Télécharger le livre :  Algorithms for Data and Computation Privacy
Ajouter à ma liste d'envies
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms.This book also introduces algorithms for breaking privacy,...

Editeur : Springer
Parution : 2020-11-28

PDF, ePub

137,14
Télécharger le livre :  The Pentester BluePrint
Ajouter à ma liste d'envies
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and...

Editeur : Wiley
Parution : 2020-10-30

PDF, ePub

20,99
Télécharger le livre :  Hacking Multifactor Authentication
Ajouter à ma liste d'envies
Protect your organization from scandalously easy-to-hack MFA security “solutions”  Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online...

Editeur : Wiley
Parution : 2020-09-23

PDF, ePub

25,99
Télécharger le livre :  Malware Analysis and Detection Engineering
Ajouter à ma liste d'envies
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection...

Editeur : Apress
Parution : 2020-09-22

PDF, ePub

88,73
Télécharger le livre :  Advances in Wireless Communications and Applications
Ajouter à ma liste d'envies
This book features selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. Focusing on applications of the latest smart theories and approaches, and recent advances in the...

Editeur : Springer
Parution : 2020-09-03

PDF, ePub

147,69
Télécharger le livre :  Advances in Communication, Devices and Networking
Ajouter à ma liste d'envies
This book covers recent trends in the field of devices, wireless communication and networking. It gathers selected papers presented at the International Conference on Communication, Devices and Networking (ICCDN 2019), which was organized by the Department of...

Editeur : Springer
Parution : 2020-07-27

PDF, ePub

210,99
Télécharger le livre :  Networking For Dummies
Ajouter à ma liste d'envies
Set up a secure network at home or the office  Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage...

Editeur : For Dummies
Parution : 2020-07-14

PDF, ePub

22,99
Télécharger le livre :  Penetration Testing For Dummies
Ajouter à ma liste d'envies
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data....

Editeur : For Dummies
Parution : 2020-04-01

PDF, ePub

19,99
Télécharger le livre :  Applied Incident Response
Ajouter à ma liste d'envies
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary.  AppliedIncident Response details effective ways to respond to advanced attacks against...

Editeur : Wiley
Parution : 2020-01-14

PDF, ePub

30,99
Télécharger le livre :  Connected Vehicles in the Internet of Things
Ajouter à ma liste d'envies
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics.  A connected...

Editeur : Springer
Parution : 2020-01-13

PDF, ePub

147,69
Télécharger le livre :  IoT Security
Ajouter à ma liste d'envies
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements,...

Editeur : Wiley
Parution : 2019-12-24

PDF, ePub

114,99
Télécharger le livre :  Cybersecurity in Nigeria
Ajouter à ma liste d'envies
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous,...

Editeur : Springer
Parution : 2019-03-15

PDF, ePub

58,01
Télécharger le livre :  Network Forensics
Ajouter à ma liste d'envies
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, you...

Editeur : Wiley
Parution : 2017-07-14

PDF, ePub

46,99
Télécharger le livre :  Linux Server Security
Ajouter à ma liste d'envies
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security....

Editeur : Wiley
Parution : 2016-05-04

PDF, ePub

38,99
Télécharger le livre :  The Network Security Test Lab
Ajouter à ma liste d'envies
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide...

Editeur : Wiley
Parution : 2015-08-10

PDF, ePub

39,99
Télécharger le livre :  Network Attacks and Exploitation
Ajouter à ma liste d'envies
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage....

Editeur : Wiley
Parution : 2015-07-09

PDF, ePub

36,99
Télécharger le livre :  Attack and Defend Computer Security Set
Ajouter à ma liste d'envies
Defend your networks and data from attack with this unique two-book security set The Attack andDefend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker’s Handbook and Malware Analyst’s Cookbook. This special...

Editeur : Wiley
Parution : 2014-03-17

PDF, ePub

57,99
Télécharger le livre :  The Browser Hacker's Handbook
Ajouter à ma liste d'envies
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a...

Editeur : Wiley
Parution : 2014-02-26

PDF, ePub

44,99
Télécharger le livre :  Practical Reverse Engineering
Ajouter à ma liste d'envies
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and...

Editeur : Wiley
Parution : 2014-02-03

PDF, ePub

42,99
Télécharger le livre :  Security Management of Next Generation Telecommunications Networks and Services
Ajouter à ma liste d'envies
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and...

Editeur : Wiley-IEEE Press
Parution : 2013-10-17
Collection : IEEE Press Series on Network and Service Management
PDF, ePub

116,99
<< < 3456 >