|
This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field of cybersecurity. It begins by defining the fundamentals of cybersecurity in the context of blockchain and smart contracts, and then moves on to the...
Editeur :
Springer
Parution :
2024-02-21
PDF, ePub
|
Der schwarze Gürtel für das Netz Sie wollen Ihre Privatsphäre und Ihre digitale Identität schützen? Dabei hilft Ihnen dieses Buch. Christina Czeschik klärt Sie darüber auf, wo Sie welche Daten und Metadaten hinterlassen, und hilft Ihnen dann dabei, darüber die...
Editeur :
Wiley-VCH
Parution :
2024-02-19
Collection :
Für Dummies
ePub
|
Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential...
Editeur :
Wiley
Parution :
2024-02-08
PDF, ePub
|
This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and...
Editeur :
Apress
Parution :
2024-01-23
PDF, ePub
|
This is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand...
Editeur :
Apress
Parution :
2023-12-15
Collection :
Certification Study Companion Series
PDF, ePub
|
The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either...
Editeur :
Apress
Parution :
2023-12-08
PDF, ePub
|
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover...
Editeur :
Springer
Parution :
2023-11-08
PDF, ePub
|
In market structure, we tend to be equity focused, but one of the challenges is liquidity creation. This book examines liquidity creation and regulation. Based on the Baruch College Financial Markets Conference, Liquidity: How to Find it, Regulate it, Get it, this book...
Editeur :
Springer
Parution :
2023-10-05
Collection :
Zicklin School of Business Financial Markets Series
PDF, ePub
|
This is an open access book.With the rapid development of modern economy and Internet technology, the traditional financial industry has to develop Internet finance to provide better services and meet the needs of the times. It is against this background that the...
Editeur :
Atlantis Press
Parution :
2023-07-25
Collection :
Atlantis Highlights in Computer Sciences
PDF
|
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and...
Editeur :
Apress
Parution :
2023-06-20
PDF, ePub
|
The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and...
Editeur :
SAGE Publications Ltd
Parution :
2023-06-01
PDF, ePub
|
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor...
Editeur :
Apress
Parution :
2023-05-24
PDF, ePub
|
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...
Editeur :
Wiley-IEEE Press
Parution :
2023-05-16
PDF, ePub
|
Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...
Editeur :
Springer
Parution :
2023-04-26
PDF, ePub
|
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...
Editeur :
Wiley
Parution :
2023-04-06
PDF, ePub
|
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...
Editeur :
Springer
Parution :
2023-03-08
Collection :
Advances in Information Security
PDF, ePub
|
This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...
Editeur :
Springer
Parution :
2022-11-30
Collection :
India Studies in Business and Economics
PDF, ePub
|
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...
Editeur :
Apress
Parution :
2022-11-17
PDF, ePub
|
Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...
Editeur :
SAGE Publications Ltd
Parution :
2022-11-15
PDF
|
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...
Editeur :
Wiley
Parution :
2022-11-10
ePub
|