Télécharger le livre :  Konfliktmanagement für Sicherheitsprofis
Ajouter à ma liste d'envies
Ob Datenschützer oder IT-Sicherheitsbeauftragte – Sicherheitsprofis sind allzu oft in der Situation, schlechte Nachrichten überbringen und Maßnahmen durchzusetzen zu müssen, die auf wenig Gegenliebe stoßen. Wer in der Security-Branche arbeitet, gilt als Bedenkenträger...

Editeur : Springer Vieweg
Parution : 2020-11-12
Collection : Edition
PDF

46,34
Télécharger le livre :  70 Tips and Tricks for Mastering the CISSP Exam
Ajouter à ma liste d'envies
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick...

Editeur : Apress
Parution : 2020-11-09

PDF, ePub

62,11
Télécharger le livre :  A Complete Guide to Burp Suite
Ajouter à ma liste d'envies
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used...

Editeur : Apress
Parution : 2020-11-06

PDF, ePub

46,34
Télécharger le livre :  Device-Independent Quantum Information Processing
Ajouter à ma liste d'envies
Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the...

Editeur : Springer
Parution : 2020-10-31
Collection : Springer Theses
PDF, ePub

158,24
Télécharger le livre :  Building Secure Firmware
Ajouter à ma liste d'envies
Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence,...

Editeur : Apress
Parution : 2020-10-27

PDF, ePub

56,19
Télécharger le livre :  Hacken für Dummies
Ajouter à ma liste d'envies
Um einen Hacker zu überlisten, müssen Sie sich in dessen Denkweise hineinversetzen. Deshalb lernen Sie mit diesem Buch, wie ein Bösewicht zu denken. Der Fachmann für IT-Sicherheit Kevin Beaver teilt mit Ihnen sein Wissen über Penetrationstests und typische...

Editeur : Wiley-VCH
Parution : 2020-10-27
Collection : Für Dummies
ePub

22,68
Télécharger le livre :  Security, Privacy and User Interaction
Ajouter à ma liste d'envies
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails.This book goes on to explain, using a series of examples,  how to rethink security solutions to take users into consideration. By...

Editeur : Springer
Parution : 2020-10-27

PDF, ePub

52,74
Télécharger le livre :  Serverless Security
Ajouter à ma liste d'envies
Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application,...

Editeur : Apress
Parution : 2020-10-05

PDF, ePub

62,11
Télécharger le livre :  Persönlichkeitsschutz in Social Networks
Ajouter à ma liste d'envies
Dieses Buch befasst sich mit dem Schutz der Persönlichkeitsrechte der Nutzer von Social Networks. Es werden die Vorgaben der Datenschutz-Grundverordnung dezidiert auf Social Networks angewendet. Diese haben auf unionsrechtlicher Ebene mit dem Wirksamwerden der...

Editeur : Springer Vieweg
Parution : 2020-09-29
Collection : DuD-Fachbeiträge
PDF, ePub

46,34
Télécharger le livre :  Cognitive Modeling for Automated Human Performance Evaluation at Scale
Ajouter à ma liste d'envies
Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In...

Editeur : Springer
Parution : 2020-09-16
Collection : Human–Computer Interaction Series
PDF, ePub

63,29
Télécharger le livre :  CompTIA Security+ Certification Study Guide
Ajouter à ma liste d'envies
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.  Computer network vulnerabilities and threats are covered...

Editeur : Apress
Parution : 2020-09-12

PDF, ePub

62,11
Télécharger le livre :  Firewalls Don't Stop Dragons
Ajouter à ma liste d'envies
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your...

Editeur : Apress
Parution : 2020-09-11

PDF, ePub

36,47
Télécharger le livre :  Sachkunde im Bewachungsgewerbe (IHK) - Übungsbuch
Ajouter à ma liste d'envies
Dieses Übungsbuch ergänzt das gleichnamige Lehrbuch. Es schließt die Lücke zwischen dem Unterrichts- und Lernstoff und der Vorbereitung auf die Prüfung. Mit Hilfe der Fragen und Antworten können Lernende den wichtigen Prüfungsstoff strukturiert wiederholen, den eigenen...

Editeur : Springer Gabler
Parution : 2020-08-30

PDF, ePub

9,85
Télécharger le livre :  The Coupling of Safety and Security
Ajouter à ma liste d'envies
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological,...

Editeur : Springer
Parution : 2020-08-21
Collection : SpringerBriefs in Applied Sciences and Technology
PDF, ePub

Gratuit
Télécharger le livre :  Rational Cybersecurity for Business
Ajouter à ma liste d'envies
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and...

Editeur : Apress
Parution : 2020-08-12

PDF, ePub

Gratuit
Télécharger le livre :  Datensicherheit
Ajouter à ma liste d'envies
Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein...

Editeur : Springer Vieweg
Parution : 2020-07-30

PDF, ePub

42,19
Télécharger le livre :  Cybersecurity and Resilience in the Arctic
Ajouter à ma liste d'envies
Until recently, the Arctic was almost impossible for anyone other than indigenous peoples and explorers to traverse. Pervasive Arctic sea ice and harsh climatological conditions meant that the region was deemed incapable of supporting industrial activity or a Western...

Editeur : SAGE Publications Ltd
Parution : 2020-07-15

PDF

112,48
Télécharger le livre :  Information Fusion in Distributed Sensor Networks with Byzantines
Ajouter à ma liste d'envies
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...

Editeur : Springer
Parution : 2020-07-14
Collection : Signals and Communication Technology
PDF, ePub

126,59
Télécharger le livre :  Privileged Attack Vectors
Ajouter à ma liste d'envies
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...

Editeur : Apress
Parution : 2020-06-13

PDF, ePub

78,87
Télécharger le livre :  Cyber Breach Response That Actually Works
Ajouter à ma liste d'envies
You will be breached—the only question is whether you'll be ready     A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...

Editeur : Wiley
Parution : 2020-06-09

PDF, ePub

40,62
<< < 56789 >