
Manual Ingeniería de la Seguridad: : Seguridad en las Tecnologías Emergentes
Paperback
Series: Colección Seguridad Privada, Book 56
Publisher: Independently Published
Published: Nov 22 2023
Pages: 166
Weight: 0.51
Height: 0.35 Width: 6.00 Depth: 9.00
Language: Spanish
Estas infracciones de seguridad han generaron grandes impactos económicos directos por fraude y robo, pero también pueden producir los mismos de manera indirecta, como: la suplantación de identidad, que se traduce en pérdida de reputación. Esto puede implicar otras consecuencias de orden financiero sobre la persona natural o la empresa debido a la pérdida de amistades o clientes, la degradación de la confianza de los accionistas y el daño sobre la imagen de la marca. Además, las infracciones de seguridad pueden tener consecuencias legales y reglamentarias derivadas en sanciones y multas.
A diario, encontramos en las noticias que se menciona sobre estos temas de actualidad., puede saber que los atacantes lograron vulnerar aplicaciones para acceder a los datos almacenados en sistemas informáticos de vendedores minoristas, empresas de informes crediticios, sistemas de salud, aerolíneas, empresas de entretenimiento, agencias gubernamentales, escuelas y muchas otras organizaciones. En un caso, un país extranjero vulneró una cadena de hoteles. En otro caso, a través de un ataque de inyección de código SQL (el cual se abordará posteriormente), se instaló spyware en las computadoras de una compañía para exponer la información de tarjetas de crédito de los clientes. En varios casos, los intrusos robaron datos de tarjetas de crédito gracias a las debilidades de los sistemas de cifrado de datos (encriptado). En total, estos ataques expusieron la información personal de cientos de millones de clientes.
Also from
Sosa González, Rafael Darío
Manual de Seguridad para Grandes Superficies: Manual de Seguridad Centros Comerciales
Sosa González, Rafael Darío
Paperback
Manual Protección a Personas Muy Importantes V.I.P: Manual de Seguridad a Personas Muy Importantes
Sosa González, Rafael Darío
Paperback
Manual Proteja a sus hijos del Internet: : Es vital que cuidemos del Internet a nuestros hijos
Sosa González, Rafael Darío
Paperback
Manual del Contravigilante: : Evite ser sorprendido por las amenazas!
Sosa González, Rafael Darío
Paperback
Manual Supervisor Medios Tecnológicos: : Supervise la Seguridad Técnica
Sosa González, Rafael Darío
Paperback
Manual Escolta de Valores-Conductor: : Hágase experto en Escolta de valores
Sosa González, Rafael Darío
Paperback
Manual del Escolta Privado: : Aprenda los principios básicos de protección !
Sosa González, Rafael Darío
Paperback
Manual de Seguridad Bancaria y Financiera: : Proteja los bancos y sus clientes
Sosa González, Rafael Darío
Paperback
Manual Escolta Privado a Personas: : Proteja su vida de la Delincuencia
Sosa González, Rafael Darío
Paperback
Manual Gerencia de la Seguridad: : Las Directrices de la Gerencia para la Seguridad
Sosa González, Rafael Darío
Paperback
Manual sus hijos del Internet: : Proteja el Patrimonio más grande "Sus Hijos"
Sosa González, Rafael Darío
Paperback
Manual de Seguridad Residencial Avanzado: Manual Avanzado de Seguridad Residencial
Sosa González, Rafael Darío
Paperback
Manual Introducción a la Vigilancia: Introducción a la Vigilancia y Seguridad
Sosa González, Rafael Darío
Paperback
Manual de Seguridad Bancaria Avanzada: : Proteja los Bancos con estás medidas seguridad
Sosa González, Rafael Darío
Paperback
Manual de Seguridad Informática: : Un tema de Actualidad Seguridad Informatica
Sosa González, Rafael Darío
Paperback
Manual de Seguridad Hotelera Avanzado: : La Seguridad de sus Huéspedes es Prioritaria
Sosa González, Rafael Darío
Paperback
Also in
Computer Security
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy
Deibert, Ronald J.
Hardcover
Password Logbook (Hip Floral): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location
Editors of Rock Point
Hardcover
Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack!
Welsh, Joshua
Paperback
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
Chapple, Mike
Stewart, James Michael
Gibson, Darril
Paperback
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
Kloep, Peter
Kofler, Michael
Gebeshuber, Klaus
Paperback
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
Schneier, Bruce
Paperback
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Greenberg, Andy
Paperback
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
Wolff, Josephine
Paperback
Digital Ethics in the Age of AI: Navigating the ethical frontier today and beyond
Mehan, Julie
Paperback
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
Aumasson, Jean-Philippe
Paperback
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide
Gibson, Darril
Chapple, Mike
Stewart, James Michael
Paperback
Comptia Security+ Study Guide with Over 500 Practice Test Questions: Exam Sy0-701
Chapple, Mike
Seidl, David
Paperback
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Zetter, Kim
Paperback
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Occupytheweb
Paperback
Password Logbook (Black & Gold): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location
Editors of Rock Point
Hardcover
Faik: A Practical Guide to Living in a World of Deepfakes, Disinformation, and Ai-Generated Deceptions
Carpenter, Perry
Hardcover
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
Hoffman, Andrew
Paperback
Shit I Can't Remember: Keep track of usernames, passwords, web addresses in one easy & organized location
Books, Family's
Paperback
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Murdoch Gse, Don
Paperback
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
Menn, Joseph
Paperback
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover
Pray, Norman M.
Paperback
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Stuttard, Dafydd
Pinto, Marcus
Paperback
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
Linn, Ryan
Sims, Stephen
Harper, Allen
Paperback
Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed
Diogenes, Yuri
Paperback
The Online World, What You Think You Know and What You Don't: 4 Critical Tools for Raising Kids in the Digital Age
Mankarious, Rania
Paperback
Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars
Tangredi, Sam J.
Galdorisi, George
Hardcover
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security!
Dodson, Adam
Hardcover
Hacking Etico 101 - Cómo hackear profesionalmente en 21 días o menos!: 2da Edición. Revisada y Actualizada a Kali 2.0.
Astudillo B., Karina
Paperback
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Reiber, Lee
Paperback
Cisa Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives
Gregory, Peter H.
Chapple, Mike
Paperback
Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware
Crossley, Cassie
Paperback
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Güneysu, Tim
Paar, Christof
Pelzl, Jan
Hardcover
Security Chaos Engineering: Sustaining Resilience in Software and Systems
Rinehart, Aaron
Shortridge, Kelly
Paperback
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
Golden, Daniel
Dudley, Renee
Paperback
Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking
Burrough, Matt
Belgers, Walter
Weyers, Jos
Paperback
Humorous Cryptograms: 300 Large Print Puzzles To Keep You Entertained (Large Print Edition)
Nest, Game
Paperback
Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools
Jaswal, Nipun
Paperback
Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers
Crose, Emily
Hardcover
Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security
Miles, Russ
Giguere, Stephen
Smith, Taylor
Paperback
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography
Baka, Paul
Schatten, Jeremy
Paperback
Cyberdynamx: The Art and Science of Building a Simplified Digital Security Program
Blais, Curtis L.
Paperback
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Zhussupov, Zhassulan
Paperback
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization
Xiao, Huang
Xu, Peng
Kolosnjaji, Bojan
Paperback
Internet Password Logbook (Red Leatherette): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location
Editors of Rock Point
Hardcover
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Cucci, Kyle
Paperback
Isc2 Cissp Certified Information Systems Security Professional Official Practice Tests
Chapple, Mike
Seidl, David
Paperback
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology
Graber, Diana
Paperback
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
Holden, Joshua
Paperback
Windows Security Internals: A Deep Dive Into Windows Authentication, Authorization, and Auditing
Forshaw, James
Paperback
Hacking Exposed 7: Network Security Secrets and Solutions
McClure, Stuart
Kurtz, George
Scambray, Joel
Paperback
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Oettinger, William
Paperback
Cyber War: The Next Threat to National Security and What to Do about It
Clarke, Richard A.
Knake, Robert
Paperback
Comptia Security+ All-In-One Exam Guide, Sixth Edition (Exam Sy0-601)
White, Greg
Conklin, Wm Arthur
Hardcover
Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect your email, computer, and bank accounts from hackers, malware, and identity theft
Bailey, Sean M.
Devin, Kropp
Paperback
The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks
Wittkop, Jeremy
Paperback
Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions
Shbeeb, Aaron
Bodungen, Clint
Singer, Bryan
Paperback
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
Tevault, Donald a.
Paperback
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Saydjari, O. Sami
Paperback
Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers
Merli, Dominik
Paperback
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr
Dunkerley, Mark
Tumbarello, Matt
Paperback
Cism Certified Information Security Manager All-In-One Exam Guide [With CD (Audio)]
Gregory, Peter H.
Paperback
The CyberSecurity Leadership Handbook for the CISO and the CEO: How to Fix Decade-Old Issues and Protect Your Organization from Cyber Threats
Gaillard, Jean-Christophe
Paperback
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense
Hartman, Shane
Paperback
Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF
Brown, Jason
Paperback
Python for Security and Networking - Third Edition: Leverage Python modules and tools in securing your network and applications
Ortega, José Manuel
Paperback
Technology for Littles: Helping Young Children Navigate the Internet Responsibly
Rogers-Whitehead, Carrie
Paperback
Don't Trust Your Gut: Using Data to Get What You Really Want in Life
Stephens-Davidowitz, Seth
Paperback
Zero Trust Networks: Building Secure Systems in Untrusted Networks
Rais, Razi
Morillo, Christina
Gilman, Evan
Paperback
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Hijazi, Rami
Hassan, Nihad A.
Paperback
Practical Iot Hacking: The Definitive Guide to Attacking the Internet of Things
Calderon, Paulino
Chantzis, Fotios
Stais, Ioannis
Paperback
IT Governance: An international guide to data security and ISO 27001/ISO 27002, Eighth edition
Watkins, Steve
Calder, Alan
Paperback
Cisco Cybersecurity Operations Fundamentals Cbrops 200-201 Official Cert Guide
Santos, Omar
Hardcover
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters
Calhoun, Frederick S.
Weston J. D., Stephen W.
Paperback
Practical Cybersecurity Architecture - Second Edition: A guide to creating and implementing robust designs for cybersecurity architects
Moyle, Ed
Kelley, Diana
Paperback
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
Troia, Vinny
Paperback
Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem
Robinson, Nikki
Hughes, Chris
Paperback
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Lyon, Gordon
Fyodor
Paperback
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
Arcuri, Jennifer
Hickey, Matthew
Paperback
Intelligence-Driven Incident Response: Outwitting the Adversary
Brown, Rebekah
Roberts, Scott J.
Paperback
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies
Parker, Carey
Paperback
The Art of Deception: Controlling the Human Element of Security
Simon, William L.
Mitnick, Kevin D.
Paperback
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting
Trent, Rod
Zorich, Matthew
Morowczynski, Mark
Paperback
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
Chappell, Laura
Paperback