In Book 3, 5th and 6th graders are maturing, becoming more independent and online activities are second nature. “From Street-smart to Web-wise®: A Cyber Safety Training Manual Built for Teachers and Designed for Children,” is...Loe edasi...
In Book 3, 5th and 6th graders are maturing, becoming more independent and online activities are second nature. “From Street-smart to Web-wise®: A Cyber Safety Training Manual Built for Teachers and Designed for Children,” is...Loe edasi...
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. This isnt just another book—its a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with co...Loe edasi...
Book 2 continues as the tiny fingers in Book 1 Grades K—2 grow and become more familiar with online activities. The critical job of ensuring our children’s safety expands as students become more independent and begin to have greater online autonom...Loe edasi...
The information security arena is often vague and confusing for internet users, both young and old. New traps are being devised daily, and falling into them can take legal, ethical, financial, physical, and mental tolls on individuals. With increa...Loe edasi...
The information security arena is often vague and confusing for internet users and fallling into cyber traps can take ethical, financial, physical and mental tolls on individuals. With increasing cases of fake news, identity theft, piracy, spying...Loe edasi...
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our childrens safety online has never been more crucial. “From Street-smart to Web-wise®: A Safety Training Manual Built for Teachers and Designed...Loe edasi...
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our childrens safety online has never been more crucial. “From Street-smart to Web-wise®: A Safety Training Manual Built for Teachers and Designed...Loe edasi...
Ken Huang, Carlo Parisi, Lisa JY Tan, Winston Ma, Zhijun William Zhang
Sari: Future of Business and Finance
(Ilmumisaeg: 05-Jun-2024, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031580017)
With the recent debacle surrounding the cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of grasping the security and regulation of Web3, cryptocurrency, and blockchain projects has been magnified. To avo...Loe edasi...
(Ilmumisaeg: 16-Apr-2024, Paperback / softback, Kirjastus: MIT Press, ISBN-13: 9780262548182)
A biography of Tor—a cultural and technological history of power, privacy, and global politics at the internets core.Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure...Loe edasi...
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from...Loe edasi...
This books objective is to present an interdisciplinary and easily understandable book on the Dark Web. This research will benefit security agencies, security professionals, counter-terrorism experts, and policymakers. This book has covered dark...Loe edasi...
What are cyber crimes on the dark web? How people are doing business, and which areas are mostly focused on the dark web. This books objective is to present an interdisciplinary and easily understandable book on the Dark Web. This research will b...Loe edasi...
(Ilmumisaeg: 21-Nov-2023, Paperback / softback, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284267952)
Print Textbook amp Cloud Lab Access: 8 -day subscription.The cybersecurity Cloud Labs for Internet and Web Application Security provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will lear...Loe edasi...
Online user privacy is a delicate issue that has been unfortunately overlooked by technology corporations and especially the public since the birth of the internet. Many online businesses and services such as web search engines, retailers, and socia...Loe edasi...
Presents both multidisciplinary and interdisciplinary works on questions related to experiences and phenomena that can or could be covered by concepts regarding the protection and privacy of web service users. The book further highlights the importa...Loe edasi...
The objective is to publish both disciplinary, multidisciplinary and interdisciplinary works on questions related to experiences and phenomena that can or could be covered by concepts regarding the protection of privacy of web services users. Anothe...Loe edasi...
(Ilmumisaeg: 12-Dec-2022, Paperback / softback, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284206166)
Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry ex...Loe edasi...
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking&;until now. This practical guide provides both offensive and defensive security concepts that so...Loe edasi...
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these...Loe edasi...
(Ilmumisaeg: 11-Sep-2018, Paperback / softback, Kirjastus: MIT Press, ISBN-13: 9780262536059)
How the smartphone can become a personal concierge (not a stalker) in the mobile marketing revolution of smarter companies, value-seeking consumers, and curated offers....Loe edasi...
(Ilmumisaeg: 17-Apr-2017, Hardback, Kirjastus: MIT Press, ISBN-13: 9780262036276)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Lets say youre out of something, or you need something, or you want something. And, seemingly out of the blue, an ad pops up on your phone to say that very thing is now available at the next store on your right. Did...Loe edasi...
Internet is not sure, but very friendly to storage and manipulate data. Customer confidence in internet software is based on the ability of the site to prevent damages and attacks. But secure software is complicated, and depends of several factors :...Loe edasi...
This book constitutes the refereed proceedings of the 7th International Conference on E-Technologies, MCETECH 2017, held in Ottawa, ON, Canada, in May 2017. This year’s conference drew special attention to the ever-increasing role o...Loe edasi...
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enter...Loe edasi...
This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analysis of the reasons behind the choices, the book co...Loe edasi...
(Ilmumisaeg: 30-Jul-2011, Hardback, Kirjastus: Chelsea House Publishers, ISBN-13: 9781604136982)
The Internets easy, anonymous contact has allowed murderers and pedophiles unprecedented access to connect with their victims and lure them away from the safety of their homes. These cyberpredators use information technology to attack and victimi...Loe edasi...
This publication discusses the uses and potential of virtual technologies and examines secure policy formation and practices that can be applied specifically to each--Provided by publisher....Loe edasi...
(Ilmumisaeg: 08-Sep-2010, Paperback / softback, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9780763791957)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Security Strategies in Web Applications and Social Networking provides a unique, in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written...Loe edasi...
(Ilmumisaeg: 30-Sep-2009, Hardback, Kirjastus: Artech House Publishers, ISBN-13: 9781596934474)
Computer security specialist Oppliger (U. of Zurich) has created a textbook from material he wrote and assembled for a course on the two security protocols most widely used in Internet contexts: secure sockets layer, and transport layer security--SSL...Loe edasi...
Web applications have become the most effective and exploited route for system compromise. Cross-site scripting (XSS) is a Web-based attack vector that can be used to steal sensitive information, hijack user sessions, and compromise browser and syste...Loe edasi...
Keqiu Li, Chris Jesshope, Hai Jin, Jean-Luc Gaudiot
Sari: Lecture Notes in Computer Science
(Ilmumisaeg: 06-Sep-2007, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540747833)
This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2007, held in Dalian, China in September 2007.The 53 revised full papers presented were carefully selected from over 600 submis...Loe edasi...
(Ilmumisaeg: 24-Feb-2006, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9780470018828)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Symbian OS is an advanced, customizable operating system, which is licensed by the worlds leading mobile phone manufacturers. The latest versions incorporate an enhanced security architecture designed to protect the interests of consumers, network o...Loe edasi...
(Ilmumisaeg: 16-Nov-2005, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540298106)
These proceedings contain the papers presented at the 2005 IFIP International Conference on Network and Parallel Computing (NPC 2005), held in Beijing, China, between November 30 and December 3, 2005. The goal of the conference was to establish an in...Loe edasi...
(Ilmumisaeg: 09-Dec-2003, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9780470857441)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them Based on real-world situati...Loe edasi...
Safety Monitor provides hands-on, step-by-step, practical instruction for parents to protect their children from exploitation, sexual predators, adult-only content, pornography, and other harmful content that comes with computer and Internet access....Loe edasi...
(Ilmumisaeg: 31-Oct-2002, Hardback, Kirjastus: Artech House Publishers, ISBN-13: 9781580533485)
Intended for professionals, this comprehensive security primer covers the major topics in the field, with chapters on HTTP, proxy servers and firewalls, cryptography, internet security protocols, SSL and TSL protocols, certificate management and publ...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Web site developers balance their need to collect information about users with their obligation to show respect for their users privacy. The Platform for Privacy Preferences Project, or P3P, has emerged as a technology that may satisfy the...Loe edasi...
(Ilmumisaeg: 25-Oct-2002, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9780471232810)
Covers security basics and guides reader through the process of testing a Web site. Explains how to analyze results and design specialized follow-up tests that focus on potential security gaps. Teaches the process of discovery, sc...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Since human error keeps computers vulnerable despite such precautions as firewalls, the lead author of Hacking Exposed (Osborne McGraw-Hill, 2001) and his colleagues at an enterprise vulnerability management firm introduce the e-commerce playgroun...Loe edasi...
This guide for users and administrators examines the real risks inherent in Web use and outlines techniques and available technologies for minimizing security threats. The book covers the architecture of the Web, cryptography, SSDL and TLS, digital...Loe edasi...