Security & Encryption - 184 - Page 3 - Blowout Sale! Save up to 85%
Blowout Sale! Up to 85% off on Security & Encryption at Spring Brook Audio, Page 3. Top brands include Cyber Punk Architects, Abraham K White, Springer, Unknown, Hachette Audio, Greenwald Glenn, Tantor Audio, Blackstone Audio, Inc., Novel Audio, Random House Audio, McGraw-Hill Education, Academic Press, & Brand: Wiley-VCH. Hurry! Limited time offers. Offers valid only while supplies last.
The Art of Deception: Controlling the Human Element of Security
4.2 out of 5 stars with 125 reviews
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of
How to Measure Anything in Cybersecurity Risk
4.3 out of 5 stars with 70 reviews
A ground shaking exposé on the failure of popular cyber risk management methods.
How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
You Save: 84%
mpn: 41370799, ean: 9781250062581, isbn: 1250062586,
4.9 out of 5 stars with 48 reviews
By Glenn Greenwald, star of Citizenfour, the Academy Award-winning documentary on Edward SnowdenIn May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and
Cyber War: The Next Threat to National Security and What to Do About It
4.8 out of 5 stars with 175 reviews
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security-and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government,
Cybersecurity and Cyberwar: What Everyone Needs to Know
4.7 out of 5 stars with 105 reviews
In Cybersecurity and Cyberwar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
By Blackstone Audio, Inc.
4.9 out of 5 stars with 18 reviews
The previously untold - and previously highly classified - story of the conflux of espionage and technology, a compelling narrative rich with astonishing revelations, taking listeners from World War II to the Internet age.
As the digital era become
Hackers: Heroes of the Computer Revolution: 25th Anniversary Edition
4.3 out of 5 stars with 7 reviews
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
Dark Territory: The Secret History of Cyber War
By Blackstone Audio, Inc.
4.2 out of 5 stars with 185 reviews
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the ''information warfare'' squads of the military services, and the national
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
4.6 out of 5 stars with 108 reviews
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff but had placed implants in American electrical and nuclear plants
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
4.0 out of 5 stars with 77 reviews
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery - apparently as much
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
4.2 out of 5 stars with 46 reviews
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick
Networked Audiovisual Systems
You Save: 32%
ean: 9780071825733, isbn: 0071825738,
4.6 out of 5 stars with 25 reviews
The industry-standard guide to networked audiovisual systems Published with InfoComm International, Networked AV Systems discusses the essential information AV and IT professionals need to know when working with network-driven equipment and processes. Each chapter features diagrams, photos, notes, chapter reviews, and end-of-chapter questions with in-depth explanations. In accordance with InfoComm's performance standards for the AV industry as they relate to networking, this book serves as both
Digital Television: A Practical Guide for Engineers (Signals and Communication Technology)
ean: 9783540011552, isbn: 3540011552,
4.5 out of 5 stars with 206 reviews
Digital Television closely examines all present-day TV transmission methods. These include MPEG, DVB, ATSC and ISDB-T. DVD is also discussed. The text covers these subjects in a practical-minded manner. Although mathematical formulations are used, they are in most cases only utilized to supplement the text. The book also contains chapters dealing with basic concepts such as digital modulation or transformations into the frequency domain. A major emphasis is placed on the measuring techniques
Digital and Document Examination (Advanced Forensic Science Series)
ean: 9780128027172, isbn: 0128027177,
4.4 out of 5 stars with 46 reviews
The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward. This volume, Digital and Document Examination, will serve as a graduate level text for those studying and teaching digital forensics and forensic document examination, as well as an excellent reference for forensic scientist’s libraries or use in their casework. Coverage includes digital devices, transportation, types of documents, forensic accounting
Quantum Bits and Quantum Secrets: How Quantum Physics is revolutionizing Codes and Computers
You Save: 24%
mpn: Illustrations, ean: 9783527407101, isbn: 3527407103,
4.6 out of 5 stars with 42 reviews
A concise, ''no-frills'' introduction to quantum computation and quantum cryptography for non-experts. Rather than concentrating on stories about scientists and philosophical concepts, it provides a step-by-step approach to quantum information. Starting from the idea of quantum cryptography, it presents the basic principles of quantum mechanics and explains how this can be used to make cryptography absolutely secure against eavesdropping. Subsequently, the most important quantum algorithms are
Browse Our Catalog