Catalog Search Results
Author
Description
In 2013, former National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking...
Author
Description
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle...
Author
Description
Was Edward Snowden a patriot or a traitor?
Just how far do American privacy rights extend?
And, how far is too far when it comes to government secrecy in the name of security?
These are just a few of the questions that have dominated American consciousness since Edward Snowden exposed the breath of the NSA's domestic surveillance program.
In these seven previously unpublished essays, a group of prominent legal and political experts delve in to...
Author
Description
Wireless Hacking 101 - How to hack wireless networks easily! This book is perfect for computer enthusiasts that want to gain expertise in the interesting world of ethical hacking and that wish to start conducting wireless pentesting. Inside you will find step-by-step instructions about how to exploit WiFi networks using the tools within the known Kali Linux distro as the famous aircrack-ng suite. Topics covered: • Introduction to WiFi Hacking •...
Author
Description
Wie Sie Ihren Internetempfang optimieren können
Das Internet ist aus unserem Alltag nicht mehr wegzudenken. Wir nutzen es für die Arbeit, die Unterhaltung, die Kommunikation und vieles mehr. Doch was tun, wenn der Internetempfang zu langsam oder zu schwach ist? In diesem Buch zeige ich Ihnen, wie Sie Ihren Internetempfang optimieren können, indem Sie einige einfache Schritte befolgen.
Zunächst erkläre ich Ihnen, wie das Internet funktioniert...
Author
Description
We live in a digital age where everyone needs to be cyber security aware, and understand the cyber security basics to stay safe online. Hack Proof Yourself! gives you all the information you need to keep yourself and your family secure in today's digital world. This book provides practical to the point guidance and step-by-step instructions on how to stay safe and secure and identify the various types of scams that turn individuals into victims of...
Author
Description
The technical awareness of the legal system with regards to cloud technologies is increasing. The courts are beginning to take a useful, pragmatic and well balanced approach to evaluating the fairness and effectiveness of service provider T&C's in meeting customer information security requirements and obligations. The concept of what is reasonable is central to this balance. It is also nothing new. This after all is what corporate diligence is all...
Author
Description
The book that every parent should read to their child before they go on the Internet.
The odds are very good that your child will not be negatively, impacted by the Internet. But, if they are, it can be devastating. Cyber Bullying KILLS kids. (This is book is dedicated to them and you can read some of their names inside.) Predators scour the Internet looking for victims. Identity Theft affects MILLIONS of people in the US and young adults are being,...
29) The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process
Author
Description
The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation's corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the American people. This book was written in 1983 as a warning. Today it is a history. Most of its grim scenarios are now part of everyday life. The remedy proposed here, greater public oversight of industry and government,...
Author
Description
Your Personal Information is at Risk is a detailed, informative, and comprehensive book that explores the current various threats to the security of personal information. This information can be stored on phones or computers, and can also be accessed by scam artists calling a home and tricking people into sharing personal information. The author uses personal experience, as well as research, to describe current threats, and solutions to mitigate the...
Author
Description
The purpose of this document is to describe the method by which the security controls will be assessed. In addition, the test methodology, test procedures, and test tools are described to ensure consistency and repeatability of the assessment process. The execution of this plan provides the assessment results, which are used as the basis for the decision by the Authorizing Official. An assessment of the system is a requirement of the Federal Information...
Author
Description
Amenazados presenta una advertencia urgente: mostrar los peligros que entraña Internet para todos quienes la utilizamos, pues ella es parte de nuestras vidas, casi como el aire que respiramos. Este libro es una invitación a conocerla por dentro, a internarse en las maravillosas posibilidades que ofrece, pero también en la naturaleza implacable del mal que inevitablemente trae consigo.
Amenazados es sobre todo una manera de conocer las condiciones...
Author
Description
This book will take you through the basics, like Drupal and Ubercart installation and common settings, and as we proceed through the chapters, we'll implement more advanced techniques. Whether you know Drupal or not, this book will be your guide to creating a powerful e-commerce web site. If you are a business owner wanting to create an eCommerce website for your company or to upgrade a company eShop to be easier to maintain and have advanced e-shopping...
Author
Series
Description
¿Por qué las mujeres suelen sentirse menos competentes cuando usan tecnología? ¿Por qué esto les pasa más a partir de cierta edad? ¿Es casualidad que en Wikipedia haya muchas más biografías de hombres? ¿Y que los asistentes virtuales tengan nombre de mujer? ¿Por qué casi todos los deep fakes son pornografía creada sin el permiso de las mujeres cuyas imágenes se usan?
Author
Description
The disorganised array of modules available for Moodle are brought together in ways you can relate to. Reviews include details that will help you decide if a module is worth testing. There are illustrated, step-by-step guides to installing and configuring modules. If you are involved in teaching using Moodle, be it at relatively small institutions running their own Moodle instance, or at large institutions where Moodle is used and administered, or...
Author
Description
Are you frustrated with your computer? Bombarded by error messages? Did your uncle's neighbor's cat's cousin come over and install pirated software? Is your computer dreadfully slow? Don't bother buying a new one! In this book, you'll learn:
About viruses, spyware, toolbars, and spam
How fake cleaning programs turned the industry into a grease fire
(and how your local computer guy may be pouring water on it)
What really causes slow computers
How...
Author
Series
Description
Covers topics from what the dark web is, to how it works, to how you can use it, to some of the myths surrounding it.
Casting Light on the Dark Web: A Guide for Safe Exploration is an easy-to-read and comprehensive guide to understanding how the Dark Web works and why you should be using it! Readers will be led on a tour of this elusive technology from how to download the platform for personal or public use, to how it can best be utilized for finding...
38) Digital Dangers: Navigating the Perils of Online Safety and Piracy. Protecting Yourself and Your Con
Author
Description
"Digital Dangers: Navigating the Perils of Online Safety and Piracy" is a comprehensive guide that sheds light on the pervasive threats lurking in the vast landscape of the internet. From cyberbullying and online predators to phishing scams and identity theft, this book delves into the various forms of digital dangers that individuals face in today's increasingly connected world. Through real-life examples and expert insights, readers are equipped...
Author
Description
This book provides an overview of the Authorizing Official (AO) role in the Risk Management Framework (RMF) process, discusses implications of performing AO duties and emphasizing RMF as a continuous process. In addition, it provides guidance for analyzing the Security Authorization Package (SAP) and making the authorization decision. It provides a means to protect the information system (IS), the information it processes, and thus, the Authorization...
Author
Description
Cybersecurity Issues Challenge Literally Everyone. In today's connected world, everyone benefits from cybersecurity. Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk.
At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request