|
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...
Editeur :
Apress
Parution :
2022-11-17
PDF, ePub
|
Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...
Editeur :
SAGE Publications Ltd
Parution :
2022-11-15
PDF
|
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...
Editeur :
Wiley
Parution :
2022-11-10
ePub
|
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...
Editeur :
Wiley-IEEE Press
Parution :
2022-11-02
Collection :
IEEE Press
PDF, ePub
|
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages,...
Editeur :
Wiley-ISTE
Parution :
2022-09-14
PDF, ePub
|
Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbstPentests durchzuführen. Von den nötigen Vorbereitungen über...
Editeur :
Wiley-VCH
Parution :
2022-08-17
Collection :
Für Dummies
ePub
|
The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...
Editeur :
Wiley
Parution :
2022-07-26
PDF, ePub
|
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text...
Editeur :
Apress
Parution :
2022-07-12
PDF, ePub
|
In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...
Editeur :
Springer
Parution :
2022-06-30
Collection :
Zicklin School of Business Financial Markets Series
PDF, ePub
|
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the...
Editeur :
Springer
Parution :
2022-06-01
Collection :
Synthesis Lectures on Information Security, Privacy, and Trust
PDF
|
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future...
Editeur :
Springer
Parution :
2022-06-01
Collection :
Synthesis Lectures on Information Security, Privacy, and Trust
PDF
|
Security professionals are trained skeptics. They poke and prod at other people’s digital creations, expecting them to fail in unexpected ways. Shouldn’t that same skeptical power be turned inward? Shouldn’t practitioners ask: “How do I know that my enterprise security...
Editeur :
Wiley
Parution :
2022-05-03
PDF, ePub
|
CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other...
Editeur :
Wiley-Scrivener
Parution :
2022-03-29
Collection :
Advances in Cyber Security
PDF, ePub
|
Make security a priority on your team Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and...
Editeur :
For Dummies
Parution :
2022-03-24
PDF, ePub
|
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your...
Editeur :
Apress
Parution :
2022-03-23
PDF, ePub
|
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...
Editeur :
OUP Oxford
Parution :
2022-02-03
ePub
|
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...
Editeur :
OUP Oxford
Parution :
2022-02-03
PDF
|
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...
Editeur :
OUP Oxford
Parution :
2022-01-13
ePub
|
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...
Editeur :
OUP Oxford
Parution :
2022-01-13
PDF
|
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification.The SSCP is designed to show that holders have the technical skills to...
Editeur :
Sybex
Parution :
2022-01-07
Collection :
Sybex Study Guide
PDF, ePub
|