Télécharger le livre :  Cybersecurity for Hospitals and Healthcare Facilities
Ajouter à ma liste d'envies
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a...

Editeur : Apress
Parution : 2016-09-06

PDF, ePub

78,87
Télécharger le livre :  Security in Fixed and Wireless Networks
Ajouter à ma liste d'envies
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...

Editeur : Wiley
Parution : 2016-08-19

PDF, ePub

104,39
Télécharger le livre :  The Cyber Effect
Ajouter à ma liste d'envies
Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...

Editeur : John Murray
Parution : 2016-08-18

ePub

3,99
Télécharger le livre :  Advances in Human Factors in Cybersecurity
Ajouter à ma liste d'envies
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2016-08-16
Collection : Advances in Intelligent Systems and Computing
ePub

158,24
Télécharger le livre :  Mobile Device Management
Ajouter à ma liste d'envies
Ing. Markus Pierer M.Sc. proves whether or not there is a generic valid system comparison approach for various individual specifications facilitating the selection process for organizations. He illustrates important basics of enterprise mobility management, realizes...

Editeur : Springer Vieweg
Parution : 2016-08-12

PDF

52,74
Télécharger le livre :  Combatting Cybercrime and Cyberterrorism
Ajouter à ma liste d'envies
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...

Editeur : Springer
Parution : 2016-05-27
Collection : Advanced Sciences and Technologies for Security Applications
ePub

89,66
Télécharger le livre :  Big Data Concepts, Theories, and Applications
Ajouter à ma liste d'envies
This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice.  It also focuses on...

Editeur : Springer
Parution : 2016-03-03

PDF, ePub

158,24
Télécharger le livre :  Radio-Frequency Human Exposure Assessment
Ajouter à ma liste d'envies
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...

Editeur : Wiley-ISTE
Parution : 2016-03-03

PDF, ePub

163,47
Télécharger le livre :  ISSE 2015
Ajouter à ma liste d'envies
This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include:·         Encrypted Communication·         Trust Services, eID...

Editeur : Springer Vieweg
Parution : 2015-11-02

PDF

52,74
Télécharger le livre :  Physical and Data-Link Security Techniques for Future Communication Systems
Ajouter à ma liste d'envies
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...

Editeur : Springer
Parution : 2015-09-24
Collection : Lecture Notes in Electrical Engineering
PDF, ePub

147,69
Télécharger le livre :  Cybercrime Risks and Responses
Ajouter à ma liste d'envies
This book examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to address them. The contributors show how Eastern and Western nations are responding to the challenges of cybercrime, and the latest trends and...

Editeur : Palgrave Macmillan
Parution : 2015-09-01
Collection : Palgrave Studies in Cybercrime and Cybersecurity
PDF

52,74
Télécharger le livre :  The Antivirus Hacker's Handbook
Ajouter à ma liste d'envies
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...

Editeur : Wiley
Parution : 2015-08-27

PDF, ePub

45,15
Télécharger le livre :  Der IT Security Manager
Ajouter à ma liste d'envies
Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden –  Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von...

Editeur : Springer Vieweg
Parution : 2015-08-12
Collection : Edition
PDF, ePub

66,05
Télécharger le livre :  Introduction to Network Security
Ajouter à ma liste d'envies
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...

Editeur : Wiley
Parution : 2015-07-10

PDF, ePub

130,77
Télécharger le livre :  Vehicular Ad Hoc Network Security and Privacy
Ajouter à ma liste d'envies
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary...

Editeur : Wiley-IEEE Press
Parution : 2015-06-05
Collection : IEEE Press Series on Information and Communication Networks Security
PDF, ePub

128,66
Télécharger le livre :  Cyber Security: Analytics, Technology and Automation
Ajouter à ma liste d'envies
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time....

Editeur : Springer
Parution : 2015-05-30

PDF, ePub

105,49
Télécharger le livre :  Security Intelligence
Ajouter à ma liste d'envies
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable...

Editeur : Wiley
Parution : 2015-04-16

PDF, ePub

54,12
Télécharger le livre :  Phishing Dark Waters
Ajouter à ma liste d'envies
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...

Editeur : Wiley
Parution : 2015-03-18

PDF, ePub

31,65
Télécharger le livre :  The Mobile Application Hacker's Handbook
Ajouter à ma liste d'envies
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...

Editeur : Wiley
Parution : 2015-02-17

PDF, ePub

56,97
Télécharger le livre :  Der Cyber-Versicherungsmarkt in Deutschland
Ajouter à ma liste d'envies
Diese Dokumentation schlägt eine Schneise durch das Dickicht des Versicherungsmarktes der Cyber-Policen. Versicherungen gegen Cyberkriminalität werden zunehmend wichtiger: Angriffe auf die Informationstechnik von Unternehmen können Schäden in Millionenhöhe hinterlassen,...

Editeur : Springer Gabler
Parution : 2014-10-08
Collection : essentials
PDF, ePub

4,92
<< < 910111213 >