21 livres(s)
Télécharger le livre :  Bitcoin und Blockchain
Ajouter à ma liste d'envies

Bitcoin und Blockchain


Patrick Rosenberger


Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...

Parution : 2023-04-26
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
19,71
Télécharger le livre :  Security Leader Insights for Information Protection
Ajouter à ma liste d'envies

Security Leader Insights for Information Protection


Bob Fahy


How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader...

Parution : 2014-05-24
Format(s) : epub sans DRM
Éditeur : Elsevier
J'achète
21,05
Télécharger le livre :  The UX Five-Second Rules
Ajouter à ma liste d'envies

The UX Five-Second Rules


Paul Doncaster


The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method.The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the...

Parution : 2014-03-21
Format(s) : epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
21,05
Télécharger le livre :  Interview Techniques for UX Practitioners
Ajouter à ma liste d'envies

Interview Techniques for UX Practitioners


Chauncey Wilson


Much of the work of user-centered design practitioners involves some type of interviewing. While interviewing is an important skill, many colleagues have little or no formal training in interviewing methods and often learn on the job with limited feedback on the quality...

Parution : 2013-11-23
Format(s) : epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
17,88
Télécharger le livre :  Credible Checklists and Quality Questionnaires
Ajouter à ma liste d'envies

Credible Checklists and Quality Questionnaires


Chauncey Wilson


Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method. In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking...

Parution : 2013-08-22
Format(s) : epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
17,88
Télécharger le livre :  Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Ajouter à ma liste d'envies

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data


James M. Aquilina , Eoghan Casey , Cameron H. Malin


Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide forLinux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and...

Parution : 2013-04-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Cybercrime Investigative Case Management
Ajouter à ma liste d'envies

Cybercrime Investigative Case Management


Brett Shavers


Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected...

Parution : 2013-01-15
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Cybercrime Case Presentation
Ajouter à ma liste d'envies

Cybercrime Case Presentation


Brett Shavers


Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an...

Parution : 2013-01-15
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Cybercrime Investigation Case Studies
Ajouter à ma liste d'envies

Cybercrime Investigation Case Studies


Brett Shavers


Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real...

Parution : 2012-12-17
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Seven Deadliest Unified Communications Attacks
Ajouter à ma liste d'envies

Seven Deadliest Unified Communications Attacks


Dan York


Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will...

Parution : 2010-06-04
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
21,05
Télécharger le livre :  Seven Deadliest USB Attacks
Ajouter à ma liste d'envies

Seven Deadliest USB Attacks


Brian Anderson , Barbara Anderson


Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the...

Parution : 2010-06-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
21,05
Télécharger le livre :  Seven Deadliest Network Attacks
Ajouter à ma liste d'envies

Seven Deadliest Network Attacks


Mike Borkin , Rob Kraus , Stacy Prowell


Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and...

Parution : 2010-06-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
21,05
Télécharger le livre :  Seven Deadliest Social Network Attacks
Ajouter à ma liste d'envies

Seven Deadliest Social Network Attacks


Carl Timm , Richard Perez


Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a...

Parution : 2010-06-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
21,05
Télécharger le livre :  Seven Deadliest Wireless Technologies Attacks
Ajouter à ma liste d'envies

Seven Deadliest Wireless Technologies Attacks


Brad Haines


Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy...

Parution : 2010-03-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
21,05
Télécharger le livre :  Seven Deadliest Microsoft Attacks
Ajouter à ma liste d'envies

Seven Deadliest Microsoft Attacks


Brian Barber , Rob Kraus , Mike Borkin , Naomi Alpern


Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up...

Parution : 2010-03-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
21,05
Télécharger le livre :  Seven Deadliest Web Application Attacks
Ajouter à ma liste d'envies

Seven Deadliest Web Application Attacks


Mike Shema


Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of...

Parution : 2010-02-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
21,05
Télécharger le livre :  The Art of Intrusion
Ajouter à ma liste d'envies

The Art of Intrusion


Kevin D. Mitnick , William L. Simon


Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Parution : 2009-03-17
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
18,99
Télécharger le livre :  Data Leaks For Dummies
Ajouter à ma liste d'envies

Data Leaks For Dummies


Guy Bunker , Gareth Fraser-King


Data leaks expose your customers to identity theft and yourbusiness to security risks. But how do you set up a data lossprevention plan? Start withData Leaks For Dummies! Now more than ever, it’s critical to keep your companydata locked up tighter than Fort Knox....

Parution : 2009-03-11
Format(s) : ePub
Éditeur : For Dummies
J'achète
16,25
Télécharger le livre :  Network Security Foundations
Ajouter à ma liste d'envies

Network Security Foundations


Matthew Strebe


The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...

Parution : 2006-02-20
Format(s) : PDF
Éditeur : Sybex
J'achète
24,05
Télécharger le livre :  Perfect Password
Ajouter à ma liste d'envies

Perfect Password


Mark Burnett


User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every...

Parution : 2006-01-09
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
21,05
12 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés