Télécharger le livre :  Access Control Models and Architectures For IoT and Cyber Physical Systems
Ajouter à ma liste d'envies
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions.This was developed by the authors to provide an overall broader...

Editeur : Springer
Parution : 2022-02-04

PDF, ePub

147,69
Télécharger le livre :  Cybersecurity Risk of IoT on Smart Cities
Ajouter à ma liste d'envies
This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. The authors provide an analysis of the importance of developing smart cities by incorporating...

Editeur : Springer
Parution : 2022-01-01

PDF, ePub

126,59
Télécharger le livre :  Understand, Manage, and Measure Cyber Risk
Ajouter à ma liste d'envies
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity...

Editeur : Apress
Parution : 2022-01-01

PDF, ePub

46,34
Télécharger le livre :  Advanced Computing and Systems for Security: Volume 13
Ajouter à ma liste d'envies
This book features extended versions of selected papers that were presented and discussed at the 8th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2021), held in Kolkata, India, on April 9–10, 2021. Organized by the Departments of...

Editeur : Springer
Parution : 2021-11-03

PDF, ePub

116,04
Télécharger le livre :  Transforming Your Business with AWS
Ajouter à ma liste d'envies
Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after...

Editeur : Wiley
Parution : 2021-10-06

PDF, ePub

25,99
Télécharger le livre :  Networking, Intelligent Systems and Security
Ajouter à ma liste d'envies
This book gathers best selected research papers presented at the International Conference on Networking, Intelligent Systems and Security, held in Kenitra, Morocco, during 01–02 April 2021. The book highlights latest research and findings in the field of ICT, and it...

Editeur : Springer
Parution : 2021-10-01

PDF, ePub

252,14
Télécharger le livre :  Co-governed Sovereignty Network
Ajouter à ma liste d'envies
This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the...

Editeur : Springer
Parution : 2021-07-26

PDF, ePub

Gratuit
Télécharger le livre :  Advances in Computing and Network Communications
Ajouter à ma liste d'envies
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14–17, 2020, Chennai, India. The papers presented were carefully reviewed and selected...

Editeur : Springer
Parution : 2021-06-12

PDF, ePub

210,99
Télécharger le livre :  Privacy-Preserving in Edge Computing
Ajouter à ma liste d'envies
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various...

Editeur : Springer
Parution : 2021-06-01

PDF, ePub

147,69
Télécharger le livre :  Proceedings of Second International Conference on Computing, Communications, and Cyber-Security
Ajouter à ma liste d'envies
This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal...

Editeur : Springer
Parution : 2021-05-24

PDF, ePub

210,99
Télécharger le livre :  Kali Linux Penetration Testing Bible
Ajouter à ma liste d'envies
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux...

Editeur : Wiley
Parution : 2021-04-21

PDF, ePub

27,99
Télécharger le livre :  Advances in Computing and Network Communications
Ajouter à ma liste d'envies
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14–17, 2020, Chennai, India. The papers presented were carefully reviewed and selected...

Editeur : Springer
Parution : 2021-04-20

PDF, ePub

336,54
Télécharger le livre :  Modern Industrial IoT, Big Data and Supply Chain
Ajouter à ma liste d'envies
This book is a collection of selected papers presented at the First International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), held as an online conference due to COVID-19 (initially to be held in Macao, Special Administration...

Editeur : Springer
Parution : 2021-03-31

PDF, ePub

252,14
Télécharger le livre :  International Conference on Communication, Computing and Electronics Systems
Ajouter à ma liste d'envies
This book includes high-quality papers presented at the International Conference on Communication, Computing and Electronics Systems 2020, held at the PPG Institute of Technology, Coimbatore, India, on 21–22 October 2020. The book covers topics such as automation, VLSI,...

Editeur : Springer
Parution : 2021-03-25

PDF, ePub

283,79
Télécharger le livre :  Understanding Network Hacks
Ajouter à ma liste d'envies
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS...

Editeur : Springer
Parution : 2021-02-02

PDF, ePub

63,29
Télécharger le livre :  Echtzeit 2020
Ajouter à ma liste d'envies
Mit seiner Tagung 2020 zum Thema „Kommunikationssicherheit im IoT“ greift der GI/GMA/ITG-Fachausschuss Echtzeitsysteme ein immer wichtiger werdendes Thema in einer mehr und mehr vernetzten Welt auf. Die präsentierten Lösungen reichen dabei von Hardware über...

Editeur : Springer Vieweg
Parution : 2021-01-29

PDF

39,43
Télécharger le livre :  Internet of Things Security: Principles and Practice
Ajouter à ma liste d'envies
Over the past few years, Internet of Things has brought great changes to the world. Reports show that, the number of IoT devices is expected to reach 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and...

Editeur : Springer
Parution : 2021-01-27

PDF, ePub

84,39
Télécharger le livre :  Sustainable Communication Networks and Application
Ajouter à ma liste d'envies
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years,...

Editeur : Springer
Parution : 2021-01-25

PDF, ePub

210,99
Télécharger le livre :  Fog/Edge Computing For Security, Privacy, and Applications
Ajouter à ma liste d'envies
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications.This book is organized into five parts with a total of 15 chapters. Each area corresponds to an...

Editeur : Springer
Parution : 2021-01-04
Collection : Advances in Information Security
PDF, ePub

147,69
Télécharger le livre :  Network Hacks - Intensivkurs
Ajouter à ma liste d'envies
Das Buch verhilft Lesern dazu, das eigene Netz mit den Augen des Angreifers zu sehen – um seine Techniken zu verstehen und um sich besser schützen zu können. Anhand von Python-Codebeispielen erläutert der Autor Themen wie Passwort-Sniffing, ARP-Poisoning, DNS-Spoofing,...

Editeur : Springer
Parution : 2020-11-30

PDF, ePub

54,22
<< < 23456 >