681 livres(s)
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies

Cybersecurity Law


Jeff Kosseff


Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...

Parution : 2025-08-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
116,00
Télécharger le livre :  Building Effective Privacy Programs
Ajouter à ma liste d'envies

Building Effective Privacy Programs


Jason Edwards , Griffin Weaver


Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....

Parution : 2025-08-15
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
102,86
Télécharger le livre :  Cyber Resilience: Applied Perspectives
Ajouter à ma liste d'envies

Cyber Resilience: Applied Perspectives


Alexander Kott , Igor Linkov


Resilience is defined as the ability to recover from or easily adapt to shocks and stresses. Resilience, unlike the concept of security (which is often and incorrectly conflated with resilience) refers to the system's ability to recover or regenerate its performance...

Parution : 2025-07-16
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
179,34
Télécharger le livre :  Unleashing the Power of Blockchain and IoT for Water Informatics
Ajouter à ma liste d'envies

Unleashing the Power of Blockchain and IoT for Water Informatics


Vimal Gupta , Gyanendra Kumar , Nitima Malsa , Sur Singh Rawat


This book explores how technology can enhance water management by promoting transparency, sustainability, and collaborative decision-making. It highlights the potential of the Internet of Things (IoT) and blockchain technologies to address water-related challenges...

Parution : 2025-07-01
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
168,79
Télécharger le livre :  Everyday Cryptography
Ajouter à ma liste d'envies

Everyday Cryptography


Keith M. Martin


Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in supporting digital security for everyday technologies such as the internet, mobile...

Parution : 2025-06-27
Format(s) : ePub
Éditeur : OUP Oxford
J'achète
38,94
Télécharger le livre :  Navigating Misinformation
Ajouter à ma liste d'envies

Navigating Misinformation


Katrin Hartwig


Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation...

Parution : 2025-06-16
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
J'achète
126,59
Télécharger le livre :  Cyber Operations
Ajouter à ma liste d'envies

Cyber Operations


Mike O'leary


Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server...

Parution : 2019-03-01
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
88,73
Télécharger le livre :  Digital Forensics Basics
Ajouter à ma liste d'envies

Digital Forensics Basics


Nihad A. Hassan


Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather...

Parution : 2019-02-25
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Human Factor Security and Safety
Ajouter à ma liste d'envies

Human Factor Security and Safety


Cheng Wang


As we navigate an increasingly complex digital landscape, ensuring human factor security and safety has never been more critical. This groundbreaking book offers an innovative perspective by leveraging behavioral computing to address challenges in human factor security...

Parution : 2025-06-04
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
200,44
Télécharger le livre :  Gamified Tabletop Exercises for Effective Disaster Recovery Testing
Ajouter à ma liste d'envies

Gamified Tabletop Exercises for Effective Disaster Recovery Testing


John Svazic


Tabletop exercises are a common way to test disaster recovery and business continuity plans, but they can also be some of the most dry and boring meetings any professional can attend. Following a set script with no variation can cause folks to lose interest and question...

Parution : 2025-05-07
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
39,43
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies

Securing the Digital Frontier


Andrew Martin


Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an...

Parution : 2025-05-01
Format(s) : PDF
Éditeur : OUP Oxford
J'achète
21,89
Télécharger le livre :  Cybersecurity Education and Training
Ajouter à ma liste d'envies

Cybersecurity Education and Training


Razvan Beuran


This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into...

Parution : 2025-04-02
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
79,11
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies

Securing the Digital Frontier


Andrew Martin


Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an...

Parution : 2025-04-01
Format(s) : ePub
Éditeur : OUP Oxford
J'achète
21,89
Télécharger le livre :  Securing Microsoft Azure OpenAI
Ajouter à ma liste d'envies

Securing Microsoft Azure OpenAI


Karl Ots


Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces...

Parution : 2025-03-11
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Tech Today
J'achète
49,69
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies

Securing the Digital Frontier


Collectif


Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats...

Parution : 2025-02-14
Format(s) : PDF, ePub
Éditeur : Wiley-Scrivener
J'achète
220,60
Télécharger le livre :  Cybersecurity Awareness
Ajouter à ma liste d'envies

Cybersecurity Awareness


Martin Pils


In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense. The book is rich in practical examples and advice, offering strategies for implementation and providing valuable...

Parution : 2025-01-18
Format(s) : PDF, ePub
Éditeur : Springer
Collection : essentials
J'achète
10,54
Télécharger le livre :  A Beginner's Guide To Web Application Penetration Testing
Ajouter à ma liste d'envies

A Beginner's Guide To Web Application Penetration Testing


Ali Abdollahi


A hands-on, beginner-friendly intro to web application pentesting InA Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book,...

Parution : 2025-01-07
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Tech Today
J'achète
45,15
Télécharger le livre :  CyberDynamX
Ajouter à ma liste d'envies

CyberDynamX


Curtis L. Blais


This book  simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical background. It...

Parution : 2024-12-02
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
59,15
Télécharger le livre :  CompTIA A+ Certification Companion
Ajouter à ma liste d'envies

CompTIA A+ Certification Companion


Kodi A. Cochran


This book covers all topics and requirements of the CompTIA A+ certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated certification.  CompTIA A+ certification is at its core an...

Parution : 2024-11-29
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
64,08
Télécharger le livre :  Web3
Ajouter à ma liste d'envies

Web3


Collectif


Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA students and industry professionals explores keyWeb3 concepts, starting from foundational principles and moving to advanced topics like blockchain, smart...

Parution : 2024-11-21
Format(s) : PDF, ePub
J'achète
55,40
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés