46 livres(s)
Télécharger le livre :  Datensicherheit
Ajouter à ma liste d'envies

Datensicherheit


Thomas H. Lenhard


Die 3. Auflage des Buches bietet eine leicht verständliche Einführung in die technische und organisatorische Datensicherheit anhand vieler praktischer Beispiele und Stichpunkte. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische...

Parution : 2025-04-24
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
J'achète
34,50
Télécharger le livre :  The Extended Reality Blueprint
Ajouter à ma liste d'envies

The Extended Reality Blueprint


Annie Eaton


Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...

Parution : 2024-03-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
34,60
Télécharger le livre :  Big Breaches
Ajouter à ma liste d'envies

Big Breaches


Neil Daswani , Moudy Elbayadi


The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become...

Parution : 2021-02-24
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Firewalls Don't Stop Dragons
Ajouter à ma liste d'envies

Firewalls Don't Stop Dragons


Carey Parker


Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your...

Parution : 2020-09-11
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
36,47
Télécharger le livre :  Security Fundamentals
Ajouter à ma liste d'envies

Security Fundamentals


Crystal Panek


A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...

Parution : 2019-10-24
Format(s) : PDF, ePub
Éditeur : Sybex
J'achète
36,08
Télécharger le livre :  CompTIA PenTest+ Practice Tests
Ajouter à ma liste d'envies

CompTIA PenTest+ Practice Tests


Crystal Panek , Robb Tracy


The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive...

Parution : 2019-06-03
Format(s) : PDF, ePub
Éditeur : Sybex
J'achète
36,08
Télécharger le livre :  Achieving and Sustaining Secured Business Operations
Ajouter à ma liste d'envies

Achieving and Sustaining Secured Business Operations


Neelesh Ajmani , Dinesh Kumar


Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company...

Parution : 2017-12-07
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  NTP Security
Ajouter à ma liste d'envies

NTP Security


Allan Liska


Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network...

Parution : 2016-12-10
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Certified Ethical Hacker (CEH) Foundation Guide
Ajouter à ma liste d'envies

Certified Ethical Hacker (CEH) Foundation Guide


Sagar Ajay Rahalkar


Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from...

Parution : 2016-11-29
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Google Earth Forensics
Ajouter à ma liste d'envies

Google Earth Forensics


Michael Cross , Michael Harrington


Google Earth Forensics is the first book to explain how to useGoogle Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows...

Parution : 2014-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Introduction to US Cybersecurity Careers
Ajouter à ma liste d'envies

Introduction to US Cybersecurity Careers


Henry Dalziel


Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity...

Parution : 2014-12-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  How to Defeat Advanced Malware
Ajouter à ma liste d'envies

How to Defeat Advanced Malware


Henry Dalziel


How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages...

Parution : 2014-12-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Unmasking the Social Engineer
Ajouter à ma liste d'envies

Unmasking the Social Engineer


Christopher Hadnagy


Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...

Parution : 2014-01-27
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
33,76
Télécharger le livre :  Hacking with Kali
Ajouter à ma liste d'envies

Hacking with Kali


Andrew Bindner , James Broad


Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through...

Parution : 2013-12-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  The Basics of IT Audit
Ajouter à ma liste d'envies

The Basics of IT Audit


Stephen D. Gantz


The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the...

Parution : 2013-10-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Cyber Warfare
Ajouter à ma liste d'envies

Cyber Warfare


Jason Andress , Steve Winterfeld


Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information...

Parution : 2013-10-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Blackhatonomics
Ajouter à ma liste d'envies

Blackhatonomics


Daniel Molina , Will Gragido , Nick Selby , John Pirc


Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  It's Our Research
Ajouter à ma liste d'envies

It's Our Research


Tomer Sharon


It's Our Research: Getting Stakeholder Buy-in for User Experience Research Projects discusses frameworks, strategies, and techniques for working with stakeholders of user experience (UX) research in a way that ensures their buy-in. This book consists of six chapters...

Parution : 2012-03-21
Format(s) : epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
33,71
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a...

Parution : 2011-11-04
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Cyber Warfare
Ajouter à ma liste d'envies

Cyber Warfare


Jason Andress , Steve Winterfeld


Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The...

Parution : 2011-07-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés