10 livres(s)
Télécharger le livre :  FAIK
Ajouter à ma liste d'envies

FAIK


Perry Carpenter


Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?...

Parution : 2024-08-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  Blockchain Security from the Bottom Up
Ajouter à ma liste d'envies

Blockchain Security from the Bottom Up


Howard E. Poston


The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...

Parution : 2022-07-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  8 Steps to Better Security
Ajouter à ma liste d'envies

8 Steps to Better Security


Kim Crawley


Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical...

Parution : 2021-08-16
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  The Art of Attack
Ajouter à ma liste d'envies

The Art of Attack


Maxie Reynolds


Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles...

Parution : 2021-07-07
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  Phishing Dark Waters
Ajouter à ma liste d'envies

Phishing Dark Waters


Michele Fincher , Christopher Hadnagy


An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...

Parution : 2015-03-18
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
31,65
Télécharger le livre :  Carry On
Ajouter à ma liste d'envies

Carry On


Bruce Schneier


Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...

Parution : 2013-11-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  Secrets and Lies
Ajouter à ma liste d'envies

Secrets and Lies


Bruce Schneier


Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Parution : 2011-03-25
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,43
Ajouter à ma liste d'envies

Schneier on Security


Bruce Schneier


Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay --...

Parution : 2009-03-16
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
28,80
Télécharger le livre :  Spies Among Us
Ajouter à ma liste d'envies

Spies Among Us


Ira Winkler


Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...

Parution : 2005-04-01
Format(s) : PDF
Éditeur : Wiley
J'achète
25,32
Télécharger le livre :  Biometrics
Ajouter à ma liste d'envies

Biometrics


Samir Nanavati , Raj Nanavati , Michael Thieme


An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see...

Parution : 2002-04-29
Format(s) : PDF
Éditeur : Wiley
J'achète
40,62

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés