| |
Diese Dokumentation schlägt eine Schneise durch das Dickicht des Versicherungsmarktes der Cyber-Policen. Versicherungen gegen Cyberkriminalität werden zunehmend wichtiger: Angriffe auf die Informationstechnik von Unternehmen können Schäden in Millionenhöhe hinterlassen,...
Editeur :
Springer Gabler
Parution :
2014-10-08
Collection :
essentials
PDF, ePub
|
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully...
Editeur :
Syngress
Parution :
2014-10-07
PDF, epub sans DRM
|
Conducting research and technology design for domestic life is by no means easy. Methods commonly used in the field of Human-Computer Interaction in settings like the workplace may not easily translate to the richness and complexity of domestic life. This book...
Editeur :
Morgan Kaufmann
Parution :
2014-09-26
PDF, epub sans DRM
|
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online...
Editeur :
Butterworth-Heinemann
Parution :
2014-09-25
PDF, epub sans DRM
|
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).
For many years theCSA has been at the forefront of research...
Editeur :
Syngress
Parution :
2014-09-22
PDF, epub sans DRM
|
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most...
Editeur :
SAGE Publications Ltd
Parution :
2014-09-15
PDF
|
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly...
Editeur :
Butterworth-Heinemann
Parution :
2014-09-10
PDF, epub sans DRM
|
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset—its proprietary information—safe from cyber and physical...
Editeur :
Butterworth-Heinemann
Parution :
2014-09-09
PDF, epub sans DRM
|
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop,...
Editeur :
Syngress
Parution :
2014-09-02
PDF, epub sans DRM
|
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a...
Editeur :
Syngress
Parution :
2014-08-27
PDF, epub sans DRM
|
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and...
Editeur :
Butterworth-Heinemann
Parution :
2014-08-23
PDF, epub sans DRM
|
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk...
Editeur :
Butterworth-Heinemann
Parution :
2014-08-23
PDF, epub sans DRM
|
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...
Editeur :
Syngress
Parution :
2014-08-14
epub sans DRM
|
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an...
Editeur :
Syngress
Parution :
2014-08-12
PDF, epub sans DRM
|
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such...
Editeur :
Springer
Parution :
2014-07-28
ePub
|
Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...
Editeur :
Syngress
Parution :
2014-07-16
PDF, epub sans DRM
|
?What will business software look like in the future? And how will it be developed?This book covers the proceedings of the first international conference on Future Business Software – a new think tank discussing the trends in enterprise software with speakers from...
Editeur :
Springer
Parution :
2014-07-08
ePub
|
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of...
Editeur :
Springer
Parution :
2014-07-07
ePub
|
Please note this is a Short Discount publication. A comprehensive guide to EDP contingency planning and disaster recovery. Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the...
Editeur :
Elsevier Science
Parution :
2014-06-28
PDF sans DRM
|
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and...
Editeur :
Butterworth-Heinemann
Parution :
2014-06-28
PDF sans DRM
|