Våra barn växer idag upp på nätet. Att en stor del av vardagen utspelar sig online är en självklarhet för de allra flesta barn. I princip alla 10-åringar har en egen smartphone, en 10-årig pojke spelar i snitt datorspel tre timmar om dagen och 15 pr…
Internet har alltmer blivit en plats för trollfabriker, valfusk och företag som säljer vår personliga information till högstbjudande. Kina använder Facebooks och Googles algoritmer för att förtrycka muslimer i Xinjiang. Putins Ryssland har lyckats m…
I vårt alltmer digitaliserade samhälle flödar information mellan företag, myndigheter, privatpersoner och molnleverantörer. De flesta organisationer är helt beroende av fungerande IT och anslutning till internet. Utvecklingen går i ett rasande tempo…
I dag har i princip alla 10-åringar en egen smartphone, en 10-årig pojke spelar i snitt onlinespel tre timmar om dagen och 15 procent av alla tvååringar använder internet dagligen. Ändå frågar vi fortfarande våra barn hur de haft det i skolan eller…
Hur svartsjuk får man bli? Hur ofta kan man titta på en främmande människas Instagram? Hur mycket mensvärk måste man ha? Är Norge paradisets mittpunkt? Johanna är ihop med Emil. Emil har en exflickvän som heter Nora. Nora är allt Johanna inte är: v…
De digitala hoten är ständigt närvarande i våra uppkopplade liv. Facebook-bluffar, infekterade mejlbilagor och spionappar har blivit en del av vår vardag. Vi måste hela tiden vara på vår vakt för att inte läcka lösenord, förlora filer eller drabbas…
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and t…
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxur…
A ground shaking expose on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help yo…
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation…
Platsen är Damaskus. Året är 2011. Noura och Bassel träffas efter en manifestation när diktatorn Bashar al-Assad gått över alla gränser i kriget mot sitt eget folk. De ställs inför en ny digital frontlinje när it-konsulter från Frankrike, Italien oc…
Some copies of CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876) were printed without discount exam vouchers in the front of the books. If you did not receive a discount exam voucher with your book, please visit http: //media.wiley.com/pro…
En id-kapare handlar online med pengar från ditt konto. En falsk bankman ringer och uppmanar dig att logga in med ditt bank-id. En bedragare utan skam i kroppen hyr ut en semesterbostad men det idylliska huset med egen strand som du sett bilder på o…
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compro…
Network Security first-stepSecond EditionTom Thomas and Donald StoddardYour first step into the world of network securityNo security experience required Includes clear and easily understood explanations Makes learning easyYour first step to network…
From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than pr…
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a han…
Praise for Virtual Honeypots "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader's eyes." -Lenny Zeltser, Information Security Practice Leader at Gemini Systems "This is one of the…
In this text, the author of "Know Your Enemy" explores state-of-the-art security technologies called "Honeypots". It provides examples of real world deployments and coverage of the legal issues surrounding the use of honeypots. The CD includes white…
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and te…
Fully up-to-date coverage of every topic on the CEH v9 certification exam, plus one year of access* to the complete Ethical Hacker online lab environment from Practice LabsPrepare for the EC Council's Certified Ethical Hacker v9 exam with complete c…
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity--but they fail to address the everyday steps that boards, managers, and…
Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe.Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem…
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ul…
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is fill…
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security…
Behovet av att skydda och hantera data på ett säkert sätt växer i ?takt med krav på ökad tillgänglighet till information i samhället. Den tekniska säkerheten har blivit allt bättre och försöken från obehöriga att komma åt information förflyttas &nda…
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedd…
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and te…
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of art…
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, secur…
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analy…
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham We are living in…
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's imp…
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject…
A new edition of Shon Harris' bestselling exam prep guide-fully updated for the new CISSP 2018 Common Body of KnowledgeThoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive reso…
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and int…
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utiliz…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The latest tactics for thwarting digital attacks"Our new real…
This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can't. A…
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "c…
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography.The authors of…
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The…
"Thorough and comprehensive coverage from one of the foremost experts in browser security." -Tavis Ormandy, Google Inc. Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced toge…
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat P…
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information,…
Rootkits and Bootkits delivers a master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats. We're talking hard stuff - attacks buried deep in a machine's boot process or UEFI f…