|
CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other...
Editeur :
Wiley-Scrivener
Parution :
2022-03-29
Collection :
Advances in Cyber Security
PDF, ePub
|
Fixed income investments have been a topic of broad interest, in particular for institutional investors such as insurance companies and pensions schemes. They were considered safe heavens in turbulent times by almost all other institutional and individual investors and...
Editeur :
Palgrave Macmillan
Parution :
2022-03-28
PDF, ePub
|
Make security a priority on your team Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and...
Editeur :
For Dummies
Parution :
2022-03-24
PDF, ePub
|
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your...
Editeur :
Apress
Parution :
2022-03-23
PDF, ePub
|
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...
Editeur :
OUP Oxford
Parution :
2022-02-03
PDF
|
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...
Editeur :
OUP Oxford
Parution :
2022-02-03
ePub
|
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...
Editeur :
OUP Oxford
Parution :
2022-01-13
PDF
|
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...
Editeur :
OUP Oxford
Parution :
2022-01-13
ePub
|
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification.The SSCP is designed to show that holders have the technical skills to...
Editeur :
Sybex
Parution :
2022-01-07
Collection :
Sybex Study Guide
PDF, ePub
|
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.
The aim of phishing is to fraudulently obtain sensitive...
Editeur :
Apress
Parution :
2021-12-08
PDF, ePub
|
Cybersecurity Risk Management InCybersecurity Risk Management: Mastering the Fundamentals Using the NISTCybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and...
Editeur :
Wiley
Parution :
2021-11-23
PDF, ePub
|
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large...
Editeur :
Springer
Parution :
2021-11-17
Collection :
Computer Architecture and Design Methodologies
PDF, ePub
|
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control,...
Editeur :
Apress
Parution :
2021-10-05
PDF, ePub
|
This book provides cases and analyses of causes and consequences of difficulty in downsizing and exiting in the electronics industry during the “two lost decades” in Japan. Because of excess capacity in the industry, many electronics companies have been required for...
Editeur :
Springer
Parution :
2021-09-16
Collection :
SpringerBriefs in Economics
PDF, ePub
|
Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals...
Editeur :
Wiley
Parution :
2021-09-15
PDF, ePub
|
Dieses Übungsbuch ergänzt das gleichnamige Lehrbuch. Es schließt die Lücke zwischen dem Unterrichts- und Lernstoff und der Vorbereitung auf die Prüfung. Mit Hilfe der Fragen und Antworten können Lernende den wichtigen Prüfungsstoff strukturiert wiederholen, den eigenen...
Editeur :
Springer Gabler
Parution :
2021-09-13
PDF, ePub
|
Identitätsdiebstahl, Schadsoftware auf dem Rechner, Phishing-Mail? Wir wissen alle, welche Gefahren uns im digitalen Alltag drohen und doch verschließen wir oft die Augen davor. Dieses Buch zeigt Ihnen, warum eine skeptische Grundhaltung vonnöten ist und wie Sie...
Editeur :
Wiley-VCH
Parution :
2021-09-09
Collection :
Für Dummies
ePub
|
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of...
Editeur :
Apress
Parution :
2021-08-27
PDF, ePub
|
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical...
Editeur :
Wiley
Parution :
2021-08-16
PDF, ePub
|
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your...
Editeur :
Apress
Parution :
2021-08-09
PDF, ePub
|