Télécharger le livre :  Cognitive Modeling for Automated Human Performance Evaluation at Scale
Ajouter à ma liste d'envies
Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In...

Editeur : Springer
Parution : 2020-09-16
Collection : Human–Computer Interaction Series
PDF, ePub

63,29
Télécharger le livre :  CompTIA Security+ Certification Study Guide
Ajouter à ma liste d'envies
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.  Computer network vulnerabilities and threats are covered...

Editeur : Apress
Parution : 2020-09-12

PDF, ePub

62,11
Télécharger le livre :  Firewalls Don't Stop Dragons
Ajouter à ma liste d'envies
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your...

Editeur : Apress
Parution : 2020-09-11

PDF, ePub

36,47
Télécharger le livre :  The Coupling of Safety and Security
Ajouter à ma liste d'envies
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological,...

Editeur : Springer
Parution : 2020-08-21
Collection : SpringerBriefs in Applied Sciences and Technology
PDF, ePub

Gratuit
Télécharger le livre :  Rational Cybersecurity for Business
Ajouter à ma liste d'envies
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and...

Editeur : Apress
Parution : 2020-08-12

PDF, ePub

Gratuit
Télécharger le livre :  Cybersecurity and Resilience in the Arctic
Ajouter à ma liste d'envies
Until recently, the Arctic was almost impossible for anyone other than indigenous peoples and explorers to traverse. Pervasive Arctic sea ice and harsh climatological conditions meant that the region was deemed incapable of supporting industrial activity or a Western...

Editeur : SAGE Publications Ltd
Parution : 2020-07-15

PDF

114,40
Télécharger le livre :  Information Fusion in Distributed Sensor Networks with Byzantines
Ajouter à ma liste d'envies
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...

Editeur : Springer
Parution : 2020-07-14
Collection : Signals and Communication Technology
PDF, ePub

126,59
Télécharger le livre :  Privileged Attack Vectors
Ajouter à ma liste d'envies
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...

Editeur : Apress
Parution : 2020-06-13

PDF, ePub

78,87
Télécharger le livre :  Cyber Breach Response That Actually Works
Ajouter à ma liste d'envies
You will be breached—the only question is whether you'll be ready     A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...

Editeur : Wiley
Parution : 2020-06-09

PDF, ePub

40,62
Télécharger le livre :  Security Infrastructure Technology for Integrated Utilization of Big Data
Ajouter à ma liste d'envies
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...

Editeur : Springer
Parution : 2020-04-23

PDF, ePub

Gratuit
Télécharger le livre :  21st Century Prometheus
Ajouter à ma liste d'envies
This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...

Editeur : Springer
Parution : 2020-03-11

PDF, ePub

116,04
Télécharger le livre :  Designing a HIPAA-Compliant Security Operations Center
Ajouter à ma liste d'envies
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

Editeur : Apress
Parution : 2020-02-25

PDF, ePub

56,19
Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Editeur : Apress
Parution : 2019-12-18

PDF, ePub

46,34
Télécharger le livre :  Identity Attack Vectors
Ajouter à ma liste d'envies
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

Editeur : Apress
Parution : 2019-12-17

PDF, ePub

46,34
Télécharger le livre :  Resilience and Hybrid Threats
Ajouter à ma liste d'envies
Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and...

Editeur : SAGE Publications Ltd
Parution : 2019-12-15

PDF

99,80
Télécharger le livre :  Physical and Cyber Safety in Critical Water Infrastructure
Ajouter à ma liste d'envies
Water supply and water management services are among the most critical infrastructures in society, providing safe and affordable drinking water, managing wastewater to avoid floods and environmental pollution, and enabling the reuse and replenishment of scarce water...

Editeur : SAGE Publications Ltd
Parution : 2019-12-15

PDF

99,80
Télécharger le livre :  Handbook of Vascular Biometrics
Ajouter à ma liste d'envies
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...

Editeur : Springer
Parution : 2019-11-14
Collection : Advances in Computer Vision and Pattern Recognition
PDF, ePub

Gratuit
Télécharger le livre :  Ransomware Revealed
Ajouter à ma liste d'envies
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Editeur : Apress
Parution : 2019-11-06

PDF, ePub

46,34
Télécharger le livre :  Security Fundamentals
Ajouter à ma liste d'envies
A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...

Editeur : Sybex
Parution : 2019-10-24

PDF, ePub

36,08
Télécharger le livre :  Practical Cryptography in Python
Ajouter à ma liste d'envies
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Editeur : Apress
Parution : 2019-09-27

PDF, ePub

56,19
<< < 45678 >