Quando o Google encontrou o WikiLeaks (Portuguese Edition)

Amazon Price: N/A (as of August 17, 2017 15:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Julian Assange conta seu encontro com Eric Schmidt, presidente do Google, discutindo os problemas políticos enfrentados pela sociedade – da Primavera Árabe ao Bitcoin – e as respostas tecnológicas geradas pela rede global para esses dilemas.

Depois da publicação de Cypherpunks: liberdade e o futuro da internet e há mais de dois anos asilado na Embaixada do Equador em Londres, Julian Assange, fundador e editor do WikiLeaks, lança no Brasil seu segundo e mais recente livro, Quando o Google encontrou o WikiLeaks. Ao longo de 168 páginas, Assange discute as consequências da acumulação de poder pelo Google no século XXI e relata seu encontro com Eric Schmidt, presidente do grupo, em 2011. O resultado é um livro fascinante e alarmante, que revela os polos opostos em que esses dois personagens icônicos da atual “era tecnológica” se encontram e suas opiniões divergentes sobre o destino do mundo e das novas tecnologias.
Continue reading “Quando o Google encontrou o WikiLeaks (Portuguese Edition)”

Cybersecurity: Engineering a Secure Information Technology Organization

Rating: 
Amazon Price: $79.95 $43.60 You save: $36.35 (45%). (as of August 17, 2017 05:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Software is essential and pervasive in the modern world, but software acquisition, development, operation, and maintenance can involve substantial risk, allowing attackers to compromise millions of computers every year. This groundbreaking book provides a uniquely comprehensive guide to software security, ranging far beyond secure coding to outline rigorous processes and practices for managing system and software lifecycle operations. The book opens with a comprehensive guide to the software lifecycle, covering all elements, activities, and practices encompassed by the universally accepted ISO/IEEE 12207-2008 standard. The authors then proceed document proven management architecture and process framework models for software assurance, such as ISO 21827 (SSE-CMM), CERT-RMM, the Software Assurance Maturity Model, and NIST 800-53. Within these models, the authors present standards and practices related to key activities such as threat and risk evaluation, assurance cases, and adversarial testing. Ideal for new and experienced cybersecurity professionals alike in both the public and private sectors, this one-of-a-kind book prepares readers to create and manage coherent, practical, cost-effective operations to ensure defect-free systems and software.

RUSSIAN DATA LOCALIZATION LAW & CYBER SECURITY

Amazon Price: N/A (as of August 17, 2017 09:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

RUSSIAN DATA LOCALIZATION LAW & CYBER SECURITY

Today, cyberspace is being governed by various national legislations in different parts of the world. Consequently, we are beginning to find that breach of cyber security is becoming the topmost matter of concern for all stakeholders.
Continue reading “RUSSIAN DATA LOCALIZATION LAW & CYBER SECURITY”

Next Generation Red Teaming

Rating: 
Amazon Price: $39.95 $28.16 You save: $11.79 (30%). (as of August 17, 2017 06:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.Teaches readers how to dentify systemic security issues based on the analysis of vulnerability and configuration data

Demonstrates the key differences between Red Teaming and Penetration Testing
Continue reading “Next Generation Red Teaming”

Scada: Supervisory Control And Data Acquisition

Scada: Supervisory Control And Data AcquisitionThis digital document is an article from Pipeline & Gas Journal, published by Oildom Publishing Company of Texas, Inc. on February 1, 2009. The length of the article is 2518 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available immediately after purchase. You can view it with any web browser.

Citation Details
Title: Political changes, younger workforce on minds of SCADA, telecommunications experts.(Supervisory Control and Data Acquisition)(Greg Vaughn)(Dan Mueller)(Brian Gore )
Author: Gale Reference Team
Publication: Pipeline & Gas Journal (Magazine/Journal)
Date: February 1, 2009
Publisher: Oildom Publishing Company of Texas, Inc.
Volume: 236 Issue: 2 Page: 28(4)

Distributed by Gale, a part of Cengage Learning

Price:

Click here to buy from Amazon