Télécharger le livre :  How to Catch a Phish
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and...

Editeur : Apress
Parution : 2023-06-20
PDF, ePub

26,61

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The SAGE Handbook of Human–Machine Communication
The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and...

Editeur : SAGE Publications Ltd
Parution : 2023-06-01
PDF, ePub

97,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Definitive Guide to PCI DSS Version 4
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor...

Editeur : Apress
Parution : 2023-05-24
PDF, ePub

62,11

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data Exfiltration Threats and Prevention Techniques
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...

Editeur : Wiley-IEEE Press
Parution : 2023-05-22
PDF, ePub

121,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Bitcoin und Blockchain
Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...

Editeur : Springer
Parution : 2023-04-26
PDF, ePub

19,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Threat Intelligence
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...

Editeur : Wiley
Parution : 2023-04-11
PDF, ePub

98,33

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Deception
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...

Editeur : Springer
Parution : 2023-03-08
PDF, ePub

158,24

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digitale Kompetenz
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen...

Editeur : Springer Vieweg
Parution : 2023-01-18
PDF, ePub

24,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Political Economy of Risk in Finance and the Military
This book is about risk conceptions, experiences and reflections. It applies the concept of the risk triangle, with its societal, organisational and personal angles, to two areas of inquiry: financial markets and the military, seeking to demonstrate the...

Editeur : Palgrave Macmillan
Parution : 2022-12-12
PDF, ePub

137,14

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Insolvency and Bankruptcy Reforms in India
This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...

Editeur : Springer
Parution : 2022-11-30
Collection : India Studies in Business and Economics PDF, ePub

116,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Solving Identity Management in Modern Applications
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Editeur : Apress
Parution : 2022-11-17
PDF, ePub

62,11

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems
Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...

Editeur : SAGE Publications Ltd
Parution : 2022-11-15
PDF

101,46

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A European Perspective on Crisis Informatics
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show...

Editeur : Springer Vieweg
Parution : 2022-11-12
PDF, ePub

89,66

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity Law
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...

Editeur : Wiley
Parution : 2022-11-10
ePub

106,50

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity in Intelligent Networking Systems
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...

Editeur : Wiley-IEEE Press
Parution : 2022-11-02
Collection : IEEE Press PDF, ePub

122,80

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security in Vehicular Networks
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages,...

Editeur : Wiley-ISTE
Parution : 2022-09-14
PDF, ePub

148,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester werden für Dummies
Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbstPentests durchzuführen. Von den nötigen Vorbereitungen über...

Editeur : Wiley-VCH
Parution : 2022-08-17
Collection : Für Dummies ePub

23,84

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Blockchain Security from the Bottom Up
The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...

Editeur : Wiley
Parution : 2022-07-26
PDF, ePub

27,11

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the...

Editeur : Springer Vieweg
Parution : 2022-07-13
PDF, ePub

94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Theoretical Cybersecurity
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text...

Editeur : Apress
Parution : 2022-07-12
PDF, ePub

56,19

Téléchargement immédiat
Dès validation de votre commande
<< < 34567 >