ransomware.
Copyright is everywhere. Your smartphone incorporates thousands of items of intellectual property. Someone owns the reproduction rights to photographs of your dining table. At this very moment, battles are raging over copyright in the output of artificial intelligence programs. Not only books but wallpaper, computer programs and cuddly toys are now deemed to be intellectual properties - making copyright a labyrinthine construction of laws covering almost all products of human creativity.Copyright has its roots in eighteenth-century London, where it was first established to limit printers' control of books. Principled arguments against copyright arose from the start and nearly abolished it in the nineteenth century. But a handful of little-noticed changes in the late twentieth century concentrated ownership of immaterial goods into very few hands.Who Owns This Sentence? is an often-humorous and always-enlightening cultural, legal, and global history of the idea that intangible things can be owned, and makes a persuasive case for seeing copyright as an engine of inequality in the twenty-first century.
Secure Coding Practices: Fortifying Applications Against Cyber Threats is a comprehensive guide that explores the importance of secure coding, the fundamentals of cyber threats, common vulnerabilities, best practices in code development, authentication and authorization techniques, code review and testing, security in the software development life cycle, case studies, future trends in secure coding, and more. This book is essential for developers, IT professionals, and anyone interested in safeguarding their applications against cyber threats.
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations powered by blockchain, such as smart contracts, decentralized applications, digital identity, supply chain, voting, and more. Learn how blockchain works, why it matters, and how to use it for various purposes and industries.
A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics.We all keep secrets—from our gym locker codes to our email passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In this fascinating book Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets. Louridas explains just how cryptography works to keep our communications confidential, tracing it back all the way to its ancient roots. Then he follows its long and winding path to where we are today and reads the signs that point to where it may go tomorrow.A few years back, interest in cryptography was restricted to specialists. Today, as we all live our lives attuned to our digital footprint and the privacy issues it entails, it becomes more and more essential to have a basic understanding of cryptography and its applications to everyday life. Starting with classical cryptography, Cryptography takes the reader all the way up to the twenty-first century cryptographic applications that underpin our lives in the digital realm. Along the way, Louridas also explains concepts such as symmetric cryptography, asymmetric cryptography, cryptographic protocols and applications, and finally, quantum and post-Quantum cryptography as well as the links between cryptography and computer security.
"Cybersecurity for Everyone" is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks to preventing malware infections and ransomware attacks, this book equips readers with the knowledge and skills needed to protect themselves and their data in the digital world. Whether you're a tech novice or an experienced user, this book is a must-read for anyone who wants to stay safe online.
Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey Features:Demonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook Description:Online learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What You Will Learn:Measure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is for:If you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.
In today's rapidly advancing digital world, governments face the dual challenge of harnessing technology to enhance security systems while safeguarding sensitive data from cyber threats and privacy breaches. Futuristic e-Governance Security With Deep Learning Applications provides a timely and indispensable solution to these pressing concerns. This comprehensive book takes a global perspective, exploring the integration of intelligent systems with cybersecurity applications to protect deep learning models and ensure the secure functioning of e-governance systems. By delving into cutting-edge techniques and methodologies, this book equips scholars, researchers, and industry experts with the knowledge and tools needed to address the complex security challenges of the digital era. The authors shed light on the current state-of-the-art methods while also addressing future trends and challenges. Topics covered range from skill development and intelligence system tools to deep learning, machine learning, blockchain, IoT, and cloud computing. With its interdisciplinary approach and practical insights, this book serves as an invaluable resource for those seeking to navigate the intricate landscape of e-governance security, leveraging the power of deep learning applications to protect data and ensure the smooth operation of government systems.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.