Angebote zu "Cyber" (61 Treffer)

Kategorien

Shops

Social Interactions and Networking in Cyber Soc...
98,69 € *
ggf. zzgl. Versand

Erscheinungsdatum: 12.12.2018, Medium: Taschenbuch, Einband: Kartoniert / Broschiert, Titel: Social Interactions and Networking in Cyber Society, Auflage: Softcover reprint of the original 1st ed. 2017, Redaktion: Gaol, Ford Lumban // Hutagalung, Fonny Dameaty, Verlag: Springer Singapore, Sprache: Englisch, Rubrik: Kommunikationswissenschaften, Seiten: 256, Informationen: Paperback, Gewicht: 394 gr, Verkäufer: averdo

Anbieter: averdo
Stand: 05.06.2020
Zum Angebot
Social Interactions and Networking in Cyber Soc...
106,99 € *
ggf. zzgl. Versand

Social Interactions and Networking in Cyber Society ab 106.99 € als Taschenbuch: Softcover reprint of the original 1st ed. 2017. Aus dem Bereich: Bücher, Wissenschaft, Medienwissenschaft,

Anbieter: hugendubel
Stand: 05.06.2020
Zum Angebot
Social Interactions and Networking in Cyber Soc...
96,49 € *
ggf. zzgl. Versand

Social Interactions and Networking in Cyber Society ab 96.49 € als pdf eBook: . Aus dem Bereich: eBooks, Fachthemen & Wissenschaft, Sprachwissenschaften,

Anbieter: hugendubel
Stand: 05.06.2020
Zum Angebot
Kali Linux: A Complete Beginners Guide for Ethi...
9,95 € *
ggf. zzgl. Versand

Become every hackers nightmare and an expert at cyber security!Have you always been fascinated by the abilities of hackers? Do you wish to know how to protect your data from hacking attacks? Want to learn all about encryption, networking, and VPN but don’t know where to start?This comprehensive guide on Kali Linux, ethical hacking, and cybersecurity will transform you from a beginner in IT world to expert in no time!Just think about how much information about ourselves we share on the internet every day. Addresses, phone numbers, names of friends and family, job information, and credit card numbers. All that information is potential prey for experienced hackers. You might have heard stories about people going on vacations, and finding their home robbed once they got back. All they did was post a picture from their holiday on social media. You don’t have to stop using the internet, social media, and online stores. What you need to do is learn how to protect your data, secure it, and make it impenetrable. This guide will teach you how to do that and more!Here’s what this audiobook includes:The basics of cybersecurity and networkingSteps to use Kali Linux to protect your dataA guide on classic and modern encryptionMethods to deal with breaches in cybersecurityWays to use VPN, TOR, and proxy chainsAnd so much more!Interested? Then scroll up and click on "buy now” to start listening! 1. Language: English. Narrator: Carlie Williams, Jr.. Audio sample: http://samples.audible.de/bk/acx0/180216/bk_acx0_180216_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 05.06.2020
Zum Angebot
Kali Linux: A Step by Step Guide to Learn the B...
9,95 € *
ggf. zzgl. Versand

Become every hacker's nightmare and an expert at cyber security!Have you always been fascinated by the abilities of hackers? Do you wish to know how to protect your data from hacking attacks? Want to learn all about encryption, networking, and VPN, but don’t know where to start?This comprehensive guide on Kali Linux, ethical hacking, and cybersecurity will transform you from a beginner in IT world to an expert, in no time. Just think about how much information about ourselves we share on the internet every day. Addresses, phone numbers, names of friends and family, job information, credit card numbers. All that information is potential prey for experienced hackers. You might have heard stories about people going on vacations and finding their home robbed, when they got back. All they did was post a picture from their holiday on social media. You don’t have to stop using the internet, social media, and online stores. What you need to do is learn how to protect your data, secure it, and make it impenetrable. This guide will teach you how to do that and more!Here’s what this audiobook includes:A guide on the basics of cybersecurity and networkingSteps to use Kali Linux to protect your dataA guide on classic and modern encryptionWays to deal with breaches in cybersecuritySteps to use VPN, TOR, and proxy chainsAnd so much more!Interested? Then scroll up, click on the "buy now” button and start listening! 1. Language: English. Narrator: Cyrus Carey. Audio sample: http://samples.audible.de/bk/acx0/183629/bk_acx0_183629_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 05.06.2020
Zum Angebot
Six Pixels of Separation: Everyone Is Connected...
9,95 € *
ggf. zzgl. Versand

At last, here's THE audiobook that 21st century entrepreneurs have been waiting for - the inner-secrets of how highly successful Internet capitalists make millions by knowing who to reach and how to reach them online. From viral loops to social networking to how to cut through all the cyber-clutter, Six Pixels of Separation is mandatory listening for anybody who wants to expand their business via the Internet.Six Pixels of Separation is the first book to unify the concepts of personal branding, digital marketing, and entrepreneurship in a clear, fun and provocative manner. By using case studies, this audiobook offers a complete set of tools, tactics, and insights to empower individuals to reach a global audience and consumer base with a few clicks of the mouse, and almost all of them for free.Digital marketing expert Mitch Joel unravels the fascinating world of new marketing, with a brand new perspective. Entrepreneurs are leveraging the digital channels to get their voice "out there", connecting to similar others, becoming better community citizens, and ultimately, making more money and rocketing their personal and business lives into the stratosphere. The trick is, personal brands are becoming bigger than corporate brands - and in Six Pixels of Separation listeners will begin to understand the "how" and "why" of how certain entrepreneurs have mastered the internet to propel their businesses. 1. Language: English. Narrator: Mitch Joel. Audio sample: http://samples.audible.de/bk/gdan/000301/bk_gdan_000301_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 05.06.2020
Zum Angebot
Privileged Attack Vectors
22,99 € *
ggf. zzgl. Versand

See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today's environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You'll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats

Anbieter: buecher
Stand: 05.06.2020
Zum Angebot
Privileged Attack Vectors
22,99 € *
ggf. zzgl. Versand

See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today's environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You'll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats

Anbieter: buecher
Stand: 05.06.2020
Zum Angebot
Firewalls Don't Stop Dragons
28,99 € *
ggf. zzgl. Versand

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You'll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don't really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves-step by step, without judgment, and with as little jargon as possible.

Anbieter: buecher
Stand: 05.06.2020
Zum Angebot