Markedets billigste bøger
Levering: 1 - 2 hverdage

Sikkerhed

Her finder du spændende bøger om Sikkerhed. Nedenfor er et flot udvalg af over 5.598 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Wm. Arthur Conklin
    534,95 kr.

    Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the examCSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certification Consortium (ISC)®. Thoroughly revised and updated for the latest exam release, this guide includes real-world examples and comprehensive coverage on all aspects of application security within the entire software development lifecycle. It also includes hands-on exercises, chapter review summaries and notes, tips, and cautions that provide real-world insight and call out potentially harmful situations.With access to 350 exam questions online, you can practice either with full-length, timed mock exams or by creating your own custom quizzes by chapter or exam objective.CSSLP Certification All-in-One Exam Guide, Third Edition provides thorough coverage of all eight exam domains:Secure Software ConceptsSecure Software RequirementsSecure Software DesignSecure Software Implementation ProgrammingSecure Software TestingSecure Lifecycle ManagementSoftware Deployment, Operations, and MaintenanceSupply Chain and Software Acquisition

  • af David Seidl & Mike Chapple
    325,95 kr.

    Full-length practice tests covering all CISSP domains for the ultimate in exam prep The CISSP Official (ISC)2 Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions.

  • - A hands-on guide to threat hunting with the ATT&CK (TM) Framework and open source tools
    af Valentina Palacin
    538,95 kr.

    Threat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.

  • - What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
    af Brian W. Kernighan
    288,95 - 1.091,95 kr.

  • - Starting a Career as an Ethical Hacker
    af Phillip L. Wylie
    226,95 kr.

    JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTERThe Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:* The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems* The development of hacking skills and a hacker mindset* Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study* Which certifications and degrees are most useful for gaining employment as a pentester* How to get experience in the pentesting field, including labs, CTFs, and bug bounties

  • - What You Urgently Need To Know
    af Nina Schick
    126,95 kr.

    Everything you need to know about "deepfakes" and what could become the biggest information and communications meltdown in world history.

  • - Why Boards Need to Lead--and How to Do It
    af Thomas J. Parenty & Jack J. Domet
    265,95 kr.

  • af Ed Fisher
    295,95 kr.

    Prepare for Microsoft's Exam MS-500 -- and demonstrate your skills in administering Microsoft 365 security Authoritative and complete Exam MS-500 preparation content, straight from Microsoft Covers implementing and managing identity, access, threat protection, and information protection; and managing governance and compliance features in Microsoft 365 Organized by exam objectives for efficient study Strategic, what-if scenarios help you master the big-picture thinking the exam demands Contains up-to-date Microsoft 365 Certified: Security Administrator Associate exam preparation tips from a leading Microsoft security expert ms-500; ms-500 guide; ms-500 exam prep; ms-500 study guide; ms-500 exam guide; ms-500 training; ms-500 preparation; microsoft 365 security administration; office 365 identity; theft protection governance; office 365 compliance; ms-500 book

  • - Study Guide
    af Joshua (Senior Vice President for Security Technology Feldman
    272,95 kr.

  • af Craig Smith
    474,95 kr.

    The Car Hacker's Handbook shows how to identify vulnerabilities in modern automotive vehicles.

  • - Building an Information Security Risk Management Program from the Ground Up
    af Evan (Omgeo Wheeler
    364,95 kr.

    Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulating risk exposures in business terms.

  • af Jamal Ahmed
    275,95 kr.

    Are you grappling with the complexities of the GDPR? Struggling to translate its principles into actionable steps for your business? You're not alone. The General Data Protection Regulation (GDPR) has transformed how organizations worldwide handle personal data, often making it feel like an intimidating challenge for professionals across all levels.The rapidly evolving data landscape and the expanded responsibilities for professionals require a deep understanding of GDPR principles, practical implementation, and compliance monitoring. Failure to understand and implement GDPR principles can lead to severe fines, not to mention damage to your business's reputation. But GDPR compliance isn't just about avoiding penalties-it's an opportunity to prove your credibility, to shine in your field, and to protect your clients' personal data.Enter "The Easy Peasy Guide to the GDPR" - your key to unlocking the mystery of GDPR compliance. With this unique 'easy peasy' approach, this guide turns legal complexities into actionable insights, providing you with a clear path to GDPR mastery. It simplifies the convoluted legal language, making GDPR accessible, engaging, and most importantly, implementable.This guide is designed to: Demystify GDPR: Break down the complexities and unravel the confusion, leaving you with a clear understanding and practical implementation of GDPR principles.Ignite Confidence: Say goodbye to self-doubt and impostor syndrome. Step into your true potential as a confident and credible GDPR professional. Master Intricacies: Equip yourself with the knowledge and skills to navigate the intricate GDPR landscape with ease. Make informed decisions and provide expert guidance confidently. Rise Above the Crowd: Position yourself as the go-to GDPR expert in your field. Shine brightly as a beacon of knowledge amidst a sea of uncertainty.Ascend to Authority: Elevate your professional reputation and gain recognition. Set yourself apart from the rest with your deep understanding and practical application of GDPR principles."The Easy Peasy Guide to the GDPR" is more than just a book; it's a transformative journey, guiding you from GDPR confusion to GDPR mastery. It empowers you to safeguard personal data, foster a culture of privacy, and enhance your professional stature.Let's make GDPR easy peasy, together!Don't just comply with GDPR; master it, the easy peasy way! Grab your copy now

  • - Iran har angrebet NATO og USAs præsident gør klar til at anvende atomvåben mod Iran. Samtidig ser Rusland sit snit til at udvide sit territorium
    af Johan Ottosen
    138,95 - 158,95 kr.

    AFSLUTTENDE DEL AF MIRRIN BANK-TRILOGIENIran har angrebet NATO og USAs præsident Cahill gør klar til at anvende atomvåben mod Iran.Samtidig ser Rusland sit snit til at udvide sit territorium.Under dække af at være en investeringsbank opdager vores hemmelige efterretningstjeneste i København, Mirrin Bank, at Iran i det skjulte har produceret 200 højteknologiske atomsprænghoveder og er således en de facto atommagt. Angriber præsident Cahill Iran risikerer verden en altødelæggende atomvinter. Vores Team i Mirrin Bank finder yderligere ud af, at en langt værre spiller, The Church, står bag og trækker i trådene, for at udleve en altødelæggende religiøs vision. The Church har millioner af medlemmer over hele verden, og noget tyder på, at de har infiltreret flere vestlige demokratier … ⭐️⭐️⭐️⭐️ "Actionfilm i bogformat." Jyllands Posten⭐️⭐️⭐️⭐️⭐️ “Dybt rørende og dramatisk." - Krimiormen⭐️⭐️⭐️⭐️⭐️ "Overhaler selv den mest udspekulerede James Bond-historie" - Bogpusheren⭐️⭐️⭐️⭐️⭐️ "Spændingen er i top hele vejen igennem" - Krimisiden

  • af Corey J. Ball
    564,95 kr.

    Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks. In the book’s nine guided labs, which target intentionally vulnerable APIs, you’ll practice:Enumerating APIs users and endpoints using fuzzing techniquesUsing Postman to discover an excessive data exposure vulnerabilityPerforming a JSON Web Token attack against an API authentication processCombining multiple API attack techniques to perform a NoSQL injectionAttacking a GraphQL API to uncover a broken object level authorization vulnerability By the end of the book, you’ll be prepared to uncover those high-payout API bugs other hackers aren’t finding and improve the security of applications on the web.

  • - From Conception to Response
    af David Shepherd, UK) Button, Mark (University of Portsmouth, mfl.
    403,95 - 1.588,95 kr.

  • - The Guide to Analyzing Malicious Software
    af Patrick Wardle
    474,95 kr.

    A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst.Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what’s inside. Discover the secrets of nation state backdoors, destructive ransomware, and subversive cryptocurrency miners as you uncover their infection methods, persistence strategies, and insidious capabilities. Then work with and extend foundational reverse-engineering tools to extract and decrypt embedded strings, unpack protected Mach-O malware, and even reconstruct binary code. Next, using a debugger, you’ll execute the malware, instruction by instruction, to discover exactly how it operates. In the book’s final section, you’ll put these lessons into practice by analyzing a complex Mac malware specimen on your own.You’ll learn to:Recognize common infections vectors, persistence mechanisms, and payloads leveraged by Mac malwareTriage unknown samples in order to quickly classify them as benign or maliciousWork with static analysis tools, including disassemblers, in order to study malicious scripts and compiled binariesLeverage dynamical analysis tools, such as monitoring tools and debuggers, to gain further insight into sophisticated threatsQuickly identify and bypass anti-analysis techniques aimed at thwarting your analysis attemptsA former NSA hacker and current leader in the field of macOS threat analysis, Patrick Wardle uses real-world examples pulled from his original research. The Art of Mac Malware: The Guide to Analyzing Malicious Software is the definitive resource to battling these ever more prevalent and insidious Apple-focused threats.

  • af Kevin Beaver
    173,95 kr.

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks.

  • - NFT Crypto Investing Guide for Beginners to Expert: Art, Tokens, Music, Film
    af Cameron Belford
    193,95 kr.

  • - Techplatformenes indflydelse på tidens fakta, følelser og fortællinger
    af Vincent F. Hendricks & Camilla Mehlsen
    158,95 - 208,95 kr.

    Internettet er en potentielt demokratisk sfære, hvor alle kan få taletid. Men de sociale platforme har stor indflydelse på det enkelte menneskes digitale adfærd, ligesom de kan ekskludere alt fra vaccinemodstandere til den amerikanske præsident.Med analyser af fænomener som selfies, fake news og nudes viser Vincent F. Hendricks og Camilla Mehlsen, hvordan de sociale platforme administrerer tidens fakta, følelser og fortællinger og i praksis kan styre, hvad vi opfatter som sandt og falskt, rigtigt og forkert, grimt og smukt – online såvel som offline.Det er ikke for sent at skabe et mere demokratisk internet. Hendricks og Mehlsen kalder med Sandhedsministeriet på en nytænkning af techgiganternes rolle i den digitale infrastruktur.Camilla Mehlsen, cand.mag., er digital medieekspert i Børns Vilkår og indehaver af MehlsenMedia. Medlem af TechDK Kommissionen. Har bl.a. udgivet Teknologiens testpiloter (2016), Hvordan bliver vi digitalt dannede? (med Vincent F. Hendricks, 2018) og Homo Futura (2020) samt undervisningsmaterialet LIKE (2019) og undersøgelsen Influencere – de nye unge mediehuse (2020).Vincent F. Hendricks er dr.phil., ph.d. og professor i formel filosofi og leder af Center for Information og Boblestudier (CIBS) ved Københavns Universitet. Medlem af TechDK Kommissionen. Har bl.a. udgivet Spræng boblen (2016), Fake news (med Mads Vestergaard, 2017), Hvordan bliver vi digitalt dannede? (med Camilla Mehlsen, 2018) og Vend Verden (2020).

  • - Efficiently monitor the cybersecurity posture of your ICS environment
    af Pascal Ackerman
    598,95 - 663,95 kr.

    This second edition of Industrial Cybersecurity is a practical guide to implementing a comprehensive and solid security program for the ICS environment. This book shows anyone new to industrial security or professionals looking to extend their industrial security posture how to effectively monitor their ICS environment.

  • - Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications
    af Stian Thorgersen
    663,95 kr.

    This book is your guide to learning how to install, configure, and manage Keycloak optimally for securing your applications. With the help of easy-to-follow examples, you will gain a complete understanding of Keycloak's various features and how to enable authentication and authorization in applications using it.

  • - Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
    af Glen D. Singh
    573,95 kr.

    The Cisco Certified CyberOps Associate 200-201 certification exam helps you gain the skills and knowledge needed to prevent, detect, analyze, and respond to cybersecurity incidents. This book offers complete up-to-date coverage of the 200-201 exam so you can confidently pass first time while getting hands-on cybersecurity experience.

  • af Alex Preukschat
    529,95 kr.

    In a world of changing privacy regulations, identity theft, and online anonymity, identity is a precious and complex concept. Self-Sovereign Identity (SSI) is a set of technologies that move control of digital identity from third party identity providers directly to individuals, and it promises to be one of the most important trends for the coming decades. Now in Self-Sovereign Identity, privacy and personal data experts Drummond Reed and Alex Preukschat lay out a roadmap for a future of personal sovereignty powered by the Blockchain and cryptography. Cutting through the technical jargon with dozens of practical use cases from experts across all major industries, it presents a clear and compelling argument for why SSI is a paradigm shift, and shows how you can be ready to be prepared for it.

  • af Christina Morillo
    395,95 kr.

    Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through everyday security problems.You'll also receive valuable guidance from professionals on how to navigate your career within this industry. How do you get buy-in from the C-suite for your security program? How do you establish an incident and disaster response plan? This practical book takes you through actionable advice on a wide variety of infosec topics, including thought-provoking questions that drive the direction of the field.Continuously Learn to Protect Tomorrow's Technology - Alyssa ColumbusFight in Cyber Like the Military Fights in the Physical - Andrew HarrisKeep People at the Center of Your Work - Camille StewartInfosec Professionals Need to Know Operational Resilience - Ann JohnsonTaking Control of Your Own Journey - Antoine MiddletonSecurity, Privacy, and Messy Data Webs: Taking Back Control in Third-Party Environments - Ben BrookEvery Information Security Problem Boils Down to One Thing - Ben SmithFocus on the WHAT and the Why First, Not the Tool - Christina Morillo

  • - The Insights You Need from Harvard Business Review
    af Andrew Burt, Harvard Business Review, Christine Moorman, mfl.
    198,95 - 352,95 kr.

  • - The Root Cause and New Solution for Cybersecurity
    af Espinosa Christian Espinosa
    188,95 - 323,95 kr.

  • - How the Original Hacking Supergroup Might Just Save the World
    af Joseph Menn
    157,95 - 166,95 kr.

    The fast-paced, riveting story of the hacking collective that is using technology as a force for good, and fighting back against corporations and countries that are going after our freedom, privacy, even our democracy.

  • - The Insights You Need from Harvard Business Review
    af Harvard Business Review, Tomas Chamorro-Premuzic, David Weinberger, mfl.
    248,95 - 357,95 kr.

  • af Daniel Keyes
    108,95 kr.

    The ultimate 'what if' novel, from the million-copy-bestselling author of FLOWERS FOR ALGERNON: 'A masterpiece of poignant brilliance ... heartbreaking' Guardian

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.