Security & Encryption - Blowout Sale! Save up to 59%

Blowout Sale! Up to 59% off on Security & Encryption at Diaries Letters Stories. Top brands include Digital Survival Guide, LLC, Brand: Wiley-VCH, Audible Studios, Recorded Books, Blackstone Audio, Inc., Blackstone Audio Inc., Syngress, HighBridge Audio, Hachette Audio, Syngress Publishing, Unknown, Blackstone Audiobooks, Simon & Schuster Audio, Technics Publications, Tantor Audio, & Course Technology. Hurry! Limited time offers. Offers valid only while supplies last.

Digital Survival Guide
By Digital Survival Guide, LLC
In Stock
4.5 out of 5 stars with 84 reviews
Digital Survival Guide is an invaluable resource for novices and experts alike. It will raise your consciousness of the risks we take online with our identities, reputations, and finances, and it will give you tools to manage your online presence and security to whatever degree of sophistication you choose. This is an essential book for our digital age. This compelling narrative covers every facet of how we live our lives online, including email, banking, and social media. It draws on

Quantum Bits and Quantum Secrets: How Quantum Physics is revolutionizing Codes and Computers
By Brand: Wiley-VCH
In Stock
You Save: 24%

mpn: Illustrations, ean: 9783527407101, isbn: 3527407103,

4.7 out of 5 stars with 16 reviews
A concise, ''no-frills'' introduction to quantum computation and quantum cryptography for non-experts. Rather than concentrating on stories about scientists and philosophical concepts, it provides a step-by-step approach to quantum information. Starting from the idea of quantum cryptography, it presents the basic principles of quantum mechanics and explains how this can be used to make cryptography absolutely secure against eavesdropping. Subsequently, the most important quantum algorithms are

Technocreep: The Surrender of Privacy and the Capitalization of Intimacy
By Audible Studios
In Stock
4.9 out of 5 stars with 87 reviews
''Technology is rapidly moving into our bodies,'' writes cyber expert Keenan, and this book gives a chilling look ahead into where that road may lead us on a ''one-way trip to the total surrender of privacy and the commoditization of intimacy''. Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door.Take, for example, ''Girls Around Me'': a Russian-made iPhone app that allowed anyone to scan the

Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World
By Recorded Books
In Stock
4.3 out of 5 stars with 69 reviews
Data is everywhere. We create it every time we go online, turn our phones on (or off), and pay with credit cards. The data is stored, studied, and bought and sold by corporations and governments for surveillance and for control. ''Foremost security expert'' (Wired) and best-selling author Bruce Schneier shows how this data has led to a double-edged Internet - a Web that gives power to the people but is abused by the institutions on which those people depend. In Data and Goliath, Schneier

The Future of Violence: Robots and Germs, Hackers and Drones - Confronting a New Age of Threat
By Blackstone Audio, Inc.
In Stock
4.8 out of 5 stars with 127 reviews
From drone warfare in the Middle East to digital spying by the National Security Agency, the US government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies - from drones to computer networks and biological agents - that could be used to attack states

Stealing Your Life
By Blackstone Audio Inc.
In Stock
You Save: 59%

ean: 9780786160839, isbn: 0786160837,

4.7 out of 5 stars with 19 reviews
Brimming with anecdotes of creative criminality that are as entertaining as they are enlightening, Stealing Your Life is the practical way to shield yourself from one of today's most nefarious and common crimes..

Information Hiding in Speech Signals for Secure Communication
By Syngress
In Stock
You Save: 18%

ean: 9780128013281, isbn: 0128013281,

4.9 out of 5 stars with 11 reviews
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art

Data For the People: How to Make Our Post-Privacy Economy Work for You
By HighBridge Audio
In Stock
You Save: 42%

ean: 9781681680101, isbn: 1681680106,

4.0 out of 5 stars with 121 reviews
Every time we google something, facebook someone, or just carry a phone, we create data. Yet, we do not benefit from this wealth of information as much as we should. Andreas Weigend-an advisor to Alibaba, BMW, Hyatt, MasterCard and Lufthansa, among others-wants to change that. In Data for the People, he proposes six basic data rights that we all need to make better decisions.Big data is here to stay. The time has come to shift the balance of power back to the individual and find out how data is

Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
By Hachette Audio
In Stock
4.6 out of 5 stars with 68 reviews
You've heard the stories about the dark side of the Internet - hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn - but they remain just that: stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way. She is a video game developer whose ex-boyfriend published a crazed blog post cobbled together from private information, half truths, and outright fictions along with a rallying cry to the online hordes to go after her. They

Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense
By Syngress Publishing
In Stock
You Save: 9%

mpn: 9780128044490, ean: 9780128044490, isbn: 0128044497,

4.0 out of 5 stars with 120 reviews
''This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
By Unknown
In Stock
4.0 out of 5 stars with 15 reviews
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data. Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (CD-Audio) - Common
By Blackstone Audiobooks
In Stock

ean: 0884153876305,

4.0 out of 5 stars with 58 reviews
Kevin Mitnick is one of the world's foremost computer hackers. He infiltrated some of the most complicated and advanced computer systems before the law finally caught up with him. Here, Mitnick chronicles his three years on the run from the FBI, during which he worked odd jobs, kept tabs on his pursuers, and continued to hack into systems throughout the world..

iWar: War and Peace in the Information Age
By Simon & Schuster Audio
In Stock
4.6 out of 5 stars with 133 reviews
New York Times best-selling author and veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars. America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states - such as Russia, China, Iran, and North Korea - and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This

@War: The Rise of the Military-Internet Complex
By Blackstone Audio, Inc.
In Stock
4.1 out of 5 stars with 130 reviews
A surprising, pause-resistant account of how the wars of the future are already being fought today The United States military currently views cyberspace as the ''fifth domain'' of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq. Shane Harris delves into the

Cyberdeterrence and Cyberwar
By Blackstone Audio, Inc.
In Stock
4.6 out of 5 stars with 52 reviews
The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its

The Audacity to Spy: How Government, Business, and Hackers Rob Us of Privacy
By Technics Publications
In Stock
4.5 out of 5 stars with 34 reviews
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop,

Habeas Data: Privacy vs. the Rise of Surveillance Tech
By Tantor Audio
In Stock
You Save: 43%

ean: 9781977364098, isbn: 1977364098,

4.6 out of 5 stars with 35 reviews
An important look at how fifty years of American privacy law is inadequate for today's surveillance technology, from acclaimed Ars Technica senior business editor Cyrus FarivarUntil the twenty-first century, most of our activities were private by default, public only through effort; today anything that touches digital space has the potential (and likelihood) to remain somewhere online forever. That means all of the technologies that have made our lives easier, faster, better, and/or more

The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
By Simon & Schuster Audio
In Stock
4.7 out of 5 stars with 58 reviews
Following his blockbuster biography of Steve Jobs, The Innovators is Walter Isaacson's revealing story of the people who created the computer and the Internet. It is destined to be the standard history of the digital revolution and an indispensable guide to how innovation really happens. What were the talents that allowed certain inventors and entrepreneurs to turn their visionary ideas into disruptive realities? What led to their creative leaps? Why did some succeed and others fail? In his

Audio Content Security: Attack Analysis on Audio Watermarking
By Syngress Publishing
In Stock
You Save: 24%

ean: 9780128113837, isbn: 0128113839,

4.1 out of 5 stars with 130 reviews
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An

Guide to Computer Forensics and Investigations (Book & CD)
By Course Technology
In Stock
You Save: 45%

ean: 9781435498839, isbn: 1435498836,

4.9 out of 5 stars with 40 reviews
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper

Viewing Page 1 of 4

View more products in Computers & Technology.
Feel free to Browse Our Catalog.

Privacy Policy / Terms of Service / Accessibility Statement
© 2019 - All Rights Reserved.