Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Editeur : Apress
Parution : 2022-11-17

PDF, ePub

62,11
Télécharger le livre :  Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems
Ajouter à ma liste d'envies
Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...

Editeur : SAGE Publications Ltd
Parution : 2022-11-15

PDF

102,26
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...

Editeur : Wiley
Parution : 2022-11-10

ePub

106,50
Télécharger le livre :  Cybersecurity in Intelligent Networking Systems
Ajouter à ma liste d'envies
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...

Editeur : Wiley-IEEE Press
Parution : 2022-11-02
Collection : IEEE Press
PDF, ePub

122,80
Télécharger le livre :  Security in Vehicular Networks
Ajouter à ma liste d'envies
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages,...

Editeur : Wiley-ISTE
Parution : 2022-09-14

PDF, ePub

148,86
Télécharger le livre :  Penetration Tester werden für Dummies
Ajouter à ma liste d'envies
Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbstPentests durchzuführen. Von den nötigen Vorbereitungen über...

Editeur : Wiley-VCH
Parution : 2022-08-17
Collection : Für Dummies
ePub

23,84
Télécharger le livre :  Blockchain Security from the Bottom Up
Ajouter à ma liste d'envies
The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...

Editeur : Wiley
Parution : 2022-07-26

PDF, ePub

27,11
Télécharger le livre :  Theoretical Cybersecurity
Ajouter à ma liste d'envies
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text...

Editeur : Apress
Parution : 2022-07-12

PDF, ePub

56,19
Télécharger le livre :  40 Years of Experience with the National Market System (NMS)
Ajouter à ma liste d'envies
In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...

Editeur : Springer
Parution : 2022-06-30
Collection : Zicklin School of Business Financial Markets Series
PDF, ePub

147,69
Télécharger le livre :  Anomaly Detection as a Service
Ajouter à ma liste d'envies
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the...

Editeur : Springer
Parution : 2022-06-01
Collection : Synthesis Lectures on Information Security, Privacy, and Trust
PDF

58,01
Télécharger le livre :  Cyber-Physical Security and Privacy in the Electric Smart Grid
Ajouter à ma liste d'envies
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future...

Editeur : Springer
Parution : 2022-06-01
Collection : Synthesis Lectures on Information Security, Privacy, and Trust
PDF

26,36
Télécharger le livre :  The Metrics Manifesto
Ajouter à ma liste d'envies
Security professionals are trained skeptics. They poke and prod at other people’s digital creations, expecting them to fail in unexpected ways. Shouldn’t that same skeptical power be turned inward? Shouldn’t practitioners ask: “How do I know that my enterprise security...

Editeur : Wiley
Parution : 2022-05-03

PDF, ePub

36,08
Télécharger le livre :  Cyber Security and Network Security
Ajouter à ma liste d'envies
CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other...

Editeur : Wiley-Scrivener
Parution : 2022-03-29
Collection : Advances in Cyber Security
PDF, ePub

193,01
Télécharger le livre :  Security Awareness For Dummies
Ajouter à ma liste d'envies
Make security a priority on your team  Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and...

Editeur : For Dummies
Parution : 2022-03-24

PDF, ePub

28,47
Télécharger le livre :  IT Security Controls
Ajouter à ma liste d'envies
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your...

Editeur : Apress
Parution : 2022-03-23

PDF, ePub

66,05
Télécharger le livre :  Future-proofing
Ajouter à ma liste d'envies
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...

Editeur : OUP Oxford
Parution : 2022-02-03

ePub

59,63
Télécharger le livre :  Future-proofing
Ajouter à ma liste d'envies
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...

Editeur : OUP Oxford
Parution : 2022-02-03

PDF

59,63
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Editeur : OUP Oxford
Parution : 2022-01-13

ePub

17,03
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Editeur : OUP Oxford
Parution : 2022-01-13

PDF

17,03
Télécharger le livre :  ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Ajouter à ma liste d'envies
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification.The SSCP is designed to show that holders have the technical skills to...

Editeur : Sybex
Parution : 2022-01-07
Collection : Sybex Study Guide
PDF, ePub

54,12
<< < 23456 >