Télécharger le livre :  Smart Cities Cybersecurity and Privacy
Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental...

Editeur : Elsevier
Parution : 2018-12-04
epub sans DRM

114,99

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hardware Security
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and...

Editeur : Morgan Kaufmann
Parution : 2018-10-30
epub sans DRM

66,45

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Versatile Cybersecurity
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books...

Editeur : Springer
Parution : 2018-10-17
PDF, ePub

168,79

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity Incident Response
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and...

Editeur : Apress
Parution : 2018-09-20
PDF, ePub

62,11

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures
Industry and government are increasingly reliant on an intelligent – or ‘smart’ – and interconnected computer infrastructure, but the reality is that it is extremely difficult to provide full cyber defense and/or intrusion prevention for the smart networks that connect...

Editeur : SAGE Publications Ltd
Parution : 2018-09-15
PDF

96,72

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  From Digital Traces to Algorithmic Projections
From Digital Traces to Algorithmic Projections describes individual digital fingerprints in interaction with the different algorithms they encounter throughout life. Centered on the human user, this formalism makes it possible to distinguish the voluntary projections of...

Editeur : Iste Press - Elsevier
Parution : 2018-09-07
epub sans DRM

73,80

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists...

Editeur : Sybex
Parution : 2018-08-31
PDF, ePub

37,98

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Firewalls Don't Stop Dragons
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is...

Editeur : Apress
Parution : 2018-08-24
PDF, ePub

39,43

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT-Sicherheit mit System
Durch die digitale Transformation, Cloud-Computing und dynamisch steigende Bedrohungen sind die Effizienz, Existenz und Zukunft eines Unternehmens mehr denn je abhängig von der Sicherheit,  Kontinuität sowie den Risiken der Informationsverarbeitung. Die...

Editeur : Springer Vieweg
Parution : 2018-08-20
PDF

70,67

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Open Source Intelligence Methods and Tools
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism...

Editeur : Apress
Parution : 2018-06-30
PDF

56,19

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT-Risikomanagement von Cloud-Services in Kritischen Infrastrukturen
Der Einsatz von Cloud-Services birgt neben vielfältigen Vorteilen auch Risiken für die IT-Sicherheit von Unternehmen. Dies gilt insbesondere für Betreiber Kritischer Infrastrukturen, die durch das IT-Sicherheitsgesetz dazu verpflichtet werden, ihre IT besser vor...

Editeur : Springer Vieweg
Parution : 2018-06-28
Collection : essentials PDF

4,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Advances in Human Factors in Cybersecurity
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2018-06-23
PDF, ePub

147,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Asset Attack Vectors
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...

Editeur : Apress
Parution : 2018-06-15
PDF

46,34

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Resilience of Systems and Networks
This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government.  Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security  - which is...

Editeur : Springer
Parution : 2018-05-30
PDF, ePub

116,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Security Monitoring
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the...

Editeur : Wiley
Parution : 2018-03-13
PDF, ePub

45,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WHAT IF ARTIFICIAL INTELLIGENCE COULD MAKE US MORE HUMAN?
The term “arti cial intelligence” conjures up all manner of science- ction style fantasies, from the end of work to machine domination and the extinction of the human race. But what if these fears were largely unfounded? Already a...

Editeur : Débats Publics
Parution : 2018-02-12
PDF sans DRM, epub sans DRM

11,99

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital and Document Examination
The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward. This volume, Digital and Document Examination, will serve as a graduate level text for those studying and teaching digital...

Editeur : Academic Press
Parution : 2018-01-27
epub sans DRM

97,01

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Privileged Attack Vectors
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached....

Editeur : Apress
Parution : 2017-12-08
PDF, ePub

28,47

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Achieving and Sustaining Secured Business Operations
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company...

Editeur : Apress
Parution : 2017-12-07
PDF, ePub

34,50

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Seeking the Truth from Mobile Evidence
Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing...

Editeur : Academic Press
Parution : 2017-11-17
PDF, ePub

68,52

Téléchargement immédiat
Dès validation de votre commande
<< < 89101112 >