Markedets billigste bøger
Levering: 1 - 2 hverdage

Web

Her finder du spændende bøger om Web. Nedenfor er et flot udvalg af over 9.025 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • - Cybersecurity Advice from the Best Hackers in the World
    af Marcus J. Carey
    186,95 kr.

    Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product.Looking for real-world advice from leading cybersecurity experts? You've found your tribe.Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street.* Get the scoop on the biggest cybersecurity myths and misconceptions about security* Learn what qualities and credentials you need to advance in the cybersecurity field* Uncover which life hacks are worth your while* Understand how social media and the Internet of Things has changed cybersecurity* Discover what it takes to make the move from the corporate world to your own cybersecurity venture* Find your favorite hackers online and continue the conversationTribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world's most noteworthy hackers and influential security specialists.

  • af Sanjay (MD MRCP) Sharma
    498,95 kr.

    The definitive guide for ensuring data privacy and GDPR compliancePrivacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area. The Global Data Protection Regulation (GDPR) imposes complex, elaborate, and stringent requirements for any organization or individuals conducting business in the European Union (EU) and the European Economic Area (EEA)--while also addressing the export of personal data outside of the EU and EEA. This recently-enacted law allows the imposition of fines of up to 5% of global revenue for privacy and data protection violations. Despite the massive potential for steep fines and regulatory penalties, there is a distressing lack of awareness of the GDPR within the business community. A recent survey conducted in the UK suggests that only 40% of firms are even aware of the new law and their responsibilities to maintain compliance.The Data Privacy and GDPR Handbook helps organizations strictly adhere to data privacy laws in the EU, the USA, and governments around the world. This authoritative and comprehensive guide includes the history and foundation of data privacy, the framework for ensuring data privacy across major global jurisdictions, a detailed framework for complying with the GDPR, and perspectives on the future of data collection and privacy practices.* Comply with the latest data privacy regulations in the EU, EEA, US, and others* Avoid hefty fines, damage to your reputation, and losing your customers* Keep pace with the latest privacy policies, guidelines, and legislation* Understand the framework necessary to ensure data privacy today and gain insights on future privacy practicesThe Data Privacy and GDPR Handbook is an indispensable resource for Chief Data Officers, Chief Technology Officers, legal counsel, C-Level Executives, regulators and legislators, data privacy consultants, compliance officers, and audit managers.

  • - How to be Human in the Age of the Machine
    af Hannah Fry
    123,95 kr.

    Hannah Fry is an Associate Professor in the mathematics of cities from University College London. In her day job she uses mathematical models to study patterns in human behaviour, and has worked with governments, police forces, health analysts and supermarkets. Her TED talks have amassed millions of views and she has fronted television documentaries for the BBC and PBS; she also hosts the long-running science podcast, ¿The Curious Cases of Rutherford & Fry¿ with the BBC.

  • - Keep track of usernames, passwords, web addresses in one easy and organized location
    af Editors of Rock Point
    83,95 kr.

    Password security is paramount in today's world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbook is the perfect record for them.

  • - How an Army of Crypto-hackers Is Building the Next Internet with Ethereum
    af Camila Russo
    216,95 kr.

    Written with the verve of such works as The Big Short, The History of the Future, and The Spider Network, here is the fascinating, true story of the rise of Ethereum, the second-biggest digital asset in the world, the growth of cryptocurrency, and the future of the internet as we know it.Everyone has heard of Bitcoin, but few know about the second largest cryptocurrency, Ethereum, which has been heralded as the "next internet."The story of Ethereum begins with Vitalik Buterin, a supremely gifted nineteen-year-old autodidact who saw the promise of blockchain when the technology was in its earliest stages. He convinced a crack group of coders to join him in his quest to make a super-charged, global computer.The Infinite Machine introduces Vitalik's ingenious idea and unfolds Ethereum's chaotic beginnings. It then explores the brilliant innovation and reckless greed the platform-an infinitely adaptable foundation for experimentation and new applications-has unleashed and the consequences that resulted as the frenzy surrounding it grew: increased regulatory scrutiny, incipient Wall Street interest, and the founding team's effort to get the Ethereum platform to scale so it can eventually be accessible to the masses.Financial journalist and cryptocurrency expert Camila Russo details the wild and often hapless adventures of a team of hippy-anarchists, reluctantly led by an ambivalent visionary, and lays out how this new foundation for the internet will spur both transformation and fraud-turning some into millionaires and others into felons-and revolutionize our ideas about money.

  • - PC- og onlinesikkerhed
    af Lars Laursen
    198,95 - 269,95 kr.

    PC- og onlinesikkerhed er i stigende grad blevet vigtigt for pc-brugere over hele verden. Der er en lang række trusler, der kan ramme dig, når du er på Internettet. Du har måske hørt om en række former for skadelige programmer, der under ét kaldes for malware, og som kan ramme den intetanende pc- og smartphonebruger. Der kan være tale om: Virus – programmer, der smitter og inficerer ens egen og andre pc’er på netværket. Trojanske heste – programmer, som har en skadelig ladning af malware med sig. Spyware – programmer, der udspionerer din gøren og laden på pc’en, og som f.eks. sender dine indtastede kreditkortoplysninger videre til en bagmand. Keyloggere – programmer der registrerer alt, hvad du taster på tastaturet, og sender det til en bagmand. Zombier – din pc kan blive overtaget af en bagmand og skjult indlemmet i et netværk (botnet) af andre zombie-computere, som sammen angriber hjemmesider eller sender store mængder spam ud i verden. Adware – programmer, der viser reklamer på din pc og på hjemmesider, og som er meget irriterende. Ransomware – du kan blive afkrævet en løsesum for at slippe din pc fri for malware, der krypterer dine filer, så du ikke kan læse dem igen. Du lærer om: Identitetstyveri – pas på ikke at få stjålet dine personlige oplysninger, som kriminelle så kan misbruge. Fupbutikker – lær at spotte falske netbutikker, som sælger kopivarer under dække af at være ægte eller sælger dine kreditkortoplysninger. Digitalt selvforsvar – hvordan sikrer du din anonymitet på nettet? Lær om browseranonymitet og andre værktøjer såsom TOR-netværket, der øger din grad af anonymitet på både pc og smartphone. Dine børns onlinesikkerhed – Windows stiller en række værktøjer til rådighed for forældres styring af deres børns brug af pc’en. Læs også hvordan du sikrer dine børns smartphones og tablets. Adgangskoder – hvordan gør man dem sikre? Hvor mange skal man have? Lær også om farerne ved uopfordret tilsendte e-mails: At der kan følge malware med i en vedhæftet fil (bilag) i en e-mail. At du har vundet millioner i et lotteri, uden at du har deltaget i det. At en person har arvet en millionsum, men har brug for en udlænding (dig) til at overføre pengene til sig – mod betaling af en procentdel af arven. At blive mellemmand (muldyr) med en bankkonto til at modtage penge og sende dem videre for et udenlandsk firma – mod at beholde nogle få procent af beløbet. At dit NemID er midlertidigt suspenderet – indtil du oplyser dit NemID-log-ind og uploader et billede af dit nøglekort. Læs om farerne for og hvordan du sikrer dit NemID og netbank. At din PayPal-konto er blevet kompromitteret, og at du derfor skal bekræfte dit log-ind. At du skal sende din Verified-by-Visa-SMS-kode videre per SMS til en bagmand. At en person, du har fået kontakt med via en dating-hjemmeside, akut har brug for mange penge. Heldigvis kan man med oplysning og uddannelse og de rette sikkerhedsprogrammer gardere sig mod disse farer og færdes ret sikkert på nettet alligevel. Denne bog med mange illustrationer beskriver disse farer indgående og oplyser om, hvilke faresignaler du skal være agtpågivende overfor. Der er sammenligninger af antivirusprogrammer med firewall, så du kan se hvilke programmer, der er gode lige nu. Hvis du skulle være blevet ramt af malware, er der også beskrevet nogle fremgangsmåder, hvormed du kan fjerne den igen. Desuden lærer du om sikkerhedskopiering, så du ikke behøver at miste dine filer, hvis du rammes af ransomware.

  • af Ulla Dyrløv
    93,95 - 94,95 kr.

    Hvor meget bør mit barn egentlig spille hver dag? Er det problematisk at se youtube i timevis? Og hvordan skal man egentlig opføre sig på de sociale medier?Mange forældre (og bedsteforældre) er bekymrede for deres barns digitale liv og ved ikke helt, hvordan de skal håndtere det - eller for den sags skyld forstå det.Det gør FÅ STYR PÅ DIT BARNS DIGITALE LIV noget ved. I en praktisk og letlæselig bog guider psykolog Ulla Dyrløv forældrene igennem de mange bekymringer og faldgruber, der er, når ens barn har et digitalt liv - hvadenten barnet er fem år gammel eller en ung, selvstændig teenager.Bogen er delt sådan op, at det er nemt at bladre frem til det eller de emner eller aldersgrupper, der optager én lige nu, og hele vejen igennem er den fyldt med lister, opsamlinger og konkrete råd til aftaler og huskeregler.Ulla Dyrløv, der bl.a. er kendt fra DR-programmet "Aldrig for sent", har stor erfaring med børns digitale liv gennem forløb i sin psykologpraksis.Ulla Dyrløv er psykolog og en populær foredragsholder. Hun har skrevet bøgerne "Pilot for dit barn", "Det profesionelle kram" og "Flyvefærdig".rn

  • - Infrastructure security with Red Team and Blue Team tactics
    af Yuri Diogenes & Dr. Erdal Ozkaya
    598,95 kr.

    With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ...

  • af Nadean H. Tanner
    325,95 kr.

    A practical handbook to cybersecurity for both tech and non-tech professionalsAs reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise.Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more.Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions* Straightforward explanations of the theory behind cybersecurity best practices* Designed to be an easily navigated tool for daily use* Includes training appendix on Linux, how to build a virtual lab and glossary of key termsThe Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.

  • - Introduktion til en teknologi, der kan ændre verden
    af Sebastian Merz
    58,95 - 137,95 kr.

    Bloker kæde, mest kendt som rygraden teknologien bag Bitcoin, er en af de hotteste og mest spændende teknologier i øjeblikket på markedet, men hvad er det - og kan det på en måde hjælpe dig? Kort sagt, Blok Chain er den digitale ækvivalent af en bankmand hovedbog, en, journaler og sikrer transaktioner mellem to parter. Indstil til cyberspace, denne form for programmering tillader overførsel af ikke blot data, men af værdi - hvilket gør det til et unikt og grundlæggende byggesten i vores spirende fremtid. "Bloker kæde teknologi" blev oprindeligt udviklet i 2009 for at gøre det muligt for enkeltpersoner og organisationer til at behandle transaktioner uden behov for en centralbank eller en anden mellemmand, ved hjælp af komplekse algoritmer og enighed om at verificere transaktioner. Nu er det blevet vedtaget og ændret af virksomheder og nystartede virksomheder verden over, og er ved at blive nøje gransket af verden Banker som det næste logiske skridt i digital finansiering. Denne bog forklarer Block Kæde i sin helhed; dets historie, anvendelser, potentiale, ulemper og endda sin fremtid. Forståelse denne værdifulde, åbne system er afgørende for at skabe den økonomiske frihed du tørster. Digital valuta er ikke længere en ønskedrøm af kælderen gamer, dens virkelige, er det her, og du har brug for at forstå, hvordan det bevæger sig og er sikret med henblik på at planlægge en fremtid, der vil se en revolution i vores nuværende banksystem.

  • af Marsha Collier
    173,95 kr.

    Enjoy the top social media sites with ease and securityDone correctly, social media is a way to connect friends, family, and the world while still maintaining security and privacy. Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition offers advice on how to enjoy the three most popular social media options while avoiding worry about who sees what you share.Written by social media expert Marsha Collier, this book walks you through establishing accounts, making connections, and sharing content including photos and video. You learn the settings to adjust on each platform to maintain privacy and filter out the content you don't want. This book also explains the subtle art of avoiding or blocking people on social platforms without jeopardizing your real-world relationships!* Take control of what you share* Connect with others* Take and share your best pictures* Use social media as a news sourceSocial media sites are great fun once you learn how to cut through the clutter--and this book shows you how!

  • - Covering HTML5, CSS3, and ES6, Sams Teach Yourself
    af Julie Meloni
    285,95 kr.

    A solid understanding of HTML, CSS, and JavaScript -- and how they work together -- is vital to any kind of contemporary web development. And these core technologies are only growing in importance as contemporary web development moves away from a reliance on proprietary technologies like Flash for rich interface and mobile applications. Teach Yourself HTML, CSS, and JavaScript All in One combines these three fundamental web development technologies into one clearly written, carefully organised, step-by-step tutorial that expertly guides the beginner through these three interconnected technologies. By the end of this book the reader will understand how these technologies work, and more importantly, how they work together to create modern web pages and sites. After completing the book's lessons the reader will be able to confidently create basic but professional-looking interactive web sites. Coverage of the HTML5, CSS3, and ECMAScript 6 standards is thoughtfully integrated into every chapter of the book, mentioning new features or tools within context of the task or topic at hand.

  • af Nightscape
    146,95 kr.

    One of the UK's most exciting online creators wants to change your life by showing you the world from a different angle.

  • - Here's How it Can do the Same for You
    af Matthew Loop
    293,95 - 355,95 kr.

    In Social Media Made Me Rich, learn the specific strategies that the world's highest-paid Internet entrepreneurs are using to multiply their impact and get rich.

  • af Kalle Rosenbaum
    364,95 kr.

    Key features * Jargon-free * Step-by-step guide * Real-world examples Audience This book provides a jargon-free introduction to Bitcoin for any technically interested reader. Some chapters address technical concepts that require basic knowledge of networking and programming.

  • - The World's Most Extraordinary Places on and Beyond the Seashore
    af Sebastiaan Bedaux
    444,95 kr.

    The 20 best Instagram accounts and blogs show you their paradise on earth, with the focus on the most idyllic beaches, azure seas, both above and below the water surface.

  • - A Practical Guide to Online Intelligence
    af Nihad A. Hassan
    437,95 kr.

  • af Paizo Staff
    176,95 - 178,95 kr.

  • af Line Knutzon
    74,95 - 131,95 kr.

    Er du en rasende 65-årig mand med udstående øjne, der vil have lov til at råbe fede kælling til fede kællinger? Er du en tavs og skeptisk 12-årig pige, der nægter at tale med voksne? En storrygende og dehydreret 45-årig kvinde på den yderste venstrefløj? En 87-årig kvinde, der ikke har råd til din egen begravelse? En panikslagen dramatiker, der har bidt fingrene af sig selv. Er du nisse? Ufødt? Slagtesvin? Midt i en aggressiv debat om istidens slutning? Er du faret vild i Sverige, i livet, i mørket uden at kunne finde kontakten, sulten, på randen af sammenbrud, fattig, til grin og tørret i det moderne Danmark? Så spørg Camille Cloud – hun har svar på alt, hun er tidens svar og tidens lyd, for hun har succes og har tænkt på alt, før hun blev født.

  • af Brandon Atkinson
    363,95 kr.

  • af Bruce Nikkel
    474,95 kr.

    Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.You'll learn how to:-Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies-Protect attached evidence media from accidental modification-Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal-Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping-Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt-Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others-Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged mediaWith its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

  • af Kevin Ryan
    118,95 kr.

    With step-by-step guides and checklists to help you, it includes an overview of website terminology and talks through WordPress components.

  • - Bulletproof Your Corporate Defense Program
    af Sean (R.I.S.C International Lyons
    915,95 kr.

  • af Kim Walsh-Phillips
    198,95 kr.

    x

  • - Digital Prospects
    af Byung-Chul (Professor Han
    163,95 kr.

  • - Network Intrusions, Trust and Fear in the International System
    af Ben Buchanan
    318,95 kr.

    Reveals the pressure points for international relations precipitated by states' use of cyber espionage.

  • - A Hands-On Guide to Building Web Applications in JavaScript
    af Marc Wandschneider
    335,95 kr.

  • af Ben Edmunds
    223,95 kr.

    Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.Is your PHP app truly secure? Let's make sure you get home on time and sleep well at night. Learn the security basics that a senior developer usually acquires over years of experience, all condensed down into one quick and easy handbook. Do you ever wonder how vulnerable you are to being hacked? Do you feel confident about storing your users' sensitive information? Imagine feeling confident in the integrity of your software when you store your users' sensitive data. No more fighting fires with lost data, no more late nights, your application is secure.Well, this short book will answer your questions and give you confidence in being able to secure your and other PHP web apps.What You'll LearnNever trust your users - escape all inputHTTPS/SSL/BCA/JWH/SHA and other random letters: some of them actually matterHow to handle password encryption and storage for everyoneWhat are authentication, access control, and safe file handing and how to implement themWhat are safe defaults, cross site scripting and other popular hacks Who This Book Is ForExperienced PHP coders, programmers, developers.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.