Back to TopBack to Top
Buyezee Österreich
Österreich
Buyezee Canada
Canada
Buyezee France
France
Buyezee Deutschland
Deutschland
Buyezee Indonesia
Indonesia
Buyezee Italia
Italia
Buyezee Morocco
Morocco
Buyezee Nederland
Nederland
Buyezee Philippines
Philippines
Buyezee Россия
Россия
Buyezee España
España
Buyezee Schweiz
Schweiz
Buyezee Thailand
Thailand
Buyezee United Kingdom
United Kingdom
Buyezee United States
United States
Buyezee Việt Nam
Việt Nam
Close
United States United States
My Favourites My Favourites (0)
Favourite Added! Favourites Updated!

security

Show this merchant
From $15.32
Show this merchant
From $15.02
Show this merchant
From $14.95
Show this merchant
From $15.00
Show this merchant
From $14.74
Show this merchant
From $16.99
Show this merchant
From $17.04
Show this merchant
From $19.98
Show this merchant
From $19.93
Show this merchant
From $18.99
Show this merchant
From $19.19
Show this merchant
From $20.00
Show this merchant
From $29.99
Show this merchant
From $31.21
Show this merchant
From $78.93
$14
$37,958
  • Scrappy Information Security
    https://kbimages1-a.akamaihd.net/Images/56bd7142-4db5-47db-bd7a-61a84ad564fa/120/185/False/scrappy-information-security.jpg

    Scrappy Information Security

    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and - to add insult to injury - latch onto our PCs to perpetuate their crimes. Modern corporations do their best to hammer home the message of security through training, communications, and outright begging. The message often falls on deaf ears, not because employees want to make their workplaces unsafe, but rather, because the topic is so complex and wide-ranging that it simply is overwhelming. As an information security professional, it is my charge to make the online world safer for all of us. None of us tolerates a crime spree in our neighborhood. Likewise, we should not tolerate the current crime wave that is sweeping the Internet, one which truly threatens to stifle the e-commerce and e-communications that we have come to know and rely on. They say a little knowledge is a dangerous thing. I agree. People need more than a little knowledge to be safe online. They need to understand how encryption, the Internet, and wireless work so that they can put the pieces together - literally like a jigsaw puzzle - to reveal the image of a more secure online world. It is my goal to craft those pieces in such a way that the average reader will understand these technologies, and therefore understand how to apply them to both their corporate and personal cyberselves. This book should be read by anyone who cares about the security and privacy of their online information, and wants to know how to take steps to protect it. and that should be everyone. This book should be read by anyone who wants to "do the right thing" and ensure that they do not inadvertently compromise their employer's, or their own, sensitive information. and that should be everyone. This book should be read by anyone who believes that crime
  • Napco Security Systems NAPFWCFSLCSMK6B Base Required for FWC-FSLC-SMK
    http://site.unbeatablesale.com/WRTD7526.JPG

    Napco Security Systems NAPFWCFSLCSMK6B Base Required for FWC-FSLC-SMK

    If you are a gadget lover our Electronics catalog is your dream destination. Choose from hundreds of gadgets and accessories to suit different uses and add some entertainment facility and convenience to your life.FeaturesLots of options in every categoryHigh quality construction and modern designsSuperior quality performance and reliabilityCompetitive prices and value for moneyFeaturesBase Required for FWC-FSLC-SMK
  • management of information security
    http://www0.alibris-static.com/isbn/9781435488847.gif

    management of information security

    Good. Trade paperback (US). Glued binding. Contains: Illustrations.
  • Security Camera Mount in Silver
    http://www.brickhousesecurity.com/images/archive/005-B006-S_1.jpg

    Security Camera Mount in Silver

    Resilient, Heavy Duty Mount Cable-Managed Bracket 9" High
  • Emergency Battery Charger
    http://www.brickhousesecurity.com/images/archive/166-UNIV-CHARGER_1.jpg

    Emergency Battery Charger

    Running on 1 AA battery, this portable charger is a must-have for any potential emergency, such as loss of power or while on a camping trip. Get 1-3 hours of charge time on cameras, cell phones, or any electronics that charge via micro USB.
  • Defender 21033 Imitation Security Camera with Realistic Flashing LED
    http://images10.newegg.com/ProductImageCompressAll200/81-635-062-01.jpg

    Defender 21033 Imitation Security Camera with Realistic Flashing LED

    Defender 21033 Imitation Security Camera with Realistic Flashing LED Type: Wireless Camera Features: Flashing LED will make your imitation camera even more noticeable and realistic ABS plastic housing and cable make it look identical to a real camera and is a cost effective crime prevention investment You can easily mount the PH300 on your ceiling or wall and aim it using the adjustable bracket Imitation camera is made of ABS plastic for durability and will not rust Pair the PH300 with any Defender security systems for a affordable more robust-looking system
  • principles of information security
    http://www0.alibris-static.com/isbn/9781111138219.gif

    principles of information security

    Fine 1111138214 Like New Inside & Out. Clean & Crisp! Excellent book! ( z1s109D ) Some very minor shelf wear on cover. Front Cover is dog eared. * Fast Shipping! *
  • Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)
    https://kbimages1-a.akamaihd.net/Images/3a79f2e8-b058-460e-b1ef-d311efa7c675/120/185/False/avoiding-information-insecurity-fighting-modern-day-cyber-threats-2011-edition.jpg

    Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)

    From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically. In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets. Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks. Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.
  • 10m(30ft) 2.1x5.5mm DC 12V Power Extension Cable for CCTV Security Cameras IP Camera DVR Standalone
    http://miniimg.rightinthebox.com/images/m/201710/urrsyo1507715410530.jpg

    10m(30ft) 2.1x5.5mm DC 12V Power Extension Cable for CCTV Security Cameras IP Camera DVR Standalone

    Quantity:1 pc; Wattage:360; Type:Voltage Converter; Certification:CE; IP Rating:IP44; Input Voltage:AC85-265; Batteries Included?:Non-preloaded; Brand:ONDENN; Net Weight(kg):0.13; Listing Date:10/11/2017; Production mode:Self-produce; Output Voltage(V):AC 85-265; Input Current(A):10; Output Current(A):10
  • CCTV Male Power Lead Cable Connector for Security Cameras
    http://images10.newegg.com/ProductImageCompressAll200/ABS3_1_201706301116114339.jpg

    CCTV Male Power Lead Cable Connector for Security Cameras

    CCTV Male Power Lead Cable Connector for Security Cameras
  • CCTV Female Power Lead Cable Connector for Security Cameras
    http://images10.newegg.com/ProductImageCompressAll200/ABS3_1_201706301357274203.jpg

    CCTV Female Power Lead Cable Connector for Security Cameras

    CCTV Female Power Lead Cable Connector for Security Cameras
  • guide to operating systems security
    http://www0.alibris-static.com/isbn/9780619160401.gif

    guide to operating systems security

    Good Ships Out Tomorrow!
  • Cyber Security
    https://kbimages1-a.akamaihd.net/Images/66d82fc3-b8b3-4a37-a759-ff19b925e9ee/120/185/False/cyber-security-2.jpg

    Cyber Security

    Techniques, tactics and tools for cyber security, cyber security training, cyber security threats and much more.
  • A Manager's Guide to Safeguarding Sensitive Information Properly
    https://kbimages1-a.akamaihd.net/Images/1856b962-a52c-48f5-bf40-4968184e0f74/120/185/False/a-manager-s-guide-to-safeguarding-sensitive-information-properly.jpg

    A Manager's Guide to Safeguarding Sensitive Information Properly

    A Manager's Guide to Safeguarding Sensitive Information Properly is a quick reference guide on the 12 SSIP Rules managers should be aware of in respect to safeguarding sensitive information properly at their company. This guide is a companion to "An Employee's Guide to Safeguarding Sensitive Information Properly." Sean Lowther who designed and implemented the information security awareness program at Bank of America from 1999 to 2006 is the author of this guide. Every manager who works for a company should have a copy of this "Guide." The guide includes the following SSIP (safeguarding sensitive information properly) Rules: SSIP Rule 1: Are you hiring the right people? SSIP Rule 2.: Your Information Technology Department is not responsible for safeguarding sensitive information properly. SSIP Rule 3: If your department is developing applications, make sure you include your information security people in the process. SSIP Rule 4: People do things for their reasons, not yours! SSIP Rule 5: Do not transmit sensitive information outside of the company without proper protection. SSIP Rule 6: Do not let employees download unlicensed software or unapproved applications. SSIP Rule 7: Don't play "Big Brother" with your employees. Be an enabler! SSIP Rule 8: The importance of training. SSIP Rule 9: Update an employee's system access when transferred or delete when terminated. SSIP Rule 10: The risk of social engineering. SSIP Rule 11: The risks of social media. SSIP Rule 12: The risk of insider threats. A Manager's Guide to Safeguarding Sensitive Information Properly could vary well save any company from significant financial risk and adverse publicity to their brand.
  • JC Infrared Illuminator, 850nm 8 Leds 90 Degree Wide Angle IR Illuminator for Night Vision,Waterproof LED Infrared Light-LITE VERSION
    https://images-na.ssl-images-amazon.com/images/I/41h8mC4BjUL.jpg

    JC Infrared Illuminator, 850nm 8 Leds 90 Degree Wide Angle IR Illuminator for Night Vision,Waterproo

    With 90 degree wider angle and 8 Leds of IR illuminator, this high quality IR infrared illuminator is a good choice to installed with wide angle IP cameras, CCTV camera and improve the quality of night vision image. Attention: 1. Please make sure that your cameras are sensitive by 850nm infrared light before buy. 1. For 850nm LED infrared light, if you look directly at the light you can see a faint red glow each led, but you COULD NOT SEE any light beam projected from the unit. 2. When the LED view angle is wider, the IR distance will be shorter. i.e.for 8 Leds' IR Illuminator, ir illuminator which has 90 degree could only reach 100ft IR distance while the one with 60 degree could reach 130ft. 3. The IR distance and view angle are for your referance, the final view distance & angle is depend on your camera lens. Please choose relative IR illuminator according to your camera lens. Specification: IR LEDs: 8pcs high power LED IR lights Structure: Aluminum body Light angle: 90 degree Led wavelength: 850nm Waterproof level: IP65 IR distance: 95ft(20-29m) Power input: DC 12V/1A (Plug size 5.5 x 2.1mm)---Power adapter Not included Weight: 300g
  • Floureon 900TVL CCTV Security Bullet DVR Extra Camera 4mm Lens 24 Infrared Leds Camera with 15M Night Vision IP66 Waterproof Outdoor Compatiable With CCTV Security System
    https://images-na.ssl-images-amazon.com/images/I/51nT3af887L.jpg

    Floureon 900TVL CCTV Security Bullet DVR Extra Camera 4mm Lens 24 Infrared Leds Camera with 15M Nigh

    Important Note: This CCTV security camera only works as an extra camera for the home surveillance system DVR. Please make sure you system is compatiable with this camera. Features: 900TVL 1/4" 4mm Lens CMOS CCTV DVR Camera Super low lux 0 Lux minimum illumination 24 infrared Leds camera with 15m night vision Suitable day and night using with 24 infrared Leds System of Signal: NTSC IP66 means this camera is suitable for outdoor locations. Excellent material of metal shell ensure its waterproof and vandalproof,provide you a convenient and safe life Perfect for your Home, Office, Shop, Business, Restaurant. Specification: Image Sensor Image Sensor Type:CMOS Sensor Size:1/4 Inch Signal System:NTSC Horizontal Resolution:900 TV Lines Lens:4mm Minimum Illumination:0.1LUX/F1.2 Day/Night:IR-CUT Waterproof:IP66 Camera Features IR Led:24pcs IR Irradiation Distance:10m~20m S/N Ratio> 48dB White Balance:Automatic Backlight Compensation:Automatic Shutter Speed:Automatic electronic shutter 1/60-1/100000 Sec Physical Environment Power Supply:12V DC Material:Metal Shell Application:Outdoor/Indoor Connector:BNC, DC Operating Temperature:-10° ~ 50°C (14°F~122°F) Humidity:Below 90%RH Dimensions:12*7.5*16(cm) Package Included: 1 x 900TVL Outdoor Waterproof CCTV DVR Bullet Camera 3 x Set of screws
  • cissp certified information systems security professional study guide
    http://www0.alibris-static.com/isbn/9780782141757.gif

    cissp certified information systems security professional study guide

    Very Good. Lightly used with NO markings in text. Does not include cd. Book is still very good and solid. Pasadena's finest new and used bookstore.
  • fundamentals of information systems security standalone book
    http://www0.alibris-static.com/isbn/9781284031621.gif

    fundamentals of information systems security standalone book

    Good 1284031624 Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
  • introduction to information security a strategic based approach
    http://www0.alibris-static.com/isbn/9781597499699.gif

    introduction to information security a strategic based approach

    International Edition, New condition, Softcover 1st Edition, Printed in Black and White, 382 Pages, Have Same Content as US edition, ISBN or Book Cover may be Different.
  • Security Camera Outdoor, JOOAN 604YRA-T (Update Version)1000TVL CCTV Outdoor Waterproof Bullet Surveillance Camera For Security 42-IR-LED - Black
    https://images-na.ssl-images-amazon.com/images/I/410p5MllQ%2BL.jpg

    Security Camera Outdoor, JOOAN 604YRA-T (Update Version)1000TVL CCTV Outdoor Waterproof Bullet Surve

    3.6mm varifocal lens for a wide range of viewing area; 42 IR LEDs for Night Vision Up to 15 meters distance for 24-hour Surveillance. Professional weaterproof camera used high quality materials, can effectively prevent rust,can be installed in outdoor or indoor
  • SWANN SWPRO-735DUM-US PRO-735 Imitation Security Camera
    http://images10.newegg.com/ProductImageCompressAll200/A00Y_1_201605031475065162.jpg

    SWANN SWPRO-735DUM-US PRO-735 Imitation Security Camera

    SWANN SWPRO-735DUM-US PRO-735 Imitation Security Camera
  • Outdoor Security Cameras with Night Vision
    http://litbimg.rightinthebox.com/images/m/201405/ihwwxa1401438509072.jpg

    Outdoor Security Cameras with Night Vision

    Lens (mm):3.6; Minimum Illumination (Lux):0; Sensor Type:CMOS; Sensor Size:1/4 Inch; Signal System:NTSC,PAL; Camera - Power Supply:12V DC 1000mA; IR Distance (m):10-15; S/N Ratio (dB):48; Video Output:BNC 1.0Vp-p 75Ω; Listing Date:06/23/2014
  • Secure-It 132 0152 Hex Security Fasteners 4pk
    http://site.unbeatablesale.com/img546/eflte3514.gif

    Secure-It 132 0152 Hex Security Fasteners 4pk

    Computer equipment cant walk away when its secured with this no-key no-combination security device. Its not the toughest lock in the world but it is an affordable method for preventing casual appropriation. Use surface-mount screws to secure these hex fasteners to your computer server rack or other equipment. Then pass security cables through the openings to conceal the screws. Sold in a 4-pack.
  • Streetwise Security Products Msd8Gb 8Gb Micro Memory Card With Adaptor
    http://site.unbeatablesale.com/img209/cemsd8gb.gif

    Streetwise Security Products Msd8Gb 8Gb Micro Memory Card With Adaptor

    The 8 Gigabyte microSD card with full size SD card adapter is for use with our hidden DVR line.
  • The Chief Information Security Officer: Insights, tools and survival skills
    https://kbimages1-a.akamaihd.net/Images/75f46bca-df87-4140-992c-50c63fbbd38a/120/185/False/the-chief-information-security-officer-insights-tools-and-survival-skills.jpg

    The Chief Information Security Officer: Insights, tools and survival skills

    This guide describes the hard and soft skills that a successful CISO requires. Emphasising the importance of a suitable Information Security Management System (ISMS) and the risk management methodology that should be at its heart, it explains the changing goals of the information security department.
  • CCTV Security Camera Waterproof IR Bullet Camera Outdoor Camera Wide Angle Lens
    http://thumbs2.ebaystatic.com/m/mM0LWRjo3hYsCb26EZ3oqVA/140.jpg
  • craft of system security
    http://www0.alibris-static.com/isbn/9780321434838.gif

    craft of system security

    Good Textbooks may not include access codes. Shipped from a real independent book store in Manhattan.
  • 4PCS CCTV Accessories 10m 33ft CCTV RJ45 Video Network Cable  DC Power for Security System Camera Extension Cable
    http://litbimg.rightinthebox.com/images/m/201711/zboeif1510049088312.jpg

    4PCS CCTV Accessories 10m 33ft CCTV RJ45 Video Network Cable DC Power for Security System Camera Ex

    Type:Cables; Listing Date:11/07/2017; Production mode:External procurement
  • security policies and implementation issues
    http://www0.alibris-static.com/isbn/9780763791322.gif

    security policies and implementation issues

    Good. Trade paperback (US). Glued binding. Contains: Illustrations, black & white, Line drawings, black & white, Tables, black & white, Figures. Information Systems Security & Assurance.
  • information security the complete reference second edition
    http://www0.alibris-static.com/isbn/9780071784351.gif

    information security the complete reference second edition

    Very good Publisher overstock or return with minor shelfwear. May have remainder mark. Carefully inspected. Leaves our warehouse same or next business day. Most continental U.S. orders lead time 4-10 days. Thank you for your business.
  • Sony Security NVR-CARRIER Hard Disk Drive Carrier
    http://www.101phones.com/images/CatalogItemVariation/68274/Sony-Security-NVR-CARRIER-Hard-Disk-Drive-Carrier-img1.jpg

    Sony Security NVR-CARRIER Hard Disk Drive Carrier

    "Sony NVR-CARRIER Brand New, The Sony NVR-CARRIER is a removable tray designed to safely store a hard drive used for storage expansion of the Sony Network Surveillance Server. NVR-CARRIER Features: Hard Drive Carrier, Removable Tray, For Securely Storing Hard Drive, Used w/ Network Surveillance Server"
  • Sony Security NVR-CARRIER Hard Disk Drive Carrier
    http://sny.factoryoutletstore.com/images/CatalogItemVariation/68274/Sony-Security-NVR-CARRIER-Hard-Disk-Drive-Carrier-img1.jpg

    Sony Security NVR-CARRIER Hard Disk Drive Carrier

    "Sony NVR-CARRIER Brand New, The Sony NVR-CARRIER is a removable tray designed to safely store a hard drive used for storage expansion of the Sony Network Surveillance Server. NVR-CARRIER Features: Hard Drive Carrier, Removable Tray, For Securely Storing Hard Drive, Used w/ Network Surveillance Server"
  • Sony Security NVR-CARRIER Hard Disk Drive Carrier
    http://sony.onlinephonestore.com/images/CatalogItemVariation/68274/Sony-Security-NVR-CARRIER-Hard-Disk-Drive-Carrier-img1.jpg

    Sony Security NVR-CARRIER Hard Disk Drive Carrier

    "Sony NVR-CARRIER Brand New, The Sony NVR-CARRIER is a removable tray designed to safely store a hard drive used for storage expansion of the Sony Network Surveillance Server. NVR-CARRIER Features: Hard Drive Carrier, Removable Tray, For Securely Storing Hard Drive, Used w/ Network Surveillance Server"
  • Information Security Breaches: Avoidance and Treatment based on ISO27001
    https://kbimages1-a.akamaihd.net/Images/97e8bcd8-d2a0-4419-bac5-380ca749489e/120/185/False/information-security-breaches-avoidance-and-treatment-based-on-iso27001-2.jpg

    Information Security Breaches: Avoidance and Treatment based on ISO27001

    If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be able to isolate the suspect devices right from the start. This pocket guide tells you what you have to do if a security breach occurs, detailing the plans and procedures you need to put in place. In particular, it gives clear guidance on how to treat an information security breach in accordance with ISO27001:2013
  • The True Cost of Information Security Breaches and Cyber Crime
    https://kbimages1-a.akamaihd.net/Images/2d2a85e7-bac3-4509-875c-73c2de39a75f/120/185/False/the-true-cost-of-information-security-breaches-and-cyber-crime.jpg

    The True Cost of Information Security Breaches and Cyber Crime

    This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
  • security information and event management implementation
    http://www0.alibris-static.com/isbn/9780071701099.gif

    security information and event management implementation

    Very good Publisher overstock or return with minor shelfwear. May have remainder mark. Carefully inspected. Leaves our warehouse same or next business day. Most continental U.S. orders lead time 4-10 days. Thank you for your business.
  • A Dictionary of Information Security Terms, Abbreviations and Acronyms
    https://kbimages1-a.akamaihd.net/Images/5c62e3f9-1b08-4307-b569-323cbaab915b/120/185/False/a-dictionary-of-information-security-terms-abbreviations-and-acronyms.jpg

    A Dictionary of Information Security Terms, Abbreviations and Acronyms

    This Dictionary is an invaluable resource for people grappling with security terminology for the first time. Rather than a dry technical dictionary, the book is written in an accessible style that enables managers and novices to quickly grasp the meaning
  • CISSP 100 Success Secrets: Certified Information Systems Security Professional; The Missing Exam Study, Certification Preparation and Security Applica
    https://kbimages1-a.akamaihd.net/Images/07884074-d46c-48db-81a8-7f2a1dd86e10/120/185/False/cissp-100-success-secrets-certified-information-systems-security-professional-the-missing-exam-study-certification-preparation-and-security-applica.jpg

    CISSP 100 Success Secrets: Certified Information Systems Security Professional; The Missing Exam Stu

    Addresses the top 100 consultancy & education forum questions, with tips & success factors on investigating, evaluating, attaining & capitalising on Certified Information Systems Security Professional (CISSP) IT certification.
  • The Information Thieves
    https://kbimages1-a.akamaihd.net/Images/1e42cf16-e3dc-4bb2-b932-3c971cc8aabc/120/185/False/the-information-thieves.jpg

    The Information Thieves

    Dallas in the near future-a city full of high-tech companies, sprawling tent cities, miracles, and dangerous secrets. Eli's family thinks he just plays computer games with a group of harmless nerds called the Merry Men. But when he disappears, the CIA, an underworld ninja, and worse yet, World Tech corporate security start chasing him. Now the race is on as his family, a shady art dealer, a cloned superboy and a reborn Neanderthal try to find him in time.
  • Shed & Garage Alarm
    http://images.campingworld.com/is/image/cwi/8000/86700n-garagealarm.jpg?hei=-1

    Shed & Garage Alarm

    Powerful 120 dB siren is audible up to 750' away. Stand-alone alarm installs in minutes - mounts on door window or frame. No wiring required. User-friendly keypad operationArm and disarm with the 4-digit code of your choosingIncludes two operating modes: chime (alert) and siren (alarm)Requires 3 AAA batteries (sold separately)Built-in low battery indicator
  • New School of Information Security, The
    http://www.informit.com/ShowCover.aspx?isbn=9780132800280&type=d
  • Generic MGT121AR 12V 1000A Regulated Power Supply for Security Cameras
    http://site.unbeatablesale.com/WRTD7500.JPG

    Generic MGT121AR 12V 1000A Regulated Power Supply for Security Cameras

    If you are a gadget lover our Electronics catalog is your dream destination. Choose from hundreds of gadgets and accessories to suit different uses and add some entertainment facility and convenience to your life.FeaturesLots of options in every categoryHigh quality construction and modern designsSuperior quality performance and reliabilityCompetitive prices and value for moneyFeaturesClass II 1The unit plugs into a wall outlet and features a six foot cable with a 2.1mm pin positive coax plug for DC outputSpecificationsSize: 2.1mmVoltage: 12VAerage: 1000
  • The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden
    https://kbimages1-a.akamaihd.net/Images/235078d3-8639-4cdc-9271-d9b44b8b58bc/120/185/False/the-millennial-generation-as-an-insider-cyber-security-threat-high-risk-or-overhyped-comparisons-to-genx-and-baby-boomers-computer-security-information-theft-us-cert-risk-factors-edward-snowden.jpg

    The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons t

    This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX. CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION
  • readings and cases in information security law and ethics
    http://www0.alibris-static.com/isbn/9781435441576.gif

    readings and cases in information security law and ethics

    Good 1435441575 Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
  • Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/47da8337-c884-4947-a58b-2e5a1fd0ef6d/120/185/False/business-driven-information-systems-6.jpg

    Business Driven Information Systems

    Facts101 is your complete guide to Business Driven Information Systems. In this book, you will learn topics such as Ebusiness: Electronic Business Value, Ethics and Information Security: MIS Business Concerns, Infrastructures: Sustainable Technologies, and Data: Business Intelligence plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Information Systems
    https://kbimages1-a.akamaihd.net/Images/20346c24-e4c3-4a63-ad4f-525da5c78285/120/185/False/information-systems-3.jpg

    Information Systems

    Facts101 is your complete guide to Information Systems. In this book, you will learn topics such as Ebusiness: Electronic Business Value, Ethics + Information Security: MIS Business Concerns, Infrastructures: Sustainable Technologies, and Data: Business Intelligence plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Essentials of Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/bb936561-db14-44f2-874b-57828fc1cca2/120/185/False/essentials-of-business-driven-information-systems.jpg

    Essentials of Business Driven Information Systems

    Facts101 is your complete guide to Essentials of Business Driven Information Systems. In this book, you will learn topics such as E-Business, Ethics and Information Security, IT Architectures, and Databases and Data Warehouses plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Accounting Information Systems
    https://kbimages1-a.akamaihd.net/Images/d32e992f-f779-40a7-9feb-eb3e40804e51/120/185/False/accounting-information-systems-13.jpg

    Accounting Information Systems

    Facts101 is your complete guide to Accounting Information Systems. In this book, you will learn topics such as eBusiness and eCommerce, Transaction Processing and the Internal Control Process, Information Security, and Electronic Data Processing Systems plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/fae6da92-d210-40bb-a3af-e610a815fa83/120/185/False/business-driven-information-systems-4.jpg

    Business Driven Information Systems

    Facts101 is your complete guide to Business Driven Information Systems. In this book, you will learn topics such as Ebusiness, Ethics and Information Security, Enterprise Architectures, and Databases and Data Warehouses plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
  • Business Driven Information Systems
    https://kbimages1-a.akamaihd.net/Images/7d233625-87e8-4e4d-a81e-20b513012db1/120/185/False/business-driven-information-systems-5.jpg

    Business Driven Information Systems

    Facts101 is your complete guide to Business Driven Information Systems. In this book, you will learn topics such as Ebusiness: Electronic Business Value, Ethics and Information Security: MIS Business Concerns, Infrastructures: Sustainable Technologies, and Data: Business Intelligence plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.
Loading products...
Loading more results...