Computers / System Administration / Security

Best Selling

Language

All

English (21)

French (4)

German (0)

Spanish (1)

Italian (0)

 

Release Date

All

Last 7 days (0)

Last 30 days (0)

Current year (0)

 

Catalog Date

All

Last 7 days (0)

Last 30 days (0)

Current year (4)

 

Category

Delete Security

 

Audience

Adult (21)

 

Publisher

BCS, The Chartered Institute for IT (6)

 

Format

All

PDF (0)

EPUB (18)

AUDIOBOOK (3)

 

Total Loans

All (6)

20 - 40 (1)

40 - 100 (0)

Over 100 (5)

More options

Results : 1 - 21 of 21 Sorted by : 

Information Risk Management: A practitioner's guide

by David Sutton BCS, The Chartered Institute for IT (November 26, 2014)

Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development...


Mobile Computing: Securing your workforce

by BCS The Chartered Institute for IT BCS, The Chartered Institute for IT (December 23, 2011)

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly...


Bring Your Own Device (BYOD): The mobile computing challenge

by Bcs, The Chartered Institute for It BCS, The Chartered Institute for IT (May 01, 2013)

The increasing use of personal devices such as smartphones and tablets at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to...


Guide to Windows 8 - Not 4 Geeks

by Christian Schönberger, Sonberger Krisztian Pfa & Christian Schönberger Sonberger Krisztian Pfa (October 19, 2012)

Every new version of Windows is more complex than the older versions. Even if the newer version contains a dozen new wizards and other helps, an average user needs more and more time to learn how to use the...


The Red Web

by Andrei Soldatov & Irina Borogan PublicAffairs (September 07, 2015)

A Library Journal Best Book of 2015

A NPR Great Read of 2015

The Internet in Russia is either the most efficient totalitarian tool or the device by which totalitarianism will be overthrown. Perhaps both.

On...


Democracy Hacked

by Martin Moore Oneworld Publications (September 27, 2018)

Technology has fractured democracy, and now there’s no going back.

All around the world, the fringes have stormed the palace of the elites and unleashed data miners, dark ads and bots on an unwitting public....


The Future of Violence

by Benjamin Wittes, Gabriella Blum & Tom Weiner Blackstone Publishing (March 10, 2015)

From drone warfare in theMiddle East to digital spying by the National Security Agency, the USgovernment has harnessed the power of cutting-edge technology to awesomeeffect. But what happens when ordinary people...


Cyberdeterrence and Cyberwar

by Martin C. Libicki & Erik Sandvold Blackstone Publishing (November 09, 2010)

The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information...


CRACK99

by David Locke Hall & Mark Peckham Blackstone Publishing (October 19, 2015)

The utterly gripping story of the most outrageous case of cyber piracy prosecuted by the US Department of Justice

A former US Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding...


The Business of Cybersecurity

by Ashwini Sathnur Business Expert Press (May 07, 2019)

Cyber security could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research....


Hands-on Incident Response and Digital Forensics

by Mike Sheward BCS, The Chartered Institute for IT (July 12, 2018)

Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what...


The Ultimate GDPR Practitioner Guide

by Stephen R Massey Fox Red Risk (December 20, 2017)

The Ultimate GDPR Practitioner Guide provides those tasked with implementing Data Protection processes, useful information on how to achieve compliance with GDPR. The book is crammed with advice, guidance and...


Digital Forensic Science

by Vassil Roussev, Elisa Bertino & Ravi Sandhu Morgan & Claypool Publishers (December 28, 2016)

Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical...


Privacy Risk Analysis

by Sourya Joyee De & Daniel Le Métayer Morgan & Claypool Publishers (September 06, 2016)

Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.

The deployment of new information...


Cyber Security: A practitioner's guide

by David Sutton BCS, The Chartered Institute for IT (July 10, 2017)

Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your...


We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

by Parmy Olson Little, Brown and Company (June 05, 2012)

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind...


The Red Web

by Andrei Soldatov & Irina Borogan PublicAffairs (September 08, 2015)

A Library Journal Best Book of 2015

A NPR Great Read of 2015

The Internet in Russia is either the most efficient totalitarian tool or the device by which totalitarianism will be overthrown. Perhaps both.

On the...


Computer Security (Speedy Study Guides)

by Speedy Publishing Dot EDU (April 28, 2015)

Computer thieves are everywhere and most of them are untraceable for weeks - months maybe. Learning to add computer security will ensure that all sensitive information stored online are kept safe. This quick...


Information Security Auditor: Careers in information security

by Wendy Goucher BCS, The Chartered Institute for IT (March 10, 2016)

The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent introduction to the role, covering...


We Are Anonymous

by Parmy Olson Little, Brown and Company (June 04, 2012)

A thrilling, exclusive exposè of the hacker collectives Anonymous and LulzSec.

We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind...


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

by William L. Simon, Kevin Mitnick & Steve Wozniak Little, Brown and Company (August 15, 2011)

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting...