Télécharger le livre :  Cybercrime Investigators Handbook
Ajouter à ma liste d'envies
The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...

Editeur : Wiley
Parution : 2019-09-13

PDF, ePub

58,66
Télécharger le livre :  The Art of War for Computer Security
Ajouter à ma liste d'envies
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks....

Editeur : Springer
Parution : 2019-09-03

PDF, ePub

126,59
Télécharger le livre :  Engineering Secure and Dependable Software Systems
Ajouter à ma liste d'envies
Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical...

Editeur : SAGE Publications Ltd
Parution : 2019-08-15

PDF

102,24
Télécharger le livre :  Waging Cyber War
Ajouter à ma liste d'envies
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....

Editeur : Apress
Parution : 2019-08-13

PDF, ePub

46,34
Télécharger le livre :  Advances in Human Factors in Cybersecurity
Ajouter à ma liste d'envies
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2019-06-05
Collection : Advances in Intelligent Systems and Computing
PDF, ePub

147,69
Télécharger le livre :  CompTIA PenTest+ Practice Tests
Ajouter à ma liste d'envies
The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive...

Editeur : Sybex
Parution : 2019-06-03

PDF, ePub

36,08
Télécharger le livre :  The IoT Hacker's Handbook
Ajouter à ma liste d'envies
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...

Editeur : Apress
Parution : 2019-03-30

PDF, ePub

56,19
Télécharger le livre :  PowerShell and Python Together
Ajouter à ma liste d'envies
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...

Editeur : Apress
Parution : 2019-03-30

PDF, ePub

46,34
Télécharger le livre :  Professional Red Teaming
Ajouter à ma liste d'envies
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than...

Editeur : Apress
Parution : 2019-03-08

PDF, ePub

46,34
Télécharger le livre :  Building Digital Experience Platforms
Ajouter à ma liste d'envies
Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise...

Editeur : Apress
Parution : 2019-01-31

PDF, ePub

62,11
Télécharger le livre :  CASP+ CompTIA Advanced Security Practitioner Study Guide
Ajouter à ma liste d'envies
Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study tools The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the exam...

Editeur : Sybex
Parution : 2019-01-23

PDF, ePub

54,12
Télécharger le livre :  Financial Cybersecurity Risk Management
Ajouter à ma liste d'envies
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line...

Editeur : Apress
Parution : 2018-12-13

PDF

56,19
Télécharger le livre :  Versatile Cybersecurity
Ajouter à ma liste d'envies
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books...

Editeur : Springer
Parution : 2018-10-17
Collection : Advances in Information Security
PDF, ePub

168,79
Télécharger le livre :  Cybersecurity Incident Response
Ajouter à ma liste d'envies
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and...

Editeur : Apress
Parution : 2018-09-20

PDF, ePub

62,11
Télécharger le livre :  Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures
Ajouter à ma liste d'envies
Industry and government are increasingly reliant on an intelligent – or ‘smart’ – and interconnected computer infrastructure, but the reality is that it is extremely difficult to provide full cyber defense and/or intrusion prevention for the smart networks that connect...

Editeur : SAGE Publications Ltd
Parution : 2018-09-15

PDF

97,37
Télécharger le livre :  Cybersecurity Essentials
Ajouter à ma liste d'envies
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists...

Editeur : Sybex
Parution : 2018-08-31

PDF, ePub

37,98
Télécharger le livre :  Firewalls Don't Stop Dragons
Ajouter à ma liste d'envies
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is...

Editeur : Apress
Parution : 2018-08-24

PDF, ePub

39,43
Télécharger le livre :  Open Source Intelligence Methods and Tools
Ajouter à ma liste d'envies
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism...

Editeur : Apress
Parution : 2018-06-30

PDF

56,19
Télécharger le livre :  Advances in Human Factors in Cybersecurity
Ajouter à ma liste d'envies
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2018-06-23
Collection : Advances in Intelligent Systems and Computing
PDF, ePub

147,69
Télécharger le livre :  Asset Attack Vectors
Ajouter à ma liste d'envies
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...

Editeur : Apress
Parution : 2018-06-15

PDF

46,34
<< < 56789 >