Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Online Banking Security Measures and Data Protection, Aljawarneh Shadi A.


Варианты приобретения
Цена: 208830.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 240 шт.  
При оформлении заказа до:
Ориентировочная дата поставки:
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Aljawarneh Shadi A.
Название:  Online Banking Security Measures and Data Protection
ISBN: 9781522508649
Издательство: Mare Nostrum (Eurospan)
Классификация:




ISBN-10: 1522508643
Обложка/Формат: Hardback
Страницы: 301
Вес: 0.81 кг.
Дата издания: 30.10.2016
Серия: Advances in information security, privacy, and ethics
Язык: English
Иллюстрации: Black & white illustrations
Размер: 254 x 178 x 21
Читательская аудитория: Professional and scholarly
Ключевые слова: Banking
Рейтинг:
Поставляется из: Англии
Описание: Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever.Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security.

Audacity to spy

Автор: Nolan, Catherine Wilson, Ashley M.
Название: Audacity to spy
ISBN: 1935504797 ISBN-13(EAN): 9781935504795
Издательство: Gazelle Book Services
Рейтинг:
Цена: 30010.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Ever get the feeling you are being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalise their own services and to sell to other advertisers for behavioural marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasnt enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users valuable personal and financial information. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.

Privacy in Mobile and Pervasive Computing

Автор: Marc Langheinrich, Florian Schaub
Название: Privacy in Mobile and Pervasive Computing
ISBN: 1681734583 ISBN-13(EAN): 9781681734583
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 76690.00 T
Наличие на складе: Невозможна поставка.
Описание: It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes ""privacy"" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

Privacy in Mobile and Pervasive Computing

Автор: Marc Langheinrich, Florian Schaub
Название: Privacy in Mobile and Pervasive Computing
ISBN: 1681731177 ISBN-13(EAN): 9781681731179
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 56370.00 T
Наличие на складе: Невозможна поставка.
Описание: It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes ""privacy"" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

Exchanging Terrorism Oxygen For Media Airwaves

Автор: Eid
Название: Exchanging Terrorism Oxygen For Media Airwaves
ISBN: 1466657766 ISBN-13(EAN): 9781466657762
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 189420.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The onset of the digital age and the ubiquity of media communications have presented new opportunities for terrorist groups and organisations to communicate globally and publicise their actions. Research surrounding the relationship between terrorism and both traditional and new media outlets is necessary in order to promote a better understanding of the ways in which the media can both fuel and inhibit terrorism in the era of increased digital connectivity.Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia presents a timely and thorough discussion on the integration of terrorism and the media, exploring the influence of traditional and new media on global terrorism. Featuring comprehensive research from leading experts in the field, this publication is ideally suited for scholars, upper-level students, professionals, and policymakers working and studying in fields such as media communications, international relations, national security, crisis management, criminology, and sociology.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 123910.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Asset Protection and Security Management Handbook

Автор: Walsh
Название: Asset Protection and Security Management Handbook
ISBN: 0849316030 ISBN-13(EAN): 9780849316036
Издательство: Taylor&Francis
Рейтинг:
Цена: 132710.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Covers the fundamental aspects of security and security management. This book provides non-security information, from basic investigations work, legal issues, and ethics to workplace violence and risk analysis. It intends to enable the development of emergency/disaster plans and procedures, and analyze risk and exposure.

Iot security issues

Автор: Gilchrist, Alasdair
Название: Iot security issues
ISBN: 1501514741 ISBN-13(EAN): 9781501514746
Издательство: Walter de Gruyter
Рейтинг:
Цена: 42150.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things.

This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained.

The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.


Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Автор: Christopher Laing, Atta Badii, Paul Vickers
Название: Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
ISBN: 1466626593 ISBN-13(EAN): 9781466626591
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 189420.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. <br><br><em>Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection</em> provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.

Federal Information Security: Select Protection & Control Efforts

Автор: David G Miller, Ivan I Wilson
Название: Federal Information Security: Select Protection & Control Efforts
ISBN: 1619427710 ISBN-13(EAN): 9781619427716
Издательство: Nova Science
Рейтинг:
Цена: 149940.00 T
Наличие на складе: Невозможна поставка.
Описание: In the last several years, federal agencies have increasingly adopted the use of wireless technologies. While wireless technologies provide many potential benefits, including greater flexibility for a mobile workforce and ease of installation and use, they also pose significant risks to information and systems. Wireless technologies use radio waves instead of direct physical connections to transmit data between networks and devices. As a result, without proper security precautions, these data can be more easily intercepted and altered than if being transmitted through physical connections. This book examines the select protection and control efforts being utilised to secure federal agency wireless networks, the FDIC; and the national nuclear administration.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия