Udvidet returret til d. 31. januar 2025

Datavirus, trojanske heste og computerorm

Her finder du spændende bøger om Datavirus, trojanske heste og computerorm. Nedenfor er et flot udvalg af over 46 bøger om emnet. Det er også her du finder emner som Malware.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Allen Wyler
    237,95 kr.

  • af Dmitry Vostokov & Software Diagnostics Services
    1.097,95 kr.

  • af Ramon Adrian Nastase
    157,95 kr.

  • af Andrew Aldred
    202,95 kr.

    DescriptionThis book covers a variety of topics that are of interest now. It features personal poems from a man who was socially isolated before the corona virus and suffers from chronic health problems and mental illness about himself and his situation. It also covers current politics, global warming, sexuality and sex on television, social issues, personalities in politics and the media, current music and TV and more.

  • af Gary Hibberd
    517,95 kr.

    The Art of Cyber Security - A practical guide to winning the war on cyber crimeThis book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry.In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist.Part 2 explores the work of Sun Tzu's The Art of War. The author analyses key sections and reviews them through the lens of cyber security and data protection to derive how his teachings can be used within the cyber security industry. Although Tzu's book on military strategy, tactics and operations was written more than 2,000 years ago, The Art of Cyber Security - A practical guide to winning the war on cyber crime reflects on how relevant Tzu's words are for today's technological era.Receive a different perspective on cyber security, and think differently about the industry and your place within itThis book celebrates the individuals who are striving to protect us in an ever-expanding technological era. Data and technology are so important to our lives, that protecting people who use technology is incredibly important. The professionals working to protect children, adults and corporations have a tough job, and this book celebrates their work while advocating ways for improving cyber security services and fighting cyber crime.This book will challenge your thinking and force you to approach cyber security and data protection from theoretical, philosophical, strategic, tactical and operational perspectives.

  • af Alicia Noors
    317,95 kr.

  • af Craig Mackinder
    182,95 kr.

    There is a threat lurking behind every online interaction that was first recognized nearly three decades ago, but very little has been done to fix it. It's only a matter of time before the unimaginable becomes reality -- life without the Internet. The race is on to get ahead of the danger and protect the Domain Name System (DNS) infrastructure of the Internet before the worst-case scenario ends the Internet as we know it.Based on decades of experience acquired by author Craig MacKinder as an information technology and cybersecurity expert, Cyberdefense: Domain Name Systems as the Next Public Utility is a multi-layered, comprehensive, extensively researched solution to the DNS threat. The way out of this imminent peril begins with securing online data by localizing queries to secure municipal DNS servers nationwide.The DNS is a fundamental and critical part of our global infrastructure, yet most users have no idea what it is, how it works, or how the DNS contributes to the overall stability of the Internet. This book explains the DNS in ways the average reader will easily digest and understand. The menace to Internet security is laid out and then confronted as the pros and cons of the existing partial solutions are explored. Finally, this book delivers an explanation of how local governments will provide universal Internet access to the public as the best mitigation for insecure DNS infrastructure.

  • af Eugene Delgado
    357,95 kr.

    Do you like working using a wireless network since you can carry your computer and work with you everywhere you go?Do you want to keep your precious information and any other critical data on your system safe from a hacker who intends to exploit it maliciously?Do you want to be able to safeguard your system and learn more about the many techniques hackers might use to get access to your computer over your wireless network? Wireless networks have altered how we engage with our systems and technology. We used to rely on a wired service that held us in one spot or moved us from one machine to the next. Today, most electronics, including phones, tablets, and laptops, are mobile and can be used anywhere owing to the ubiquitous wireless network. While this is fantastic news for most people, we must be mindful that there may be certain issues that develop and any weaknesses that a hacker may choose to exploit. This guide will look at some methods we may learn about wireless penetration and how a hacker can get into your system and exploit it frequently without your knowledge. Learning how this kind of intrusion occurs and how we can prevent it as much as possible will simplify us to keep our data secure on our system. Inside this guide, we will cover the following subjects to manage our wireless network and ensure the security of our data: A look at wireless networking and some of the fundamentals to get us started.How to set up our wireless hacking methods and organize all of the gear we'll need.Getting ourselves through all of the many methods of internet encryption.How to make use of a wireless network.What to do in the event of a wireless denial of service attack.Ensure that you have VPNs and firewalls in place to protect your network.A look at some of the fundamentals of cybersecurity and how you may utilize them to keep hackers at bay.How various forms of cyberattacks and malware work.The effects of a cyber-attack and why we must avoid them before they occur.The fundamental actions you must take to scan your network and keep hackers out. And Much More!... While our wireless networks make things simpler and enable us to be more mobile with our own job, they also expose some major weaknesses that hackers love to exploit. When you're ready to learn more about wireless hacking and how to keep your network secure, check out our manual to get started.

  • af Mark Schumacher
    292,95 kr.

    It takes more than one source of study material to prepare for the Security+ exam, but who has time to read through two huge study books? This Study Supplement is the perfect companion to your main study material. This Supplement contains the perfect balance of subject matter and depth to provide you with the additional perspective you need to broaden your experience so you can pass the exam!!!Table of Contents:Social Engineering - 1Malware - 7Security Testing - 15Vulnerability - 17Computer Security - 24Information Security - 39Cloud Computing - 54Electronic Authentication - 67Physical Security - 72Cryptography - 76Computer Network - 83Wireless Security - 98Computer Access Control - 111Public Key Infrastructure - 117Public Key Certificate - 122List of Unix Commands - 128

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.