Télécharger le livre :  Cyber Security and Network Security
Ajouter à ma liste d'envies
CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other...

Editeur : Wiley-Scrivener
Parution : 2022-03-29
Collection : Advances in Cyber Security
PDF, ePub

193,01
Télécharger le livre :  Fixed Income Investing
Ajouter à ma liste d'envies
Fixed income investments have been a topic of broad interest, in particular for institutional investors such as insurance companies and pensions schemes. They were considered safe heavens in turbulent times by almost all other institutional and individual investors and...

Editeur : Palgrave Macmillan
Parution : 2022-03-28

PDF, ePub

147,69
Télécharger le livre :  Security Awareness For Dummies
Ajouter à ma liste d'envies
Make security a priority on your team  Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and...

Editeur : For Dummies
Parution : 2022-03-24

PDF, ePub

28,47
Télécharger le livre :  IT Security Controls
Ajouter à ma liste d'envies
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your...

Editeur : Apress
Parution : 2022-03-23

PDF, ePub

66,05
Télécharger le livre :  Future-proofing
Ajouter à ma liste d'envies
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...

Editeur : OUP Oxford
Parution : 2022-02-03

PDF

59,63
Télécharger le livre :  Future-proofing
Ajouter à ma liste d'envies
Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...

Editeur : OUP Oxford
Parution : 2022-02-03

ePub

59,63
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Editeur : OUP Oxford
Parution : 2022-01-13

PDF

17,03
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies
The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Editeur : OUP Oxford
Parution : 2022-01-13

ePub

17,03
Télécharger le livre :  ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Ajouter à ma liste d'envies
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification.The SSCP is designed to show that holders have the technical skills to...

Editeur : Sybex
Parution : 2022-01-07
Collection : Sybex Study Guide
PDF, ePub

54,12
Télécharger le livre :  Phishing and Communication Channels
Ajouter à ma liste d'envies
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive...

Editeur : Apress
Parution : 2021-12-08

PDF, ePub

56,19
Télécharger le livre :  Cybersecurity Risk Management
Ajouter à ma liste d'envies
Cybersecurity Risk Management InCybersecurity Risk Management: Mastering the Fundamentals Using the NISTCybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and...

Editeur : Wiley
Parution : 2021-11-23

PDF, ePub

104,39
Télécharger le livre :  Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Ajouter à ma liste d'envies
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large...

Editeur : Springer
Parution : 2021-11-17
Collection : Computer Architecture and Design Methodologies
PDF, ePub

147,69
Télécharger le livre :  Snowflake Security
Ajouter à ma liste d'envies
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control,...

Editeur : Apress
Parution : 2021-10-05

PDF, ePub

56,19
Télécharger le livre :  Excess Capacity and Difficulty of Exit
Ajouter à ma liste d'envies
This book provides cases and analyses of causes and consequences of difficulty in downsizing and exiting in the electronics industry during the “two lost decades” in Japan. Because of excess capacity in the industry, many electronics companies have been required for...

Editeur : Springer
Parution : 2021-09-16
Collection : SpringerBriefs in Economics
PDF, ePub

63,29
Télécharger le livre :  Information Security
Ajouter à ma liste d'envies
Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals...

Editeur : Wiley
Parution : 2021-09-15

PDF, ePub

121,75
Télécharger le livre :  Sachkunde im Bewachungsgewerbe (IHK) - Übungsbuch
Ajouter à ma liste d'envies
Dieses Übungsbuch ergänzt das gleichnamige Lehrbuch. Es schließt die Lücke zwischen dem Unterrichts- und Lernstoff und der Vorbereitung auf die Prüfung. Mit Hilfe der Fragen und Antworten können Lernende den wichtigen Prüfungsstoff strukturiert wiederholen, den eigenen...

Editeur : Springer Gabler
Parution : 2021-09-13

PDF, ePub

9,85
Télécharger le livre :  Meine digitale Sicherheit Tipps und Tricks für Dummies
Ajouter à ma liste d'envies
Identitätsdiebstahl, Schadsoftware auf dem Rechner, Phishing-Mail? Wir wissen alle, welche Gefahren uns im digitalen Alltag drohen und doch verschließen wir oft die Augen davor. Dieses Buch zeigt Ihnen, warum eine skeptische Grundhaltung vonnöten ist und wie Sie...

Editeur : Wiley-VCH
Parution : 2021-09-09
Collection : Für Dummies
ePub

9,60
Télécharger le livre :  Certified Ethical Hacker (CEH) Preparation Guide
Ajouter à ma liste d'envies
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of...

Editeur : Apress
Parution : 2021-08-27

PDF, ePub

62,11
Télécharger le livre :  8 Steps to Better Security
Ajouter à ma liste d'envies
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical...

Editeur : Wiley
Parution : 2021-08-16

PDF, ePub

27,11
Télécharger le livre :  Cyber Threat Intelligence
Ajouter à ma liste d'envies
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your...

Editeur : Apress
Parution : 2021-08-09

PDF, ePub

56,19
<< < 34567 >