Lancer votre recherche de document sur le web et trouver tous les livres correspondants

Top 20

20 Nouveautés


Résultats pour


(Temps écoulé : 1.5987)
Liens Sponsorislés

1 The Terrible Privacy Of Maxwell Sim - Jonathan Coe
Auteur : Jonathan Coe
Genre : Lettres
The Terrible Privacy of Maxwell Sim is Jonathan Coe's latest heart-breaking and hilarious novel

Maxwell Sim could be any of us. He could be you.

He's about to have a mid-life crisis (though eh doesn't know it yet). He'll be found in his car in the north of Scotland, half-naked and alone, suffering hypothermia, with a couple of empty whisky bottles and a boot full of toothbrushes.

It's a far cry from a restaurant in Sydney, where his story starts.

But then Maxwell Sim has, unknowingly, got a long way to go. If he knew now about his lonely journey to the Shetland Isles, or the truth about his father and the folded photograph, or the mystery of Poppy and her peculiar job, or even about Emma's lovely, fading voice, then perhaps he's stay where he was - hiding from destiny.

But Max knows none of it. And nor do you - at least not ye

8,49 €

2 The Fourth Industrial Revolution - Klaus Schwab
Auteur : Klaus Schwab
Genre : Économie
The founder and executive chairman of the World Economic Forum on how the impending technological revolution will change our lives

We are on the brink of the Fourth Industrial Revolution. And this one will be unlike any other in human history.

Characterized by new technologies fusing the physical, digital and biological worlds, the Fourth Industrial Revolution will impact all disciplines, economies and industries - and it will do so at an unprecedented rate. World Economic Forum data predicts that by 2025 we will see: commercial use of nanomaterials 200 times stronger than steel and a million times thinner than human hair; the first transplant of a 3D-printed liver; 10% of all cars on US roads being driverless; and much more besides.

In The Fourth Industrial Revolution, Schwab outlines the key technologies driving this revolution, discusses

11,99 €

3 Permanent Record - Edward Snowden
Auteur : Edward Snowden
Genre : Biographies et mémoires

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway subu

8,99 €

4 Security and Privacy For Microsoft® Office 2010 Users - Mitch Tulloch
Auteur : Mitch Tulloch
Genre : Ordinateurs
This title is also available as a free eBook.

Take control—and put the built-in security and privacy features in Microsoft Office to work! Whether downloading documents, publishing a presentation, or collaborating online—this guide offers concise, how-to guidance and best practices to help protect your documents and your ideas.

Get practical, proactive guidance for using the security and privacy management features in Office 2010 and Office 365Walk through everyday scenarios, and discover everyday techniques that help you take charge Understand common risks and learn best practices you can apply right away


5 Lexicon - Max Barry
Auteur : Max Barry
Genre : Aventure
Stick and stones break bones. Words kill.

They recruited Emily Ruff from the streets. They said it was because she's good with words.

They'll live to regret it.

They said Wil Parke survived something he shouldn't have. But he doesn't remember.

Now they're after him and he doesn't know why.

There's a word, they say. A word that kills.

And they want it back . . . 

“Best thing I've read in a long time . . . a masterpiece.” —Hugh Howey, New York Times bestselling author of Wool

1,49 €
6 Liens Sponsorislés

7 The Rain Before it Falls - Jonathan Coe
Auteur : Jonathan Coe
Genre : Lettres
The Rain Before it Falls - Jonathan Coe's heartbreaking novel of family secrets

Deeply moving and compelling, The Rain Before it Falls is the story of three generations of one family riven by tragedy. When Rosamund, a reluctant bearer of family secrets, dies suddenly, a mystery is left for her niece Gill to unravel. Some photograph albums and tapes point towards a blind girl named Imogen whom no one has seen in twenty years. The search for Imogen and the truth of her inheritance becomes a shocking story of mothers and daughters and of how sadness, like a musical refrain, may haunt us down the years.

'Spectacular, heartbreaking, beautifully written. Rosamund's story is one of the most extraordinary and compelling you will ever read. Impossible to put down, I loved every minute of it' Sunday Express

'A sad, often very moving story of mo

8,49 €

8 The Rotters' Club - Jonathan Coe
Auteur : Jonathan Coe
Genre : Lettres
The Rotters' Club - Jonathan Coe's iconic 1970s coming-of-age novel

Winner of the Everyman Wodehouse prize, The Rotters' Club follows Benjamin Trotter - bestselling author Jonathan Coe's most iconic character - through the hilarious and, at times, touching trials and tribulations of growing up in 1970s Britain.

Unforgettably funny and painfully honest, Jonathan Coe's tale of Benjamin Trotter and his friends' coming of age during the 1970s is a heartfelt celebration of the joys and agonies of growing up.

Featuring, among other things, IRA bombs, prog rock, punk rock, bad poetry, first love, love on the side. Prefects, detention, a few bottles of Blue Nun, lots of brown wallpaper, industrial strife, and divine intervention in the form of a pair of swimming trunks.

Set against the backdrop of the decade's class struggles, tragic

8,49 €

9 Number 11 - Jonathan Coe
Auteur : Jonathan Coe
Genre : Lettres
This is a novel about the hundreds of tiny connections between the
public and private worlds and how they affect us all.

It's about the legacy of war and the end of innocence.

It's about how comedy and politics are battling it out and comedy might have won.

It's about how 140 characters can make fools of us all.

It's about living in a city where bankers need cinemas in their basements and others need food banks down the street.

It is Jonathan Coe doing what he does best ­ - showing us how we live now.

'Coe is among the handful of novelists who can tell us something about the temper of our times' Observer

Number 11 is Jonathan Coe's eleventh novel. His previous ten novels are all published by Penguin and include the highly acclaimed bestsellers <

8,49 €

10 The Closed Circle - Jonathan Coe
Auteur : Jonathan Coe
Genre : Lettres
The Closed Circle is Jonathan Coe's hilarious sequel to The Rotters' Club

It's the end of the century and Benjamin Trotter and friends are all grown up. Life is a ceaseless whirl of jobs, marriages, kids - and self-inflicted angst. Despite the shiny optimism of Blair's Britain, youthful hopes and dreams feel betrayed. Is the Government (and by extension Benjamin's MP brother Paul) to blame? Or are the 'rotters' themselves - only passingly faithful to their dreams - really at fault?

The Closed Circle - sequel to The Rotters' Club - depicts a group of former school friends as older, wiser and disillusioned in Blair's Britain at the turn of the millennium. It proves that the present can never truly be disentangled from the past.

'Terrific. An incisive portrait of Britain at the turn of the century' Spectator


8,49 €

11 The Art of Invisibility - Kevin Mitnick
Auteur : Kevin Mitnick
Genre : Ordinateurs
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.

Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--comp

9,99 €

12 The Age of Surveillance Capitalism - Shoshana Zuboff
Auteur : Shoshana Zuboff
Genre : Secteurs et professions
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior.

In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.
Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the pro

15,99 €

13 Sandworm - Andy Greenberg
Auteur : Andy Greenberg
Genre : Ordinateurs
“Immensely readable…A hair-raising, cautionary tale about the burgeoning, post-Stuxnet world of state-sponsored hackers.”
Washington Post

From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and

11,99 €

14 Countdown to Zero Day - Kim Zetter
Auteur : Kim Zetter
Genre : Militaire
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 At first, the firm’s programmers believed the mal

9,99 €

15 macOS Security & Privacy, Sierra Edition - Diane Yee
Auteur : Diane Yee
Genre : Systèmes d’exploitation
Apple designed macOS with advanced technologies that work together to constantly keep your Mac safe. Some of these features are turned on by default, whereas others are turned off or aren't dialed up to full strength. Some features are front-and-center in System Preferences or the Applications folder, whereas others are buried deep in the user interface. This book covers the whole range of macOS’s security and privacy tools and explains the best practices for defending your Mac and data.

- Create user accounts to protect against the biggest security threat: other people in your home or office.
- Enable parental controls to prevent harm from young, naive, overwhelmed, or not-entirely-trustworthy users.
- Set up the login process to tighten security at the login window.
- Secure your Mac completely by turning on the firmware password.
- Recover forgott

3,49 €

16 Kingpin - Kevin Poulsen
Auteur : Kevin Poulsen
Genre : Criminologie
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.
The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into thei

10,99 €

17 Privacy Impact Assessment - David Wright & Paul de Hert
Auteur : David Wright & Paul de Hert
Genre : Droit
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year.
Privacy impact assessment is a tool, a process, a methodology to identify, assess, mitigate or avoid privacy risks and, in collaboration with stakeholders, to identify solutions.
Contributors to this book – privacy commissioners, academics, consultants, practitioners, industry representatives – are among the world’s leading PIA experts. They share their experience and offer

42,99 €

18 Ghost in the Wires - Kevin Mitnick
Auteur : Kevin Mitnick
Genre : Ordinateurs
The thrilling memoir of the world's most wanted computer hacker "manages to make breaking computer code sound as action-packed as robbing a bank" (NPR).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down.
Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes--and a portrait of a visionary who forced the auth

10,99 €

19 Tools and Weapons - Brad Smith & Carol Ann Browne
Auteur : Brad Smith & Carol Ann Browne
Genre : Ordinateurs

'A clear, compelling guide to some of the most pressing debates in technology today.' Bill Gates, from the foreword

'The de facto ambassador for the technology industry at large.' The New York Times

'One of the few executives willing to speak openly about the industry's most vexing issues.' Sunday Times

Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create.

This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformatio

10,99 €

20 Cracking Codes with Python - Al Sweigart
Auteur : Al Sweigart
Genre : Ordinateurs
Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online transactions, including digital signatures, email, and Bitcoin.

Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you’ll have learned how to code in Python and you’ll have the clever programs to prove it!

You’ll also learn how to:

- Combine loops, variables, and flow control statements into

16,99 €

21 Privacy - Meritta Koivisto
Auteur : Meritta Koivisto
Genre : Théâtre
An American play in two acts. Drama with black humor.

A famous author’s extreme protection of his private life turns against him in a horrifying way. When a hometown acquaintance from youth, Lorraine Gray, unexpectedly visits Paul J. Bauer and his wife Maude in their Hollywood Hills mansion, the consequences are unpredictable, yet inevitable. Lorraine’s portrait shows the fragility of moral, the destruction caused by a manipulating mind, and the extent of darkness it can reach. 

The drama is told "with an attractive, almost perverse humor" - Neil Hardwick, Director, Helsinki City Theatre.

Honorary Mention finalist at New Century Writer Awards, 2002 - an international writing competition supported by Francis Ford Coppola’s Zoetrope.

3,99 €

22 Privacy - David Vincent
Auteur : David Vincent
Genre : Histoire
Privacy: A Short History provides a vital historical account of an increasingly stressed sphere of human interaction. At a time when the death of privacy is widely proclaimed, distinguished historian, David Vincent, describes the evolution of the concept and practice of privacy from the Middle Ages to the present controversy over digital communication and state surveillance provoked by the revelations of Edward Snowden.

Deploying a range of vivid primary material, he discusses the management of private information in the context of housing, outdoor spaces, religious observance, reading, diaries and autobiographies, correspondence, neighbours, gossip, surveillance, the public sphere and the state. Key developments, such as the nineteenth-century celebration of the enclosed and intimate middle-class household, are placed in the context of long-term development. The book

17,99 €

23 Student Privacy Certified Teachers & Staff - iKeepSafe
Auteur : iKeepSafe
Genre : Éducation
iKeepSafe’s privacy professional development courses provide the training necessary for educators to understand their evolving student data privacy responsibilities. This course gives teachers and school employees the tools they need to ensure that technology innovation and learning goals are balanced with privacy and security responsibilities.

Read more about iKeepSafe’s privacy program and find additional resources at


24 Privacy Certification Course: Administrators - iKeepSafe
Auteur : iKeepSafe
Genre : Éducation
iKeepSafe’s privacy professional development courses provide the training necessary for educators to understand their evolving student data privacy responsibilities. This course gives administrators the tools they need to ensure that technology innovation and learning goals are balanced with privacy and security responsibilities.

Read more about iKeepSafe’s privacy program and find additional resources at


25 Ye Olde Metal: Ratt's Invasion of Your Privacy - Martin Popoff
Auteur : Martin Popoff
Genre : Musique
The 2016 Martin Popoff 20-page ebook about the making of the Ratt album, Invasion of Your Privacy.

Although the heart tells most students of hair metal that Out of the Cellar is the best Ratt album, the head knows that 1985’s Invasion of Your Privacy is the masterpiece of the catalogue, one thick slab of thinking man’s melodic metal, full up with sophisticated arrangements, soloing and top-shelf production that has aged well. Popoff is on record all over the place naming Ratt as the best band of the entire genre, so dig into this rare piece of historical nonfiction on the band and find out why.

0,99 €

26 Privacy Certification Course: School Board - iKeepSafe
Auteur : iKeepSafe
Genre : Éducation
iKeepSafe’s privacy professional development courses provide the training necessary for the education community to understand their evolving student data privacy responsibilities. This course gives school board members the tools they need to ensure that technology innovation and learning goals are balanced with privacy and security responsibilities.

Read more about iKeepSafe’s privacy program and find additional resources at


27 Privacy Impact Assessment A Complete Guide - 2019 Edition - Gerardus Blokdyk
Auteur : Gerardus Blokdyk
Genre : Entreprise et management
Do other systems share data or have access to data in this system? How is the information transmitted or disclosed? Is there an on-going procedure in place to monitor compliance with these measures? How will the system ensure that others in the organization only get the information they are entitled to? How will the information be used?

This valuable Privacy Impact Assessment self-assessment will make you the dependable Privacy Impact Assessment domain leader by revealing just what you need to know to be fluent and ready for any Privacy Impact Assessment challenge.

How do I reduce the effort in the Privacy Impact Assessment work to be done to get problems solved? How can I ensure that plans of action include every Privacy Impact Assessment task and that every Privacy Impact Assessment outcome is in place? How will I save time investigating strategic and ta

62,99 €

28 Privacy - William Faulkner
Auteur : William Faulkner
Genre : Essais
Accadde una volta, nel 1955, che Faulkner fosse preso da una furia memorabile in conseguenza della caccia che i giornali americani stavano dando a fatti della sua vita privata (soprattutto amorosa). Così, per questa unica occasione, Faulkner si lanciò in un pamphlet micidiale, che investe non solo la stampa americana e la macchina dei media – da lui quotidianamente subìta a Hollywood – ma l’intero «sogno americano». Nella parola privacy, infatti, come sappiamo oggi in maniera più chiara che mai, si addensano tutto il peggio e tutto il meglio della società democratica, e in particolare di quella che conserva il sigillo delle origini americane. Da una parte il culto dell’individuo, realtà ultima e non scalfibile; dall’altra la disponibilità di ogni aspetto della vita del singolo al consumo vorace della società stessa, qualora la libido del Grande Animale lo richieda. Al

6,99 €

29 Privacy - Martin Dowding
Auteur : Martin Dowding
Genre : Arts et disciplines linguistiques
This book fills a very important gap in policy analysis by addressing, among other topics, such concerns as how information and communication technologies have changed our conceptions about privacy and the variety of possible options for the future of privacy.

57,99 €

30 Privacy - Garret Keizer
Auteur : Garret Keizer
Genre : Sciences sociales
American essayist and Harper's contributing editor Garret Keizer offers a brilliant, literate look at our strip-searched, over-shared, viral-videoed existence.

Body scans at the airport, candid pics on Facebook, a Twitter account for your stray thoughts, and a surveillance camera on every street corner -- today we have an audience for all of the extraordinary and banal events of our lives. The threshold between privacy and exposure becomes more permeable by the minute. But what happens to our private selves when we cannot escape scrutiny, and to our public personas when they pass from our control?

In this wide-ranging, penetrating addition to the Big Ideas//Small Books series, and in his own unmistakable voice, Garret Keizer considers the moral dimensions of privacy in relation to issues of social justice, economic inequality, and the increasing commoditizat

9,99 €

31 Privacy - Patricia Meyer Spacks
Auteur : Patricia Meyer Spacks
Genre : Critique littéraire
Today we consider privacy a right to be protected. But in eighteenth-century England, privacy was seen as a problem, even a threat. Women reading alone and people hiding their true thoughts from one another in conversation generated fears of uncontrollable fantasies and profound anxieties about insincerity.

In Privacy, Patricia Meyer Spacks explores eighteenth-century concerns about privacy and the strategies people developed to avoid public scrutiny and social pressure. She examines, for instance, the way people hid behind common rules of etiquette to mask their innermost feelings and how, in fact, people were taught to employ such devices. She considers the erotic overtones that privacy aroused in its suppression of deeper desires. And perhaps most important, she explores the idea of privacy as a societal threat—one that bred pretense and hypocrisy in its practition

43,99 €

32 Zucked - Roger McNamee
Auteur : Roger McNamee
Genre : Science politique
The New York Times bestseller about a noted tech venture capitalist, early mentor to Mark Zuckerberg, and Facebook investor, who wakes up to the serious damage Facebook is doing to our society - and sets out to try to stop it. 

If you had told Roger McNamee even three years ago that he would soon be devoting himself to stopping Facebook from destroying our democracy, he would have howled with laughter. He had mentored many tech leaders in his illustrious career as an investor, but few things had made him prouder, or been better for his fund's bottom line, than his early service to Mark Zuckerberg. Still a large shareholder in Facebook, he had every good reason to stay on the bright side. Until he simply couldn't.

ZUCKED is McNamee's intimate reckoning with the catastrophic failure of the head of one of the world's most powerful companies to face

11,99 €

33 Privacy - Rudie Kagie
Auteur : Rudie Kagie
Genre : Critique littéraire
In hoog tempo werden maatregelen doorgedrukt die de overheid, het opsporingsapparaat en het bedrijfsleven inzicht geven in denken, doen en laten van burgers. De vraag wat de risico's zijn als gegevens worden misbruikt, is allang niet hypothetisch meer. Na de terroristische aanslagen op 11 september 2001 stelden Amerikaanse autoriteiten dat 'veiligheid boven privacy gaat'. Sindsdien won het idee terrein dat in principe iedereen verdacht is, ook in West-Europa. De geavanceerde opsporingstechnologie was aanvankelijk bedoeld om zware criminaliteit te traceren. Inmiddels blijken cameratoezicht, biometrie, bodyscans, controle van internet en telefonie, datamining, door radiogolven gestuurde chips en andere vondsten effectief gereedschap om 16,5 miljoen Nederlanders mee in de gaten te houden. In hoog tempo werden maatregelen doorgedrukt die de overheid, het opsporingsapparaat en het bedrijfslev

6,99 €

34 Privacy - Maurizio Sala
Auteur : Maurizio Sala
Genre : Droit
La protezione dei dati personali (comunemente, ancorché erroneamente, denominata privacy) sarà, per le imprese che ne sapranno cogliere l’opportunità, l’occasione per operare la revisione dei flussi dei dati dentro e fuori l’azienda, e con ciò incrementare la propria competitività e migliorare la propria immagine. Le persone fisiche, per parte loro, matureranno la consapevolezza dei propri diritti (da tutelare e non abusare) ma, soprattutto, incrementeranno la conoscenza dei contenuti ed estensione dei diritti fondamentali della persona, riconosciuti dalla Convenzione Europea dei Diritti dell’Uomo (CEDU). In tale contesto l’Opera, aggiornata al D.Lgs. 10 agosto 2018, n. 101 e al provvedimento del Garante n. 467 dell’11 ottobre 2018, contenente l’elenco delle tipologie di trattamenti soggetti al requisito di una valutazione d'impatto si pone come elemento di informazi

10,99 €

35 Privacy - Leslie P Francis & John G. Francis
Auteur : Leslie P Francis & John G. Francis
Genre : Droit
We live more and more of our lives online; we rely on the internet as we work, correspond with friends and loved ones, and go through a multitude of mundane activities like paying bills, streaming videos, reading the news, and listening to music. Without thinking twice, we operate with the understanding that the data that traces these activities will not be abused now or in the future. There is an abstract idea of privacy that we invoke, and, concrete rules about our privacy that we can point to if we are pressed. Nonetheless, too often we are uneasily reminded that our privacy is not invulnerable-the data tracks we leave through our health information, the internet and social media, financial and credit information, personal relationships, and public lives make us continuously prey to identity theft, hacking, and even government surveillance. A great deal is at stake for individuals, g

14,99 €

36 Privacy - Marino Longoni
Auteur : Marino Longoni
Genre : Droit
Il 25 Maggio 2018 scatta la piena operatività del nuovo regolamento UE sulla privacy. Gli adempimenti non sono pochi. Alcuni sono decisamente nuovi, altri non sono definiti con esattezza e si lascia alle imprese e agli enti pubblici l'onere di indicare come comportarsi caso per caso. 
Organizzazione interna delle imprese, rapporti coi fornitori esterni, formazione del personale e adesione ai codici di correttezza, sono solo alcuni degli argomenti disciplinati dal nuovo regolamento. 
La guida di ItaliaOggi aiuta professionisti e imprese a capire e mettere in atto la nuova normativa.

5,99 €

37 The Perfect Weapon - David E. Sanger
Auteur : David E. Sanger
Genre : Politique étrangère et relations internationales
“An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter.

The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era

9,99 €

38 The Art of the Steal - Frank W. Abagnale
Auteur : Frank W. Abagnale
Genre : Finances personnelles
The world--famous former con artist and bestselling author of Catch Me if You Can now reveals the mind--boggling tricks of the scam trade--with advice that has made him one of America's most sought--after fraud--prevention experts.

"I had as much knowledge as any man alive concerning the mechanics of forgery, check swindling, counterfeiting, and other similar crimes. Ever since I'd been released from prison, I'd often felt that if I directed this knowledge into the right channels, I could help people a great deal. Every time I went to the store and wrote a check, I would see two or three mistakes made on the part of the clerk or cashier, mistakes that a flimflam artist would take advantage of. . . . In a certain sense, I'm still a con artist. I'm just putting down a positive con these days, as opposed to the negative con I used in the past. I've merely redirected

9,99 €

39 Attacking Network Protocols - James Forshaw
Auteur : James Forshaw
Genre : Ordinateurs
Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities.

You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. 

Learn how to:
- Capture, manipulate, and replay packets
- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol
- Discover and exploit

27,99 €

40 All We Ever Wanted - Emily Giffin
Auteur : Emily Giffin
Genre : Lettres
Could one bad decision tear two families apart?

Everyone’s seen the compromising photo of Lyla, a scholarship kid in a prestigious private school.

Everyone knows that Nina’s son, expensively prepared for success since childhood, took the photo.

And everyone thinks they know who to blame.

As events spiral out of control, Nina and Lyla – both outsiders in the elite social circle they inhabit – are drawn together in an unlikely bond of friendship.

Because this photograph is forcing them to question who they really are – and who they are becoming.

Already a New York Times bestseller and one of the most talked-about books of the year, this is a gripping novel about second chances, dark family secrets and how it’s never too late to be the person you want to be.

6,99 €

41 The Dwarves of Death - Jonathan Coe
Auteur : Jonathan Coe
Genre : Lettres
The Dwarves of Death is a hilarious black comedy by Jonathan Coe

William has a lot on his mind. Firstly, there's The Alaska Factory, the band he plays in. They're no good, and they make his songs sound about as groovy as an unimpressed record. In fact they're so bad he's seriously thinking of leaving to join a group called The Unfortunates.

Secondly, there's Madeline, his high-maintenance girlfriend whose idea of a night of passion is an Andrew Lloyd Webber musical followed by a doorstep peck on the cheek. Maybe they're not soulmates after all?

Lastly, there's the bizarre murder he's just witnessed. The guiding force behind The Unfortunates lies bludgeoned to death at his feet and, unfortunately for William, there aren't too many other suspects standing nearby. . .

'It's about being young, poor, confused and in love. It's also very funn

8,49 €

42 Malware Data Science - Joshua Saxe & Hillary Sanders
Auteur : Joshua Saxe & Hillary Sanders
Genre : Ordinateurs
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.

Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist.

In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis.

You'll learn how to:
- Analyze malware using static analysis
- Observe malware behavior using dynamic analysis
- Identify adversary groups through s

27,99 €

43 The Death of Common Sense - Philip K. Howard
Auteur : Philip K. Howard
Genre : Droit

“We need a new idea of how to govern. The current system is broken. Law is supposed to be a framework for humans to make choices, not the replacement for free choice.” So notes Philip K. Howard in the new Afterword to his explosive manifesto The Death of Common Sense. Here Howard offers nothing less than a fresh, lucid, practical operating system for modern democracy. America is drowning—in law, lawsuits, and nearly endless red tape. Before acting or making a decision, we often abandon our best instincts. We pause, we worry, we equivocate, and then we divert our energy into trying to protect ourselves. Filled with one too many examples of bureaucratic overreach, The Death of Common Sense demonstrates how we—and our country—can at last get back on track.

9,99 €

44 Cuckoo's Egg - Clifford Stoll
Auteur : Clifford Stoll
Genre : Criminologie
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It

9,99 €

45 Karma-based API on Apple Platforms - Manuel Carrasco Molina
Auteur : Manuel Carrasco Molina
Genre : Programmation
Leverage the best techniques provided by Apple to build apps with maximum privacy for your users. This book explores not only the how-to steps for implementing privacy in your apps, but also answers workflow questions about what information you actually need.
Do you need full access to a device’s contacts? Do you need to have location services enabled in the background constantly? This book explains how to selectively enable services and how to make apps that can continue to function even when the user refuses to share data. Understanding the needs of your users and the expectations of Apple in reviewing your app will make better apps. 

You'll see how to ensure that you make it through the App Store review quickly and without the need to go back and develop privacy protocols that should have been in place to begin with. Not only is developing with privacy in mind g

22,99 €

46 iOS Application Security - David Thiel
Auteur : David Thiel
Genre : Ordinateurs
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course on iOS application structure and Objective-C design patterns, you’ll move on to spotting bad code and plugging the holes. You’ll learn about:
- The iOS security model and the limits of its built-in protections
- The myriad ways sensitive data can leak into places it shouldn’t, such as through the pasteboard
- How to implement encryption with the Keychain, the Data Protection API, and CommonCrypto
- Legacy flaws from C that still cause problems in modern iOS applications
- Privacy issues related to gathering user data and

27,99 €

47 Media Control - Noam Chomsky
Auteur : Noam Chomsky
Genre : Sciences sociales
Noam Chomsky’s backpocket classic on wartime propaganda and opinion control begins by asserting two models of democracy—one in which the public actively participates, and one in which the public is manipulated and controlled. According to Chomsky, "propaganda is to democracy as the bludgeon is to a totalitarian state," and the mass media is the primary vehicle for delivering propaganda in the United States. From an examination of how Woodrow Wilson’s Creel Commission "succeeded, within six months, in turning a pacifist population into a hysterical, war-mongering population," to Bush Sr.'s war on Iraq, Chomsky examines how the mass media and public relations industries have been used as propaganda to generate public support for going to war. Chomsky further touches on how the modern public relations industry has been influenced by Walter Lippmann’s theory of "spectator democracy,"

8,49 €

48 Rootkits and Bootkits - Alex Matrosov, Eugene Rodionov & Sergey Bratus
Auteur : Alex Matrosov, Eugene Rodionov & Sergey Bratus
Genre : Ordinateurs
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.

With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, you’ll learn:

• How Windows boots—including 32-bit, 64-bit, and UEFI mode—and where to find vulnerabilities
• The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard 
• Reverse engineering and forensic techniques for analyzing real ma

27,99 €

49 Memes to Movements - An Xiao Mina
Auteur : An Xiao Mina
Genre : Science politique
A global exploration of internet memes as agents of pop culture, politics, protest, and propaganda on- and offline, and how they will save or destroy us all.

Memes are the street art of the social web. Using social media–driven movements as her guide, technologist and digital media scholar An Xiao Mina unpacks the mechanics of memes and how they operate to reinforce, amplify, and shape today’s politics. She finds that the “silly” stuff of meme culture—the photo remixes, the selfies, the YouTube songs, and the pun-tastic hashtags—are fundamentally intertwined with how we find and affirm one another, direct attention to human rights and social justice issues, build narratives, and make culture. Mina finds parallels, for example, between a photo of Black Lives Matter protestors in Ferguson, Missouri, raising their hands in a gesture of resistance and one from e

13,99 €

50 The Book of PF, 3rd Edition - Peter N.M. Hansteen
Auteur : Peter N.M. Hansteen
Genre : Systèmes d’exploitation
OpenBSD’s stateful packet filter, PF, is the heart of the OpenBSD firewall. With more and more services placing high demands on bandwidth and an increasingly hostile Internet environment, no sysadmin can afford to be without PF expertise.

The third edition of The Book of PF covers the most up-to-date developments in PF, including new content on IPv6, dual stack configurations, the "queues and priorities" traffic-shaping system, NAT and redirection, wireless networking, spam fighting, failover provision ing, logging, and more.

You’ll also learn how to:
–Create rule sets for all kinds of network traffic, whether crossing a simple LAN, hiding behind NAT, traversing DMZs, or spanning bridges or wider networks
–Set up wireless networks with access points, and lock them down using authpf and special access restrictions
–Maximize flexibility

18,99 €
Pas de Suggestions Relatives pour: Privacy