Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
Online shoppen, tickets bestellen, je stem uitbrengen... Hoe veilig is dat ? De tijd dat we onbezorgd konden surfen en mailen, behoort inmiddels definitief tot het verleden. Computers van ministers worden gehackt, afluisterschandalen volgen elkaar op en banken krijgen te maken met massale cyberaanvallen. Telkens opnieuw worden we met onze neus op de feiten gedrukt: de cyberruimte krioelt van de gevaren.Cybergevaar geeft een overzicht van al die bedreigingen. Wat is malware ? Hoe werkt de ondergrondse cybereconomie ? Wat is cyberspionage ? En - last but not least - wat staat ons morgen allemaal te wachten en hoe kunnen burgers en bedrijven zich tegen deze cybergevaren wapenen ? Een thriller waarin niets verzonnen is.Bron : http://www.lannoo.be
internet --- computercriminaliteit --- computerbeveiliging --- Computer architecture. Operating systems --- Computer security --- Computer viruses --- Computerbeveiliging --- Computers--Beveiliging --- Computervirussen --- Informatique--Sécurité --- Sécurité informatique --- Virus d'ordinateur --- cybercriminaliteit --- misdaad --- malware --- Internet --- Computercriminaliteit --- Criminaliteit --- Trends --- Computer networks --- Security measures --- Trend
Choose an application
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.
Cyberterrorism --- Prevention. --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Computer crimes --- Terrorism --- Electronic terrorism (Cyberterrorism) --- Computer security. --- Public safety. --- Computer crimes. --- Computer networks --- Systems and Data Security. --- Crime Control and Security. --- Computer Crime. --- Security Science and Technology. --- Security Services. --- Mobile and Network Security. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Safety, Public --- Human services --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- System safety. --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Prevention
Choose an application
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts.
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Transport law --- Chemins de fer --- Commerce --- Handel --- Législation --- Spoorwegen --- Transports --- Vervoer --- Wetgeving --- 347.763 --- Railroad law --- Railroads --- -#A9110A --- 13.07 --- Iron horses (Railroads) --- Lines, Railroad --- Rail industry --- Rail lines --- Rail transportation --- Railroad industry --- Railroad lines --- Railroad transportation --- Railway industry --- Railways --- Communication and traffic --- Concessions --- Public utilities --- Transportation --- Trusts, Industrial --- Government regulation of railroads --- Law, Railroad --- Corporation law --- Railroads and state --- Transportrecht. Vervoerrecht--(verkeerswetgeving z.{351.81}; verkeer z.{656}) --- Freight --- Wettelijke en contractuele aansprakelijkheid ; Spoorwegen --- Law and legislation --- Railroad law. --- Freight. --- 347.763 Transportrecht. Vervoerrecht--(verkeerswetgeving z.{351.81}; verkeer z.{656}) --- #A9110A --- Car service (Freight) --- Freight-car service --- Freight and freightage --- Traffic
Choose an application
Utrecht, 13 februari 2034. Een zelfrijdende auto wordt gehackt en ontregeld, met een dodelijke crash tot gevolg. De NAVO, die toeziet op de mondiale internetbeveiliging, beseft dat de wereld in gevaar is wanneer kort daarop nog twee andere aanslagen plaatsvinden. Europolinspecteur Lara Hartman en communicatieverantwoordelijke Frank Willems starten een koortsachtige klopjacht naar de daders achter deze cyberterreur. Alles lijkt te wijzen op een gevaarlijk computervirus. Er volgt een race tegen de klok om een antivirus te vinden dat het kwaad kan stoppen...
Choose an application
Listing 1 - 10 of 13 | << page >> |
Sort by
|