Vi bøger
Levering: 1 - 2 hverdage

Dataindbrud og datasvindel

Her finder du spændende bøger om Dataindbrud og datasvindel. Nedenfor er et flot udvalg af over 75 bøger om emnet. Det er også her du finder emner som Hacking.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Petter Gottschalk & Christopher Hamerton
    1.091,95 kr.

  • af Micah Lee
    462,95 kr.

    "Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interface to explore datasets packed with secrets"--

  • af James Adamson & Branden (CISSP and CISM) Williams
    464,95 - 1.222,95 kr.

  • af Susan Reilly, Victoria Owen & Jessica Coates
    1.432,95 kr.

    Information is a critical resource for personal, economic and social development. Libraries and archives are the primary access point to information for individuals and communities with much of the information protected by copyright or licence terms. In this complex legal environment, librarians and information professionals operate at the fulcrum of copyright's balance, ensuring understanding of and compliance with copyright legislation and enabling access to knowledge in the pursuit of research, education and innovation. This book, produced on behalf of the IFLA Copyright and other Legal Matters (CLM) Advisory Committee, provides basic and advanced information about copyright, outlines limitations and exceptions, discusses communicating with users and highlights emerging copyright issues. The chapters note the significance of the topic; describe salient points of the law and legal concepts; present selected comparisons of approaches around the world; highlight opportunities for reform and advocacy; and help libraries and librarians find their way through the copyright maze.

  • af Ulrich Hildebrandt
    4.497,95 kr.

    The bookThis commentary work is a guide to the EU Trade Mark Regulation (EUTMR) in a practical and comprehensive manner. All provisions on the EU trade mark are commentated on in detail, taking into account the case law of the European Court of Justice and domestic courts as EU trade mark courts. Furthermore, the decisions of the General Court, the Boards of Appeal and the first instance practice of the EUIPO.The advantages at a glancedetailed explanations Article-by-Articlepractical focusincluding case-law from various domestic courts acting as EU trade mark courtsThe target groupFor all legal practitioners and scholars in the field of trade marks and IP in general.

  • af Rick (Rick Brown is the Deputy Director of the Australian Institute of Criminology.) Brown
    426,95 - 1.464,95 kr.

  • af Frank Rubin
    515,95 kr.

  • af Mark B.
    418,95 kr.

  • af Geoff White
    125,95 - 307,95 kr.

  • af Software Diagnostics Services & Vostokov Dmitry Vostokov
    1.682,95 kr.

  • af Babak Akhgar, Hamid Jahankhani & Stefan Kendzierskyj
    1.099,95 kr.

  • af Shimon Brathwaite
    414,95 - 842,95 kr.

  • af Mohd Mizan Aslam
    1.464,95 kr.

    Aslam and Gunaratna bring together a broad analysis of the responses of states in Asia to the threats presented by the Covid-19 pandemic in its early phase.

  • af Naomi Gibson
    107,95 kr.

  • af Veronika Fischer
    2.947,95 kr.

  • af Leonhard Kunczik
    767,95 kr.

    This book explores the combination of Reinforcement Learning and Quantum Computing in the light of complex attacker-defender scenarios. Reinforcement Learning has proven its capabilities in different challenging optimization problems and is now an established method in Operations Research. However, complex attacker-defender scenarios have several characteristics that challenge Reinforcement Learning algorithms, requiring enormous computational power to obtain the optimal solution. The upcoming field of Quantum Computing is a promising path for solving computationally complex problems. Therefore, this work explores a hybrid quantum approach to policy gradient methods in Reinforcement Learning. It proposes a novel quantum REINFORCE algorithm that enhances its classical counterpart by Quantum Variational Circuits. The new algorithm is compared to classical algorithms regarding the convergence speed and memory usage on several attacker-defender scenarios with increasing complexity. In addition, to study its applicability on today's NISQ hardware, the algorithm is evaluated on IBM's quantum computers, which is accompanied by an in-depth analysis of the advantages of Quantum Reinforcement Learning.

  • af James Stevenson
    267,95 kr.

    Learn how to pen-test, reverse engineer, and review iOS and Android devices and applications; dive deep into evaluating mobile apps and operating systems, and better defend your organization against the onslaught of mobile device attacks.

  • - Exclusivity vs. Other Approaches
    af Silke von Lewinski
    1.432,95 kr.

    Royalty payments are once again becoming a hot button issue for authors and artists, as well as other holders of copyright or related rights, because they fail to receive adequate compensation for the use of their work on the internet. This volume from the 2015 ALAI Congress contributes to the international discussion of this issue by examining the causes of the problem and possible solutions, including a set of business models to compensate for internet usage. The volume contains mainly English as well as French and Spanish contributions.

  • af Yuliya Zabyelina
    1.587,95 kr.

    This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or infilltrate legitimate businesses, and sheds light on the important role the private sector can play to fight back.

  • af Richard Hill, Hamid Jahankhani, Reza Montasari & mfl.
    1.319,95 kr.

  • af Alicia Noors
    227,95 kr.

  • af Brian Innes
    195,95 kr.

    Fakes, Scams and Forgeries details many of the most notorious acts of forgery, fraud and fakery that have taken place over the centuries, describing how they were perpetrated, how those who considered themselves experts were led astray and fooled, and how--often after many years--they were detected. As well as providing entertaining and in-depth profiles of famous forgers and legendary frauds, the text deals with the many modern scientific techniques that have been developed for the examination of suspect materials.

  • - ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers
    af Tomas Sander
    454,95 kr.

    The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.

  • - 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings
    af Herbert Leitold
    454,95 kr.

    Duringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious tra?c, we see more and more people losing their co- dence in information technologies as they get signi?cantly concernedabout their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto network and information security, most of which are underlined by the same principle: there is much more room for improvement and research. Along the lines of encouraging and catalyzing research in the area of c- munications and multimedia security, it is our great pleasure to present the proceedings of the 10th IFIP TC-6 TC-11 Conference on Communications and MultimediaSecurity(CMS2006),whichwasheldinHeraklion,CreteonOctober 19-21, 2006. Continuing the tradition of previous CMS conferences, we sought a balanced program containing presentations on various aspects of secure c- munication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 76 submissions, from which 22 were selected for presentation as full papers.

  • - ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
    af Joan Feigenbaum
    454,95 kr.

     This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates.

  • - Technologies, Issues, Challenges and Systems
    af Reihaneh Safavi-Naini
    454,95 kr.

    The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS - pronounced 'dramatics'), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongong and in cooperation with the International Association of Cryptologic Research (IACR) and IEEE Computer Society's Task Force on Information Assurance. DRMTICS isan internationalconferenceseriesthat coversthe areaof digital rights management, including research advancements of an applied and theor- ical nature. The goal is to have a broad coverage of the ?eld and related issues and subjects as the area evolves. Since the Internet and the computing infr- tructure has turned into a marketplace for content where information goods of various kinds are exchanged, this area is expected to grow and be part of the ongoing evolution of the information society. The DRM area is a unique blend of many diverse disciplines that include mathematics and cryptography, legal and social aspects, signal processing and watermarking, game theory, infor- tion theory, software and systems design and business analysis, and DRMTICS attempts to cover as much ground as possible, and to cover new results that will further spur new investigations on the foundations and practices of DRM. We hope that this ?rst conference marks the beginning of a fruitful and useful series of future conferences. This year, the conference received 57 submissions out of which 26 were - cepted for presentation after a rigorous refereeing process.

  • af Karl-Nikolaus Pfeifer
    5.012,95 kr.

    Das Werk kommentiert umfassend das gesamte UWG. Die dritte Auflage berücksichtigt das 2. UWG-Änderungsgesetz, das 2016 zentrale Vorschriften des UWG geändert hat. Bereits enthalten sind zudem alle Neuerungen durch das Gesetz zur Stärkung des fairen Wettbewerbs vom 10.9.2020, das umfangreiche Änderungen der §§ 8, 12-15 UWG vorsieht. Der Titel ist online im juris PartnerModul Gewerblicher Rechtsschutz/Urheberrecht.

  • af Ben Ockrent
    87,95 kr.

    Englische Literatur in der Reihe »Fremdsprachentexte Reclam XL - Text und Kontext«: Das ist der englische Originaltext, ungekürzt und unbearbeitet, mit überwiegend einsprachigen Worterläuterungen sowie Zusatzmaterial auf Englisch im Anhang.Die »Hacktivists« sind eine jugendliche Computer-AG, die an ihrer Schule weitgehend sich selbst überlassen ist. Ungeachtet ihres großspurigen Namens begnügen sich die Hacktivists mit harmlosen technischen Spielereien im PC-Labor - bis eine neue Schülerin hinzukommt. Beth fordert die Teenager sehr schnell dazu heraus, Mitschüler digital bloßzustellen und sich auf kriminelle Experimente einzulassen. Damit untergräbt sie auch die Autorität des bisherigen Anführers der Gruppe. Die Jugendlichen müssen sich bald zwischen Gut und Böse entscheiden - wollen sie echte Hacker werden?Ein actionreiches Theaterstück, das ausdrücklich für Schülerinnen und Schüler der Mittelstufe geschrieben wurde.Englische Lektüre: Niveau B2 (GER)Die Ausgabe im XL-Format (11,4 x 17 cm) verfügt über ein größeres Schriftbild und bietet mehr Platz für Randnotizen.

  • af Frédéric Döhl
    397,95 kr.

    Die Digitalisierung, insbesondere das Internet rund um Tauschbörsen, Videokanäle und Streamingportale, aber auch z.B. die extreme Reduzierung von Produktions- und Distributionskosten für Tonaufnahmen haben in vielen Bereichen des Musiklebens einen substantiellen Strukturwandel ausgelöst, aber auch allerlei saisonale Aufgeregtheiten provoziert. Ein Hauptkampfplatz auch des öffentlichen Diskurses ist dabei die Aneignung von Musik Dritter, von Sound Sampling bis Filesharing. Kreative Aneignungsstrategien finden sich, als »illegal« gebrandmarkt, allenthalben unter gesteigertem Rechtfertigungsdruck. Dabei gilt ungebrochen die Diagnose von Carl Dahlhaus: »Die Formel, daß Musik über Musik gemacht werde, drückt nicht eine Ausnahme, sondern die Regel aus.« Mittels exemplarischer Fallstudien von Klassik und Avantgarde bis Jazz und Pop beleuchtet der vorliegende Band, wie sich Kreativität in Gegenwartsmusik aus zweiter Hand manifestiert.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.