Catalog Search Results
44) Gone
Author
Series
Language
English
Description
"A crime lord has declared war on America. Only Detective Michael Bennett knows why. Manuel Perrine doesn't fear anyone or anything. A charismatic and ruthless leader, Perrine slaughters rivals as effortlessly as he wears his trademark white linen suit. Detective Michael Bennett once managed to put Perrine behind bars, the only official in the US ever to accomplish that. But now Perrine is out, and he has sworn to find and kill Bennett and everyone...
46) Data for all
Author
Language
English
Formats
Description
The data you generate every day is the lifeblood of many large companies--and they make billions of dollars using it. In Data for All, bestselling author John K. Thompson outlines how this one-sided data economy is about to undergo a dramatic change. Thompson pulls back the curtain to reveal the true nature of data ownership, and how you can turn your data from a revenue stream for companies into a financial asset for your benefit.
Author
Series
Language
English
Formats
Description
"Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer...
48) Tin Lizzie
Author
Pub. Date
[2008]
Language
English
Description
Grandpa loves working on old cars, especially his Model T Ford.
50) GDPR for dummies
Author
Series
Language
English
Formats
Description
This guide provides simple steps to help you comply with the GDPR, the General Data Protection Regulation, a set of rules you need to follow if your business has any dealings with EU countries or if you are established in the EU.
Author
Pub. Date
2008
Language
English
Description
There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. Destined to be the classic reference in this emerging field, Security & Usability collects 34 groundbreaking essays from leading security and human-computer interaction (HCI) researchers on authentication, privacy and anonymity, secure systems, commercialization, and much more. It is expected to...
54) The information systems security officer's guide: establishing and managing a cyber security program
Author
Pub. Date
[2016]
Language
English
Description
This edition provides users with information on how to combat the ever-changing myriad of threats security professionals face. It presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. It outlines how to implement a new plan or evaluate an existing...
Author
Pub. Date
2013
Language
English
Description
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including...
58) Fake ID
Author
Language
English
Appears on list
Description
"An African-American teen in the Witness Protection Program moves to a new town and finds himself trying to solve a murder mystery when his first friend is found dead"--
Author
Pub. Date
2023
Language
Deutsch
Description
IT-Governance ist Teil der Corporate Governance und besteht aus Handlungsfeldern, Zielen und Zwecken sowie prozessorientierten, strukturellen, personellen und instrumentellen Elementen. Diese gilt es zu einem konsistenten und ganzheitlichen Ordnungsrahmen für die IT zusammenzufügen.Dieses Buch beschreibt praxisorientiert und systematisch die Grundlagen und einzelne Handlungsfelder der IT-Governance im Detail. Diese Handlungsfelder sowie Mechanismen...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request