Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Discusses the critical information that readers need to know about APT and how to avoid being a victim. This book covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; and critical information on how to respond and recover from an intrusion.
Takes readers through the different issues involved in spying on someone online. This book begins with an explanation of reasons and ethics, covers the psychology of spying, and describes computer and network basics. It takes readers step-by-step through many common online activities, and also shows what can be done to compromise them.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.