Books tagged: data security

These results show books which have been specifically tagged with this keyword. You can also try doing a general search for the term "data security" .
You may also limit results to books that contain two tags.
Some content may be filtered out. To view such content, change your filtering option.

Found 14 results

Efficient Ways to Use the Internet Securely
Price: $2.99 USD. Words: 15,720. Language: English. Published: March 17, 2019. Categories: Nonfiction » Computers & Internet » Internet / security, Nonfiction » Computers & Internet » Buyer’s guides
Do you have concerns about your online safety and privacy? Do you want to protect your online transactions efficiently? You are not alone ! This book explains the potential risks you may be exposed to and how to protect your privacy, digital assets and devices so you can use the Internet securely. Make this book your valuable companion in the vast world of Internet.
Online Hacker Survival Guide
Price: $3.99 USD. Words: 5,610. Language: English. Published: October 23, 2018. Categories: Nonfiction » Computers & Internet » Data storage, Nonfiction » Computers & Internet » Online services / general
The 21st century is not only an era of technical and computer innovations but the time when each of us can face a hackers’ attack. You may have noticed that your computer started acting unusual, for example, suddenly opened a CD drive or launched programs without any command. Such a weirdness can be explained by system mistakes, but it’s also likely to be outer intervention to your computer system
Crash Course Data Security
Price: $2.99 USD. Words: 6,450. Language: English. Published: May 3, 2018 by Can Akdeniz. Categories: Nonfiction » Computers & Internet » Security
Everything comes with its advantages and disadvantages just like the digital world. The invention of the digital world took us all by surprise and now has become an integral part of our lives. It is almost impossible to think of a world without the internet, social media and or electronic gadgets.
Auditing Your Windows Infrastructure, Intranet And Internet Security: A Practical Audit Program for Assurance Professionals
Price: $21.95 USD. Words: 10,390. Language: English. Published: January 21, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Business & Economics » Auditing
"Auditing Your Windows Infrastructure, Intranet and Internet Security" is a guide book that provide IT Assurance professionals step by step information on how to carry out security audit of Windows infrastructure, their organization's intranet network and interface with the internet. Assurance professional can use this book to draw up a robust security assessment program for their organization.
Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data
Price: $7.99 USD. Words: 21,720. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists.
10 Things That Used to be Good Ideas in Data Security
Price: $5.99 USD. Words: 25,520. Language: English. Published: July 30, 2014. Categories: Nonfiction » Computers & Internet » Security
In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change.
No Easy Out
Price: $3.99 USD. Words: 65,220. Language: English. Published: May 29, 2013. Categories: Fiction » Mystery & detective » General
A new girlfriend and his computer software business inexorably draw Dave Burke into things that he never anticipated – and never wanted. Trapped in the world of New York organized crime, he survives attempts on his life and his family and exacts retribution for these attacks. In the end, he is faced with a life-changing decision where all alternatives carry a high personal cost.
Bullet Proof Your Business
Price: $9.99 USD. Words: 47,220. Language: English. Published: March 5, 2013. Categories: Nonfiction » Business & Economics » Corporate governance
There has never been an era in business which compares with the current time, where businesses are subject to the level of internal and external threats. The internet, use of electronic data, an increase in litigation, and a trend for employees to change jobs regularly, have created a unique, but dangerous environment. Read on to bulletproof your business..
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
Price: $4.99 USD. Words: 2,420. Language: English. Published: July 17, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Internet / security
Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS.
Protecting Confidential Information: How to Securely Store Sensitive Data
Price: $3.99 USD. Words: 3,120. Language: English. Published: April 25, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Data storage
Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more
Also check out some similar keyword tags authors have used: