Télécharger le livre :  Security Infrastructure Technology for Integrated Utilization of Big Data
Ajouter à ma liste d'envies
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...

Editeur : Springer
Parution : 2020-04-23

PDF, ePub

Gratuit
Télécharger le livre :  Mobile Security
Ajouter à ma liste d'envies
Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit...

Editeur : Springer Vieweg
Parution : 2020-04-07

PDF, ePub

46,34
Télécharger le livre :  21st Century Prometheus
Ajouter à ma liste d'envies
This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...

Editeur : Springer
Parution : 2020-03-11

PDF, ePub

116,04
Télécharger le livre :  Designing a HIPAA-Compliant Security Operations Center
Ajouter à ma liste d'envies
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

Editeur : Apress
Parution : 2020-02-25

PDF, ePub

56,19
Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Editeur : Apress
Parution : 2019-12-18

PDF, ePub

46,34
Télécharger le livre :  Identity Attack Vectors
Ajouter à ma liste d'envies
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

Editeur : Apress
Parution : 2019-12-17

PDF, ePub

46,34
Télécharger le livre :  Resilience and Hybrid Threats
Ajouter à ma liste d'envies
Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and...

Editeur : SAGE Publications Ltd
Parution : 2019-12-15

PDF

98,13
Télécharger le livre :  Physical and Cyber Safety in Critical Water Infrastructure
Ajouter à ma liste d'envies
Water supply and water management services are among the most critical infrastructures in society, providing safe and affordable drinking water, managing wastewater to avoid floods and environmental pollution, and enabling the reuse and replenishment of scarce water...

Editeur : SAGE Publications Ltd
Parution : 2019-12-15

PDF

98,13
Télécharger le livre :  Cybercrime Prevention
Ajouter à ma liste d'envies
This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world.This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an...

Editeur : Palgrave Pivot
Parution : 2019-11-16
Collection : Crime Prevention and Security Management
PDF, ePub

68,56
Télécharger le livre :  Handbook of Vascular Biometrics
Ajouter à ma liste d'envies
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...

Editeur : Springer
Parution : 2019-11-14
Collection : Advances in Computer Vision and Pattern Recognition
PDF, ePub

Gratuit
Télécharger le livre :  Ransomware Revealed
Ajouter à ma liste d'envies
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Editeur : Apress
Parution : 2019-11-06

PDF, ePub

46,34
Télécharger le livre :  Security Fundamentals
Ajouter à ma liste d'envies
A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...

Editeur : Sybex
Parution : 2019-10-24

PDF, ePub

36,08
Télécharger le livre :  Practical Cryptography in Python
Ajouter à ma liste d'envies
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Editeur : Apress
Parution : 2019-09-27

PDF, ePub

56,19
Télécharger le livre :  Cybercrime Investigators Handbook
Ajouter à ma liste d'envies
The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...

Editeur : Wiley
Parution : 2019-09-13

PDF, ePub

58,66
Télécharger le livre :  The Art of War for Computer Security
Ajouter à ma liste d'envies
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks....

Editeur : Springer
Parution : 2019-09-03

PDF, ePub

126,59
Télécharger le livre :  Engineering Secure and Dependable Software Systems
Ajouter à ma liste d'envies
Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical...

Editeur : SAGE Publications Ltd
Parution : 2019-08-15

PDF

100,52
Télécharger le livre :  Waging Cyber War
Ajouter à ma liste d'envies
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....

Editeur : Apress
Parution : 2019-08-13

PDF, ePub

46,34
Télécharger le livre :  Advances in Human Factors in Cybersecurity
Ajouter à ma liste d'envies
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2019-06-05
Collection : Advances in Intelligent Systems and Computing
PDF, ePub

147,69
Télécharger le livre :  The IoT Hacker's Handbook
Ajouter à ma liste d'envies
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...

Editeur : Apress
Parution : 2019-03-30

PDF, ePub

56,19
Télécharger le livre :  PowerShell and Python Together
Ajouter à ma liste d'envies
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...

Editeur : Apress
Parution : 2019-03-30

PDF, ePub

46,34
<< < 678910 >