Listing 1 - 10 of 24 | << page >> |
Sort by
|
Choose an application
netwerkbeheer --- computercriminaliteit --- computerbeveiliging --- Computer architecture. Operating systems
Choose an application
If you want to know the secrets to incident response and investigating cyber crime on Windows systems, this is THE book and DVD package!
Computer architecture. Operating systems --- MS Windows --- computercriminaliteit
Choose an application
Criminology. Victimology --- Criminal law. Criminal procedure --- Computer. Automation --- privacy --- computercriminaliteit
Choose an application
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winklers experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations. *Written by an internationally renowned author of "Spies Among Us" who travels the world making security presentations to tens of thousands of people a year * This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies * Describes the REAL security threats that you have to worry about, and more importantly, what to do about them.
Computer architecture. Operating systems --- Information systems --- internet --- computerbeveiliging --- computercriminaliteit
Choose an application
Onderzoeksjournalist Huib Modderkolk deed jarenlang onderzoek naar de digitale wereld. Hij begon als leek, maar won steeds meer het vertrouwen van bronnen, die hem de schaduwkant van de moderne wereld toonden. Modderkolk beschrijft stapsgewijs hoe groot de afhankelijkheid van technologie is en welke risico's daarmee gepaard gaan. Vijandige regimes dringen ongezien Nederlandse organisaties binnen en overheden en bedrijven slurpen data. Iedere ontdekking roept nieuwe vragen op. Wie leest mee met onze appjes? Hoe ver reiken de tentakels van de Nederlandse veiligheidsdiensten? En hoe kunnen we onszelf beschermen? Aan de succesvolle eerste editie, die tienmaal herdrukt moest worden, voegde Modderkolk een actueel voorwoord en hoofdstuk toe. Daarin laat hij een nieuw onderdeel van de online strijd zien: het beïnvloeden van het maatschappelijk sentiment. Twee Spanjaarden foppen sociale media, maar verliezen de controle over hun uitvinding. Als het middel vervolgens in Russische handen valt, is de geest uit de fles.
Human rights --- Polemology --- Computer. Automation --- Computer architecture. Operating systems --- internet --- computerbeveiliging --- computercriminaliteit
Choose an application
Criminal law. Criminal procedure --- Tort and negligence --- Computer. Automation --- computerbeveiliging --- computercriminaliteit
Choose an application
Social problems --- Criminology. Victimology --- Criminal law. Criminal procedure --- witteboordencriminaliteit --- fraude --- computercriminaliteit
Choose an application
Choose an application
Computer. Automation --- Criminal law. Criminal procedure --- computercriminaliteit --- Germany --- Computer crimes --- Criminal law --- Droit pénal --- Droit pénal
Choose an application
Listing 1 - 10 of 24 | << page >> |
Sort by
|