Télécharger le livre :  Phishing and Communication Channels
Ajouter à ma liste d'envies
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive...

Editeur : Apress
Parution : 2021-12-08

PDF, ePub

56,19
Télécharger le livre :  Cybersecurity Risk Management
Ajouter à ma liste d'envies
Cybersecurity Risk Management InCybersecurity Risk Management: Mastering the Fundamentals Using the NISTCybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and...

Editeur : Wiley
Parution : 2021-11-23

PDF, ePub

104,39
Télécharger le livre :  Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Ajouter à ma liste d'envies
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large...

Editeur : Springer
Parution : 2021-11-17
Collection : Computer Architecture and Design Methodologies
PDF, ePub

147,69
Télécharger le livre :  Snowflake Security
Ajouter à ma liste d'envies
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control,...

Editeur : Apress
Parution : 2021-10-05

PDF, ePub

56,19
Télécharger le livre :  Excess Capacity and Difficulty of Exit
Ajouter à ma liste d'envies
This book provides cases and analyses of causes and consequences of difficulty in downsizing and exiting in the electronics industry during the “two lost decades” in Japan. Because of excess capacity in the industry, many electronics companies have been required for...

Editeur : Springer
Parution : 2021-09-16
Collection : SpringerBriefs in Economics
PDF, ePub

63,29
Télécharger le livre :  Information Security
Ajouter à ma liste d'envies
Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals...

Editeur : Wiley
Parution : 2021-09-15

PDF, ePub

121,75
Télécharger le livre :  Meine digitale Sicherheit Tipps und Tricks für Dummies
Ajouter à ma liste d'envies
Identitätsdiebstahl, Schadsoftware auf dem Rechner, Phishing-Mail? Wir wissen alle, welche Gefahren uns im digitalen Alltag drohen und doch verschließen wir oft die Augen davor. Dieses Buch zeigt Ihnen, warum eine skeptische Grundhaltung vonnöten ist und wie Sie...

Editeur : Wiley-VCH
Parution : 2021-09-09
Collection : Für Dummies
ePub

9,60
Télécharger le livre :  Certified Ethical Hacker (CEH) Preparation Guide
Ajouter à ma liste d'envies
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of...

Editeur : Apress
Parution : 2021-08-27

PDF, ePub

62,11
Télécharger le livre :  8 Steps to Better Security
Ajouter à ma liste d'envies
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical...

Editeur : Wiley
Parution : 2021-08-16

PDF, ePub

27,11
Télécharger le livre :  Cyber Threat Intelligence
Ajouter à ma liste d'envies
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your...

Editeur : Apress
Parution : 2021-08-09

PDF, ePub

56,19
Télécharger le livre :  The Art of Attack
Ajouter à ma liste d'envies
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles...

Editeur : Wiley
Parution : 2021-07-07

PDF, ePub

27,11
Télécharger le livre :  Technology Development for Security Practitioners
Ajouter à ma liste d'envies
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security...

Editeur : Springer
Parution : 2021-06-24
Collection : Security Informatics and Law Enforcement
PDF, ePub

73,84
Télécharger le livre :  Choose Your InfoSec Path
Ajouter à ma liste d'envies
Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic...

Editeur : Apress
Parution : 2021-06-03

PDF, ePub

62,11
Télécharger le livre :  Bow-Tie Industrial Risk Management Across Sectors
Ajouter à ma liste d'envies
BOW-TIE INDUSTRIAL RISK MANAGEMENT ACROSS SECTORS Explore an approachable but rigorous treatment of systematic barrier-based approaches to risk management and failure analysisIn Bow-Tie Industrial Risk Management Across Sectors: A Barrier-Based Approach, accomplished...

Editeur : Wiley
Parution : 2021-05-18

PDF, ePub

112,83
Télécharger le livre :  Protective Security
Ajouter à ma liste d'envies
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization....

Editeur : Apress
Parution : 2021-04-09

PDF, ePub

56,19
Télécharger le livre :  Digital Fluency
Ajouter à ma liste d'envies
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge...

Editeur : Apress
Parution : 2021-04-09

PDF, ePub

56,19
Télécharger le livre :  Jump-start Your SOC Analyst Career
Ajouter à ma liste d'envies
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your...

Editeur : Apress
Parution : 2021-03-04

PDF, ePub

46,34
Télécharger le livre :  Big Breaches
Ajouter à ma liste d'envies
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become...

Editeur : Apress
Parution : 2021-02-24

PDF, ePub

34,50
Télécharger le livre :  Authentication and Access Control
Ajouter à ma liste d'envies
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography...

Editeur : Apress
Parution : 2020-12-11

PDF, ePub

62,11
Télécharger le livre :  Security Engineering
Ajouter à ma liste d'envies
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University...

Editeur : Wiley
Parution : 2020-11-24

PDF, ePub

66,46
<< < 34567 >