Télécharger le livre :  Autonomous Data Security
Ajouter à ma liste d'envies
This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering...

Editeur : Apress
Parution : 2024-10-07

PDF, ePub

59,15
Télécharger le livre :  Security and Privacy for Modern Networks
Ajouter à ma liste d'envies
This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense mechanisms, while also preparing readers for future...

Editeur : Apress
Parution : 2024-10-07

PDF, ePub

54,22
Télécharger le livre :  Critical Security Controls for Effective Cyber Defense
Ajouter à ma liste d'envies
This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18...

Editeur : Apress
Parution : 2024-09-28

PDF, ePub

59,15
Télécharger le livre :  Cybersecurity Essentials
Ajouter à ma liste d'envies
Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an...

Editeur : Apress
Parution : 2024-09-20

PDF, ePub

54,22
Télécharger le livre :  FAIK
Ajouter à ma liste d'envies
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?...

Editeur : Wiley
Parution : 2024-08-20

PDF, ePub

27,11
Télécharger le livre :  Cybersecurity in Context
Ajouter à ma liste d'envies
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits“A comprehensive,...

Editeur : Wiley
Parution : 2024-08-07

PDF

82,24
Télécharger le livre :  Proceedings of the International Academic Summer Conference on Number Theory and Information Security (NTIS 2023)
Ajouter à ma liste d'envies
This is an open access book. It is our great pleasure to have you at the Number Theory and Information Security (NTIS), which took place in Zhengzhou, China, from April 27 to 29, 2023. Number theory and information security, as important research directions in today's...

Editeur : Atlantis Press
Parution : 2024-08-01
Collection : Advances in Physics Research
PDF

Gratuit
Télécharger le livre :  Practical Cyber Intelligence
Ajouter à ma liste d'envies
Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in...

Editeur : Wiley
Parution : 2024-07-31

PDF, ePub

97,48
Télécharger le livre :  Mastering Cybersecurity
Ajouter à ma liste d'envies
The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced...

Editeur : Apress
Parution : 2024-06-30

PDF, ePub

59,15
Télécharger le livre :  Jump-start Your SOC Analyst Career
Ajouter à ma liste d'envies
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your...

Editeur : Apress
Parution : 2024-05-31

PDF, ePub

49,29
Télécharger le livre :  Managing IT Service Security
Ajouter à ma liste d'envies
This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order,...

Editeur : Springer
Parution : 2024-05-27

PDF

63,29
Télécharger le livre :  ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Ajouter à ma liste d'envies
CISSP Study Guide - fully updated for the 2024CISSP Body of Knowledge ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated based on the latest 2024CISSP Detailed Content Outline. This bestselling...

Editeur : Sybex
Parution : 2024-05-24
Collection : Sybex Study Guide
PDF, ePub

63,19
Télécharger le livre :  Computer-Supported Collaboration
Ajouter à ma liste d'envies
Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality...

Editeur : Wiley-IEEE Press
Parution : 2024-05-24
Collection : IEEE Press Series on Human-Machine Systems
PDF

112,78
Télécharger le livre :  Designing to FIPS-140
Ajouter à ma liste d'envies
This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs...

Editeur : Apress
Parution : 2024-04-25

PDF, ePub

64,08
Télécharger le livre :  Implementation and Analysis of Ciphers in Quantum Computing
Ajouter à ma liste d'envies
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an...

Editeur : Springer
Parution : 2024-04-17

PDF, ePub

147,69
Télécharger le livre :  Identity Attack Vectors
Ajouter à ma liste d'envies
Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their...

Editeur : Apress
Parution : 2024-03-30

PDF, ePub

62,11
Télécharger le livre :  The Extended Reality Blueprint
Ajouter à ma liste d'envies
Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...

Editeur : Wiley
Parution : 2024-03-26

PDF, ePub

34,60
Télécharger le livre :  Stepping Through Cybersecurity Risk Management
Ajouter à ma liste d'envies
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...

Editeur : Wiley
Parution : 2024-03-20

PDF, ePub

96,85
Télécharger le livre :  The Curious Case of Usable Privacy
Ajouter à ma liste d'envies
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research,...

Editeur : Springer
Parution : 2024-03-19

PDF, ePub

52,74
Télécharger le livre :  Toward a Quantum-Safe Communication Infrastructure
Ajouter à ma liste d'envies
The accelerating pace at which quantum computing is developing makes it almost inevitable that some of the major cryptographic algorithms and protocols we rely on daily, for everything from internet shopping to running our critical infrastructure, may be compromised in...

Editeur : SAGE Publications Ltd
Parution : 2024-03-15

PDF

108,59
<< < 1234 >