Télécharger le livre :  Der Cyber-Versicherungsmarkt in Deutschland
Diese Dokumentation schlägt eine Schneise durch das Dickicht des Versicherungsmarktes der Cyber-Policen. Versicherungen gegen Cyberkriminalität werden zunehmend wichtiger: Angriffe auf die Informationstechnik von Unternehmen können Schäden in Millionenhöhe hinterlassen,...

Editeur : Springer Gabler
Parution : 2014-10-08
Collection : essentials PDF, ePub

4,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Detecting and Combating Malicious Email
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully...

Editeur : Syngress
Parution : 2014-10-07
PDF, epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Studying and Designing Technology for Domestic Life
Conducting research and technology design for domestic life is by no means easy. Methods commonly used in the field of Human-Computer Interaction in settings like the workplace may not easily translate to the richness and complexity of domestic life. This book...

Editeur : Morgan Kaufmann
Parution : 2014-09-26
PDF, epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Online Risk
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online...

Editeur : Butterworth-Heinemann
Parution : 2014-09-25
PDF, epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CSA Guide to Cloud Computing
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years theCSA has been at the forefront of research...

Editeur : Syngress
Parution : 2014-09-22
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security and Resiliency Policy Framework
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most...

Editeur : SAGE Publications Ltd
Parution : 2014-09-15
PDF

94,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Integrated Security Systems Design
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly...

Editeur : Butterworth-Heinemann
Parution : 2014-09-10
PDF, epub sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Governance and Security
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset—its proprietary information—safe from cyber and physical...

Editeur : Butterworth-Heinemann
Parution : 2014-09-09
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking and Penetration Testing with Low Power Devices
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop,...

Editeur : Syngress
Parution : 2014-09-02
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Hiding in Speech Signals for Secure Communication
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a...

Editeur : Syngress
Parution : 2014-08-27
PDF, epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Online Security for the Business Traveler
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and...

Editeur : Butterworth-Heinemann
Parution : 2014-08-23
PDF, epub sans DRM

14,72

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Measuring and Managing Information Risk
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk...

Editeur : Butterworth-Heinemann
Parution : 2014-08-23
PDF, epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Performance Analysis Field Guide
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...

Editeur : Syngress
Parution : 2014-08-14
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building an Information Security Awareness Program
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an...

Editeur : Syngress
Parution : 2014-08-12
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Socio-technical Design of Ubiquitous Computing Systems
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such...

Editeur : Springer
Parution : 2014-07-28
ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...

Editeur : Syngress
Parution : 2014-07-16
PDF, epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Future Business Software
?What will business software look like in the future? And how will it be developed?This book covers the proceedings of the first international conference on Future Business Software – a new think tank discussing the trends in enterprise software with speakers from...

Editeur : Springer
Parution : 2014-07-08
ePub

147,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Continued Rise of the Cloud
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of...

Editeur : Springer
Parution : 2014-07-07
ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Risk Manager
Please note this is a Short Discount publication. A comprehensive guide to EDP contingency planning and disaster recovery. Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the...

Editeur : Elsevier Science
Parution : 2014-06-28
PDF sans DRM

263,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Confidential Information Sources
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and...

Editeur : Butterworth-Heinemann
Parution : 2014-06-28
PDF sans DRM

57,97

Téléchargement immédiat
Dès validation de votre commande
<< < 1415161718 >