Security & Encryption - Blowout Sale! Save up to 59%
Blowout Sale! Up to 59% off on Security & Encryption at Diaries Letters Stories. Top brands include Digital Survival Guide, LLC, Brand: Wiley-VCH, Audible Studios, Recorded Books, Blackstone Audio, Inc., Blackstone Audio Inc., Syngress, HighBridge Audio, Hachette Audio, Syngress Publishing, Unknown, Blackstone Audiobooks, Simon & Schuster Audio, Technics Publications, Tantor Audio, & Course Technology. Hurry! Limited time offers. Offers valid only while supplies last.
Quantum Bits and Quantum Secrets: How Quantum Physics is revolutionizing Codes and Computers
You Save: 24%
mpn: Illustrations, ean: 9783527407101, isbn: 3527407103,
4.7 out of 5 stars with 16 reviews
A concise, ''no-frills'' introduction to quantum computation and quantum cryptography for non-experts. Rather than concentrating on stories about scientists and philosophical concepts, it provides a step-by-step approach to quantum information. Starting from the idea of quantum cryptography, it presents the basic principles of quantum mechanics and explains how this can be used to make cryptography absolutely secure against eavesdropping. Subsequently, the most important quantum algorithms are
Technocreep: The Surrender of Privacy and the Capitalization of Intimacy
4.9 out of 5 stars with 87 reviews
''Technology is rapidly moving into our bodies,'' writes cyber expert Keenan, and this book gives a chilling look ahead into where that road may lead us on a ''one-way trip to the total surrender of privacy and the commoditization of intimacy''. Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door.Take, for example, ''Girls Around Me'': a Russian-made iPhone app that allowed anyone to scan the
The Future of Violence: Robots and Germs, Hackers and Drones - Confronting a New Age of Threat
By Blackstone Audio, Inc.
4.8 out of 5 stars with 127 reviews
From drone warfare in the Middle East to digital spying by the National Security Agency, the US government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies - from drones to computer networks and biological agents - that could be used to attack states
Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
4.6 out of 5 stars with 68 reviews
You've heard the stories about the dark side of the Internet - hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn - but they remain just that: stories. Surely these things would never happen to you.
Zoe Quinn used to feel the same way. She is a video game developer whose ex-boyfriend published a crazed blog post cobbled together from private information, half truths, and outright fictions along with a rallying cry to the online hordes to go after her. They
Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense
You Save: 9%
mpn: 9780128044490, ean: 9780128044490, isbn: 0128044497,
4.0 out of 5 stars with 120 reviews
''This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
4.0 out of 5 stars with 15 reviews
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick
iWar: War and Peace in the Information Age
By Simon & Schuster Audio
4.6 out of 5 stars with 133 reviews
New York Times best-selling author and veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars.
America is at war, but most of its citizens don't know it.
Covert information warfare is being waged by world powers, rogue states - such as Russia, China, Iran, and North Korea - and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States.
Cyberdeterrence and Cyberwar
By Blackstone Audio, Inc.
4.6 out of 5 stars with 52 reviews
The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading.
Cyberspace has its
The Audacity to Spy: How Government, Business, and Hackers Rob Us of Privacy
4.5 out of 5 stars with 34 reviews
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop,
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
By Simon & Schuster Audio
4.7 out of 5 stars with 58 reviews
Following his blockbuster biography of Steve Jobs, The Innovators is Walter Isaacson's revealing story of the people who created the computer and the Internet. It is destined to be the standard history of the digital revolution and an indispensable guide to how innovation really happens.
What were the talents that allowed certain inventors and entrepreneurs to turn their visionary ideas into disruptive realities? What led to their creative leaps? Why did some succeed and others fail?
Guide to Computer Forensics and Investigations (Book & CD)
You Save: 45%
ean: 9781435498839, isbn: 1435498836,
4.9 out of 5 stars with 40 reviews
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper