dk-flag   Stort fødselsdagsudsalg   dk-flag
dk-flag dk-flag dk-flag dk-flag dk-flag dk-flag   Vi fejrer fødselsdag med stort udsalg   dk-flag dk-flag dk-flag dk-flag dk-flag dk-flag

Sikkerhed

Her finder du spændende bøger om Sikkerhed. Nedenfor er et flot udvalg af over 5.577 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Edward Snowden
    128,95 - 196,95 kr.

    Permanent Record is the essential and courageous memoir of Edward Snowden - the man who risked everything to expose the shocking mass surveillance used by governments across the world to spy on their own citizens.

  • - And Our Human Future
    af Eric, III Schmidt, Henry a Kissinger & mfl.
    123,95 kr.

    Artificial Intelligence is transforming human society fundamentally and profoundly. Not since the Enlightenment and the Age of Reason have we changed how we approach knowledge, politics, economics, even warfare. Three of our most accomplished and deep thinkers come together to explore what it means for us all.

  • - Getting Started with Networking, Scripting, and Security in Kali
    af OccupyTheWeb
    375,95 kr.

    A practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them.

  • - The Cyberweapons Arms Race
    af Nicole Perlroth
    113,95 kr.

  • af Mads Vestergaard
    158,95 kr.

    Den digitale revolution har været båret af løfter om demokratisering og frigørelse. Men virkeligheden er blevet en anden. Det sociale kreditsystem, som er under udvikling i Kina, står som skræmmeeksempel på en statsmagt, der anvender de nyeste teknologier til at virkeliggøre en social kontrol af borgerne uden fortilfælde. Men Kina er ikke alene. I USA er der åbnet nye markeder for digital overvågning, adfærdspåvirkning og datahandel, som truer friheden, hvis ikke de kommercielle teknologigiganter møder modstand fra befolkning og politikere. Og i Danmark har vi så travlt med at vinde digitaliseringskapløbet, at borgernes retsstilling, tillid og demokrati er under pres. I Digital totalitarisme stiller filosof Mads Vestergaard skarpt på den mørke side af den digitale revolution. Kun hvis vi kender truslerne mod det frie og demokratiske samfund, kan vi bekæmpe dem. Anmeldelser: "Det er på tide, vi opgraderer den generelle forståelse af de enorme udfordringer, den digitale udvikling giver vores samfund. Digital Totalitarisme er et rigtig godt sted at starte." - Journalisten Mads Vestergaard (f. 1979) er uddannet filosof og ph.d.-studerende ved Center for Information og Boblestudier (CIBS), Københavns Universitet.

  • - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
    af Kevin D. Mitnick & Robert Vamosi
    158,95 kr.

    Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

  • af James Michael Stewart, Darril Gibson & Mike Chapple
    443,95 - 586,95 kr.

  • - Controlling the Human Element of Security
    af Kevin D. Mitnick & William L. Simon
    108,95 - 355,95 kr.

    The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.

  • - My Adventures as the World's Most Wanted Hacker
    af Kevin Mitnick
    128,95 kr.

    Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated silence.

  • af Jon Erickson
    474,95 kr.

    Deals with computers/software.

  • - Technology and the End of the Future
    af James Bridle
    118,95 - 165,95 kr.

    ';New Dark Ageis among the most unsettling and illuminating books I've read about the Internet, which is to say that it is among the most unsettling and illuminating books I've read about contemporary life.'New YorkerAs the world around us increases in technological complexity, our understanding of it diminishes. Underlying this trend is a single idea: the belief that our existence is understandable through computation, and more data is enough to help us build a better world. In reality, we are lost in a sea of information, increasingly divided by fundamentalism, simplistic narratives, conspiracy theories, and post-factual politics. Meanwhile, those in power use our lack of understanding to further their own interests. Despite the apparent accessibility of information, we're living in a new Dark Age. From rogue financial systems to shopping algorithms, from artificial intelligence to state secrecy, we no longer understand how our world is governed or presented to us. The media is filled with unverifiable speculation, much of it generated by anonymous software, while companies dominate their employees through surveillance and the threat of automation. In his brilliant new work, leading artist and writer James Bridle surveys the history of art, technology, and information systems, and reveals the dark clouds that gather over our dreams of the digital sublime.

  • - Best Practices for Securing Infrastructure
    af Lee Brotherston & Amanda Berlin
    398,95 - 588,95 kr.

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations dont have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

  • af Peter H. Gregory & Lawrence C. Miller
    297,95 - 478,95 kr.

    The fast and easy way to secure your CISSP certification Are you a security professional seeking the valuable CISSP certification? Good for you! CISSP For Dummies is the ideal starting point on your journey, providing you with a friendly and accessible framework for studying for this highly sought-after certification.

  • - A practitioner's guide
    af David Sutton
    498,95 kr.

    Increasingly, organisations rely on information for their day-to-day operations, and the loss or unavailability of information can mean the difference between success and ruin. Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It also includes a chapter on applying IRM in the public sector. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management.

  • - Stuxnet and the Launch of the World's First Digital Weapon
    af Kim Zetter
    156,95 kr.

    A top cybersecurity journalist tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare-one in which a digital attack can have the same destructive capability as a megaton bomb. "Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit."-The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction-in this case, on an Iranian nuclear facility. In these pages, journalist Kim Zetter tells the whole story behind the world's first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran-and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making. But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.

  • af William Stallings & Lawrie Brown
    822,95 kr.

    Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramaticallyand is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. The Text and Academic Authors Association named Computer Security: Principles and Practice, First Edition, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008. Teaching and Learning ExperienceThis program presents a better teaching and learning experiencefor you and your students. It will help: Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including both research and modeling projects in your course, giving students a broader perspective. Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in computer security. Enhance Learning with Engaging Features: Extensive use of case studies and examples provides real-world context to the text material. Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.

  • - Inside Cambridge Analytica's Plot to Break the World
    af Christopher Wylie
    96,95 kr.

  • af Andreas Antonopoulos
    524,95 kr.

    With this practical guide, Andreas M. Antonopoulos and Gavin Wood provide everything you need to know about building smart contracts and DApps on Ethereum and other virtual-machine blockchains.

  • af Laurent Richard & Sandrine Rigaud
    113,95 - 196,95 kr.

  • af Susie Alegre
    113,95 - 196,95 kr.

    Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to conclusions about who we are. They even shape our everyday thoughts and actions - from who we date to how we vote. But this is just the latest front in an age-old struggle.Part history and part manifesto, Freedom to Think charts the history and importance of our most basic human right: freedom of thought. From Galileo to Nudge Theory to Alexa, human rights lawyer Susie Alegre explores how the powerful have always sought to get inside our heads, influence how we think and shape what we buy. Providing a bold new framework to understand how our agency is being gradually undermined, Freedom to Think is a ground-breaking and vital charter for taking back our humanity and safeguarding our reason.

  • af Imran Bashir
    638,95 - 1.073,95 kr.

  • - An International Guide to Data Security and ISO 27001/ISO 27002
    af Alan Calder & Steve Watkins
    633,95 - 1.828,95 kr.

    Implement an effective and compliant information security management system using IT governance best practice.

  • - An implementation and compliance guide
    af It Governance Privacy Team
    265,95 - 473,95 kr.

  • - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
    af Kevin D. Mitnick & William L. Simon
    136,95 - 274,94 kr.

    Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them.

  • af Johan Ottosen
    104,95 - 236,95 kr.

    NB: Apokalypsens engle er anden del af Mirrin Bank trilogien. Læs Stenens tid først :-)⭐️⭐️⭐️⭐️⭐️ “Sikke en åbning af en bog!” krimisiden.dk “En Robert Langdon kombineret med James Bond.”“Højspændt action.” readersworld.dk“Johan Ottosen har en imponerende evne til at skrive billedmættede scener.” catsbooksandcoffee.com“Der er styr på selv de mindste kemi-beskrivelser.” titlen.dk“Johan Ottosen skriver hæsblæsende og stilsikkert i Apokalypsens engle. Tempoet er bestemt ikke sat ned i denne hans anden bog og anden del i trilogien om Søren Storm, Kurt Østergaard, Bodil Holm, de gamle hemmeligheder og en forestående krig. Det er som en film med mange sceneskift og actionfyldte scener rundt omkring i verden fra København, til Rom og Mellemøsten.” bogblogger.dkEn avanceret computermodel forudsiger at vesten står over for en krise, der overgår første og anden verdenskrig i tab af menneskeliv. Og vores team i Mirrin Bank har mindre end syv dage til at neutralisere truslen …Iran har udført hele to attentater mod Danmark.Statsminister Lene Bisgaard skal afklare om der er tale om et kriminelt angreb, begået af løsrevne elementer af Irans Revolutionsgarde, eller om der er tale om et statssanktioneret attentat hvilket vil resultere i en krig mellem NATO og Iran, sætte mellemøsten i flammer og i sidste ende kaste verden ud i tredje verdenskrig.

  • - The Science of Human Hacking
    af Christopher Hadnagy
    285,95 kr.

    Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.* Examine the most common social engineering tricks used to gain access* Discover which popular techniques generally don't work in the real world* Examine how our understanding of the science behind emotions and decisions can be used by social engineers* Learn how social engineering factors into some of the biggest recent headlines* Learn how to use these skills as a professional social engineer and secure your company* Adopt effective counter-measures to keep hackers at bayBy working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

  • af Jeff Bollinger
    395,95 kr.

    Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.

  • af Mike (University of Notre Dame) Chapple
    420,95 kr.

    Discover key exam objectives and crucial cybersecurity concepts for the CompTIA Security+ SY0-701 exam, along with an online test bank with hundreds of practice questions and flashcards In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight. You'll get access to the information you need to start a new career--or advance an existing one--in cybersecurity, with efficient and accurate content. You'll also find: Practice exams that get you ready to succeed on your first try at the real thing and help you conquer test anxiety Hundreds of review questions that gauge your readiness for the certification exam and help you retain and remember key concepts Complimentary access to the online Sybex learning environment, complete with hundreds of additional practice questions and flashcards, and a glossary of key terms Perfect for everyone planning to take the CompTIA SY0-701 exam, as well as those aiming to secure a higher-level certification like the CASP+, CISSP, or CISA, this study guide will also earn a place on the bookshelves of anyone who's ever wondered if IT security is right for them. It's a must-read reference!

  • af Michael P. (Research Staff Member Fischerkeller, Emily O. (Cyber Persistence Subject Matter Expert Goldman & Richard J. (Professor of Political Science Harknett
    278,95 - 788,95 kr.

  • af Fernando Maymi
    534,95 kr.

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A new edition of Shon Harris' bestselling exam prep guide¿fully updated for the 2021 version of the CISSP examThis up-to-date self-study guide fully prepares candidates for the challenging CISSP exam and offers 100% coverage of all eight exam domains. This edition has been thoroughly revised to cover the 2021 CISSP Common Body of Knowledge and reengineered to better support self-determined learning. Shorter, more focused chapters break down large domains into modules that can be tackled in one sitting. Meanwhile, plenty of examples place issues in real-world contexts and dozens of new figures illustrate complex concepts. Through it all, the book maintains the conversational tone that has made previous editions a favorite for so many readers.Written by leading experts in information security certification and training, CISSP All-in-One Exam Guide, Ninth Edition is based on proven pedagogy and features special elements that teach and reinforce practical skills. Beyond exam prep, the guide also serves as an ideal on-the-job reference for IT security professionals.Fully updated to cover the CISSP 2021 Common Body of KnowledgeRevised Table of Contents with modular approachOnline content includes 1600 practice exam questions in the Total Tester exam engine

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.