Privacy in Context (Stanford Law Books)

Rating: 
Amazon Price: N/A (as of September 25, 2017 19:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Coding for Penetration Testers: Building Better Tools

Rating: 
Amazon Price: N/A (as of September 26, 2017 08:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting, including, but not limited to, web scripting, scanner scripting, and exploitation scriptingIncludes all-new coverage of Powershell

Computer and Information Security Handbook

Rating: 
Amazon Price: N/A (as of September 26, 2017 06:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.

With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.
Continue reading “Computer and Information Security Handbook”

Cybersecurity for Beginners

Rating: 
Amazon Price: $17.99 $15.75 You save: $2.24 (12%). (as of September 26, 2017 14:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge.

'The world has changed more in the past 10 years than in any 10 year period in human history… Technology is no longer a peripheral servant, it shapes our daily lives.
Continue reading “Cybersecurity for Beginners”

Bots in WhatsApp. Übersicht, Anwendungsfälle, Einsatz und Schwachstellen (German Edition)

Amazon Price: N/A (as of September 26, 2017 06:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Studienarbeit aus dem Jahr 2016 im Fachbereich Informatik – Wirtschaftsinformatik, Note: 1,3, Duale Hochschule Baden-Württemberg, Ravensburg, früher: Berufsakademie Ravensburg (Mobile Informatik), Veranstaltung: Verteilte Systeme, Sprache: Deutsch, Abstract: In dieser Arbeit soll zunächst ein Grundverständnis und die Funktionsweise von Chatbots dargelegt werden. Dabei soll die Technologie der Chatbots anhand von A.I.M.L. näher beschrieben werden. Weiter sollen in dieser Arbeit Anwendungsfälle beschrieben werden, bei denen Bots die Nutzung des Internet im Vergleich zu Webseiten vereinfachen können. So werden die Messenger-Plattformen jeden Monat mächtiger, wehalb die Nutzung von Chatbots immer interessanter wird. Daher bieten Chatbots großes Potential was die Vereinfachung des Internets angeht. Im Anschluss an die Anwendungsfälle soll dem Lesen ein Praxisbeispiel gegeben werden, inwiefern ein Raspberry Pi mittels WhatsApp gesteuert werden kann. Darauffolgend werden aufkommende Schwachstellen im Rahmen von Chatbots erläutert. So spielen hier Themen wie Datensicherheit, Persönlichkeitsrechte, und Cyber-Kriminalität eine wesentliche Rolle. Letztendlich erfolgt eine kritische Würdigung in welcher der Einsatz von Chatbots bewertet wird.

Viele Unternehmen setzen auf eigene Apps, welche aber immer seltener angenommen werden. Die Frage ist: Werden Apps von Bots verdrängt? "Chatbots sind die neuen Apps ", sagte Microsofts CEO Satya Nadella Anfang des Jahres. Mit dieser Aussage ist Nadella nicht allein. So gibt es viele Entscheidungsträger, welche diese Meinung teilen.
Continue reading “Bots in WhatsApp. Übersicht, Anwendungsfälle, Einsatz und Schwachstellen (German Edition)”