Markedets billigste bøger
Levering: 1 - 2 hverdage

Sikkerhed

Her finder du spændende bøger om Sikkerhed. Nedenfor er et flot udvalg af over 5.659 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • - The Insights You Need from Harvard Business Review
    af Andrew Burt, Harvard Business Review, Christine Moorman, mfl.
    198,95 - 352,95 kr.

  • - The Root Cause and New Solution for Cybersecurity
    af Espinosa Christian Espinosa
    188,95 - 323,95 kr.

  • - How the Original Hacking Supergroup Might Just Save the World
    af Joseph Menn
    157,95 - 166,95 kr.

    The fast-paced, riveting story of the hacking collective that is using technology as a force for good, and fighting back against corporations and countries that are going after our freedom, privacy, even our democracy.

  • - The Insights You Need from Harvard Business Review
    af Harvard Business Review, Tomas Chamorro-Premuzic, David Weinberger, mfl.
    243,95 - 352,95 kr.

  • af Daniel Keyes
    103,95 kr.

    The ultimate 'what if' novel, from the million-copy-bestselling author of FLOWERS FOR ALGERNON: 'A masterpiece of poignant brilliance ... heartbreaking' Guardian

  • af Bridget Kenyon
    473,95 kr.

    A must-have resource for anyone looking to establish, implement and maintain an ISMS.Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001.The book covers:Implementation guidance -what needs to beconsidered to fuli lthe requirements of thecontrols from ISO/IEC27001, Annex A. This guidance is aligned with ISO/IEC27002, which gives advice on implementing the controls;Auditing guidance -whatshouldbechecked, and how,whenexaminingthe ISO/IEC27001controls to ensure that the implementation coversthe ISMS control requirements.The implementation guidance gives clear descriptions covering what needs to be considered to achieve compliance against the requirements, with examples given throughout. The auditing guidance covers what evidence an auditor should look for in order to satisfy themselves that the requirement has been met. Useful for internal auditors and consultants, the auditing guidance will also be useful for information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit.This guide is intended to be used by those involved in:Designing, implementing and/or maintaining an ISMS;Preparing for ISMS audits and assessments; orUndertaking both internal and third-party ISMS audits and assessmentsAbout the authorBridget Kenyon (CISSP) is global CISO for Thales eSecurity. Her experience in information security started in 2000 with a role in network vulnerabilities at DERA, following which she has been a PCI Qualified Security Assessor, information security officer for Warwick University and head of information security for UCL, and has held a variety of roles in consultancy and academia.Bridget has been contributing to international standards since 2006, when she first joined BSI Panel 1, coordinating development of information security management system standards; she is currently editor for ISO/IEC 27014. Bridget has also co-authored three textbooks on information security. She strongly believes that "e;information security is fundamental to reliable business operations, not a nice-to-have"e;. In 2018, she was named one of the top 25 women in tech by UK publication PCR.

  • af Brian Russell & Drew Van Duren
    568,95 - 633,95 kr.

  • - The Blockchain and the Future of Everything
    af Paul Vigna & Michael J. Casey
    156,95 kr.

    From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing: the blockchain.

  • - Perform penetration testing to secure your IT environment against threats and vulnerabilities
    af Sagar Rahalkar
    383,95 kr.

    Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.

  • af Lorne Lantz & Daniel Cawrey
    633,95 kr.

    The future will be increasingly distributed. As the publicity surrounding Bitcoin and blockchain has shown, distributed technology and business models are gaining popularity. Yet the disruptive potential of this technology is often obscured by hype and misconception. This detailed guide distills the complex, fast moving ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood.Finance and technology pros will learn how a blockchain works as they explore the evolution and current state of the technology, including the functions of cryptocurrencies and smart contracts. This book is for anyone evaluating whether to invest time in the cryptocurrency and blockchain industry. Go beyond buzzwords and see what the technology really has to offer.Learn why Bitcoin was fundamentally important in blockchain's birthExplore altcoin and alternative blockchain projects to understand what's possibleUnderstand the challenges of scaling and forking a blockchainLearn what Ethereum and other blockchains offerExamine emerging business uses for blockchain beyond cryptocurrencyDiscover where the future lies in this exciting new technology

  • - Invest In Digital Gold
    af Szabolcs Juhasz
    278,95 - 343,95 kr.

  • - OpenSSH, PuTTY, Tunnels, and Keys
    af Michael W Lucas
    333,95 - 438,95 kr.

  • - Targeting Digital Investigations
    af Chet Hosmer
    327,95 kr.

  • - The Secret Military History of the Internet
    af Yasha Levine
    118,95 kr.

    An explosive, revisionist history of the dark past, and darker present of the internet.

  • - Security and Survival in a Hyper-connected World
    af Bruce Schneier
    155,95 - 232,95 kr.

    A best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized web.

  • - Protecting Systems with Data and Algorithms
    af David Freeman & Clarence Chio
    524,95 kr.

    Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, youll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis.Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing the marriage of these two fields, as well as a toolkit of machine-learning algorithms that you can apply to an array of security problems. This book is ideal for security engineers and data scientists alike.Learn how machine learning has contributed to the success of modern spam filtersQuickly detect anomalies, including breaches, fraud, and impending system failureConduct malware analysis by extracting useful information from computer binariesUncover attackers within the network by finding patterns inside datasetsExamine how attackers exploit consumer-facing websites and app functionalityTranslate your machine learning algorithms from the lab to productionUnderstand the threat attackers pose to machine learning solutions

  • - The Rule of Code
    af Aaron Wright & Primavera De Filippi
    188,95 kr.

    How does Bitcoin mine money from 1s and 0s? Through blockchain, a tool for creating secure, decentralized peer-to-peer applications. The technology has been compared to the Internet in impact. But disintermediation-blockchain's greatest benefit-cuts out oversight along with middlemen. Blockchain and the Law urges the law to catch up.

  • af Alexander D'Agapeyeff
    228,95 - 423,95 kr.

  • - Fundamental Principles and Applications
    af Royal Holloway, University of London) Martin, Keith (Professor of Information Security & mfl.
    621,95 - 1.313,95 kr.

    Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.

  • - Technology, Policy, and the Integrity of Social Life
    af Helen Nissenbaum
    254,95 - 1.133,95 kr.

    As use of information technology increases, we worry that our personal information is being shared inappropriately, violating key social norms and irreversibly eroding privacy. This book describes how societies ought to go about deciding when to allow technology to lead change and when to resist it in the name of privacy.

  • - Digital Security in a Networked World
    af Bruce Schneier
    186,95 - 236,95 kr.

    Offers a practical guide to achieving security throughout computer networks. This guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, and, how to assess business and corporate security needs.

  • af Clint Bodungen, Bryan Singer, Aaron Shbeeb, mfl.
    584,95 kr.

    Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the battle-tested Hacking Exposed style, the book arms you with the skills and tools necessary to defend against attacks that are debilitating and potentially deadly. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions explains vulnerabilities and attack vectors specific to ICS/SCADA protocols, applications, hardware, servers, and workstations. You will learn how hackers and malware, such as the infamous Stuxnet worm, can exploit them and disrupt critical processes, compromise safety, and bring production to a halt. The authors fully explain defense strategies and offer ready-to-deploy countermeasures. Each chapter features a real-world case study as well as notes, tips, and cautions. Features examples, code samples, and screenshots of ICS/SCADA-specific attacks Offers step-by-step vulnerability assessment and penetration test instruction Written by a team of ICS/SCADA security experts and edited by Hacking Exposed veteran Joel Scambray

  • - The Virtue of Forgetting in the Digital Age
    af Viktor Mayer-Schonberger
    184,95 kr.

    Delete looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. Digital technology empowers us as never before, yet it has unforeseen consequences as well. Potentially humiliating content on Facebook is enshrined in cyberspace for future employers to see. Google remembers everything we've searched for and when. The digital realm remembers what is sometimes better forgotten, and this has profound implications for us all. In Delete, Viktor Mayer-Schonberger traces the important role that forgetting has played throughout human history, from the ability to make sound decisions unencumbered by the past to the possibility of second chances. The written word made it possible for humans to remember across generations and time, yet now digital technology and global networks are overriding our natural ability to forget--the past is ever present, ready to be called up at the click of a mouse. Mayer-Schonberger examines the technology that's facilitating the end of forgetting--digitization, cheap storage and easy retrieval, global access, and increasingly powerful software--and describes the dangers of everlasting digital memory, whether it's outdated information taken out of context or compromising photos the Web won't let us forget. He explains why information privacy rights and other fixes can't help us, and proposes an ingeniously simple solution--expiration dates on information--that may.Delete is an eye-opening book that will help us remember how to forget in the digital age.

  • - Under Danmarks ældste kirkegulv bliver en 5.000 år gammel kalender fundet. Kalenderen tæller ned til Ragnarok.
    af Johan Ottosen
    104,95 - 148,95 kr.

    ⭐️⭐️⭐️⭐️⭐️ “Danmarks Dan Brown?” catsbooksandcoffee.dk⭐️⭐️⭐️⭐️⭐️ “Dan Brown på speed …” bforbog.dk⭐️⭐️⭐️⭐️⭐️⭐️ “Man nærmest mister pusten” bogfidusen.dk “Dan Brown og da Vinci Code go home. Vi har Johan Ottosen.” Saxo.com“En af de mest effektfulde romanindledninger jeg har læst i lang tid.” Henrik Palle, journalist på Politiken.“Spektakulært plot.” Rebekka Andreasen, vildmedkrimi.dk“Spændende til sidste punktum.” Jannik Lunn, bogpusheren.dk“Man bare ryger gennem bogen.” krimifan.dk“En rigtig ”mandethriller” i højt tempo.” litteratursiden.dkUnder danmarks ældste kirkegulv bliver en 5.000 år gammel kalender fundet. Kalenderen tæller ned til Ragnarok.På en bænk i det sommerglade Tivoli skyder den pensionerede professor Bjarne Arnesen sig en kugle for panden. Hans stedsøn, den Cavlingprisvindende journalist Kurt Østergård, modtager en videobesked fra ham 28 måneder efter. Arnesen trygler Kurt om at stoppe det han kalder "dem" og beder ham fortsætte hvor han slap. Det leder Kurt til en opdagelse, der får store konsekvenser ikke blot for Kurt, men for Danmark og kongefamilien. Samtidig bliver strålingsekspert og tidligere våbeninspektør for FN, Søren Storm, bedt om at hjælpe politiet i opklaringen af et strålingsrelateret mord begået på Rigshospitalet. Det makabre og bizarre mord leder Storm på sporet af en radioaktiv bombe der kan gå af hvert øjeblik det skal være et sted i København. Lige om hjørnet venter dronningens store jubilæumsfest med prominente gæster fra ind- og udland.

  • af Charles Swanson
    493,95 - 597,95 kr.

  • af Tari Schreider
    1.018,95 kr.

    When I was writing the first edition of this book, I knew that certain aspects of it would become dated owing to rapid changes in the cybersecurity industry, threat landscape and providers. Two years later I take full measure of all that has evolved in the cybersecurity world. Increasing zero-day attacks, growth of state-sponsored adversaries and consolidation of cybersecurity products and services all converged to shape where we are today. We have also witnessed some of the world's largest data breach events, increasingly destructive ransomware attacks and changes in legal and regulatory statutes.Aside from substantial updates of standards, source links and cybersecurity products here is what's new in the second edition: 50+ callout boxes highlighting cyberattacks and important resources. 60 self-study questions to hone your knowledge. 25 overviews of cybersecurity technologies. Expanded coverage of the intersection of cybersecurity and privacy. Expanded coverage of security training strategies. A new security talent development section. Discussion of cyber insurance policies. A new security testing strategies section. New adversary profiles. Expansion of attack surface discussion. Inclusion of new threat frameworks. Inclusion of a service management catalog. Introduction to emerging cybersecurity technologies. 17 powerful templates to document your cybersecurity program.I have always envisioned keeping this book regularly updated to ensure you would have a reliable cybersecurity reference source. I see this book as a forum to express my views on protecting assets and information. I also see it as a way to share what I learn through teaching Chief Information Security Officers (CISOs). Teaching affords me a platform to learn how some of the largest companies in the world address cybersecurity. I look forward to sharing future updates with you.

  • af Mike McGrath
    138,95 kr.

  • - Control and secure your Active Directory environment with Group Policy
    af Jordan Krause
    493,95 kr.

    Windows Group Policy has been one of the most powerful yet underutilized tools in our corporate networks for many years. It is an incredible centralized management tool, and almost everyone already has it up and running in their environments.This book will help you become familiar with what Group Policy has to offer and learn how to make better use of it in your day job.

  • - Cybersecurity Advice from the Best Hackers in the World
    af Marcus J. Carey
    186,95 kr.

    Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product.Looking for real-world advice from leading cybersecurity experts? You've found your tribe.Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street.* Get the scoop on the biggest cybersecurity myths and misconceptions about security* Learn what qualities and credentials you need to advance in the cybersecurity field* Uncover which life hacks are worth your while* Understand how social media and the Internet of Things has changed cybersecurity* Discover what it takes to make the move from the corporate world to your own cybersecurity venture* Find your favorite hackers online and continue the conversationTribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world's most noteworthy hackers and influential security specialists.

  • af Sanjay (MD MRCP) Sharma
    493,95 kr.

    The definitive guide for ensuring data privacy and GDPR compliancePrivacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area. The Global Data Protection Regulation (GDPR) imposes complex, elaborate, and stringent requirements for any organization or individuals conducting business in the European Union (EU) and the European Economic Area (EEA)--while also addressing the export of personal data outside of the EU and EEA. This recently-enacted law allows the imposition of fines of up to 5% of global revenue for privacy and data protection violations. Despite the massive potential for steep fines and regulatory penalties, there is a distressing lack of awareness of the GDPR within the business community. A recent survey conducted in the UK suggests that only 40% of firms are even aware of the new law and their responsibilities to maintain compliance.The Data Privacy and GDPR Handbook helps organizations strictly adhere to data privacy laws in the EU, the USA, and governments around the world. This authoritative and comprehensive guide includes the history and foundation of data privacy, the framework for ensuring data privacy across major global jurisdictions, a detailed framework for complying with the GDPR, and perspectives on the future of data collection and privacy practices.* Comply with the latest data privacy regulations in the EU, EEA, US, and others* Avoid hefty fines, damage to your reputation, and losing your customers* Keep pace with the latest privacy policies, guidelines, and legislation* Understand the framework necessary to ensure data privacy today and gain insights on future privacy practicesThe Data Privacy and GDPR Handbook is an indispensable resource for Chief Data Officers, Chief Technology Officers, legal counsel, C-Level Executives, regulators and legislators, data privacy consultants, compliance officers, and audit managers.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.