| |
This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production....
Editeur :
Springer
Parution :
2017-05-11
PDF, ePub
|
Das Buch bietet einen praxisbezogenen Leitfaden für das Informationssicherheits-, IT- und Cyber-Risikomanagement im Unternehmen – es ist branchenneutral und nimmt Bezug auf relevante Konzepte und Standards des Risikomanagements und der Governance (z.B. COBIT, NIST SP...
Editeur :
Springer Vieweg
Parution :
2017-04-19
Collection :
Edition
PDF, ePub
|
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not...
Editeur :
Wiley
Parution :
2017-02-27
PDF, ePub
|
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs...
Editeur :
Apress
Parution :
2017-01-12
PDF, ePub
|
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as...
Editeur :
Springer
Parution :
2016-12-21
PDF, ePub
|
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network...
Editeur :
Apress
Parution :
2016-12-10
PDF, ePub
|
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works...
Editeur :
Apress
Parution :
2016-11-29
PDF, ePub
|
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from...
Editeur :
Apress
Parution :
2016-11-29
PDF, ePub
|
This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the...
Editeur :
Springer
Parution :
2016-11-25
Collection :
Computer Communications and Networks
PDF
|
The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the...
Editeur :
SAGE Publications Ltd
Parution :
2016-11-15
PDF
|
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and...
Editeur :
Apress
Parution :
2016-10-20
PDF, ePub
|
Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der neuen Fassung der Norm ISO/IEC 27001. Die Autoren erläutern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das...
Editeur :
Springer Vieweg
Parution :
2016-09-14
Collection :
Edition
PDF, ePub
|
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a...
Editeur :
Apress
Parution :
2016-09-06
PDF, ePub
|
Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...
Editeur :
John Murray
Parution :
2016-08-18
ePub
|
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of...
Editeur :
Springer
Parution :
2016-08-16
ePub
|
Ing. Markus Pierer M.Sc. proves whether or not there is a generic valid system comparison approach for various individual specifications facilitating the selection process for organizations. He illustrates important basics of enterprise mobility management, realizes...
Editeur :
Springer Vieweg
Parution :
2016-08-12
PDF
|
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...
Editeur :
Wiley
Parution :
2016-08-05
PDF, ePub
|
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...
Editeur :
Springer
Parution :
2016-05-27
ePub
|
This
book covers three major parts of Big Data: concepts, theories and
applications. Written by world-renowned leaders in Big Data, this book explores
the problems, possible solutions and directions for Big Data in research and
practice. It also focuses on...
Editeur :
Springer
Parution :
2016-03-03
PDF, ePub
|
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...
Editeur :
Wiley-ISTE
Parution :
2016-03-03
PDF, ePub
|