Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit. Audits have long been criticized as “a ritual of verification,” originating from the financial...
This book covers all topics and requirements of the CompTIA Security+ (SY0-701) certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated certification. CompTIA Security+ (SY0-701) is...
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in supporting digital security for everyday technologies such as the internet, mobile...
Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as NIST, MITRE ATT&CK,...
Die Arbeit evaluiert die praktische Effektivität und Schlüssigkeit des europäischen Datenschutzrechts in Bezug auf unterschiedliche Rollenzuweisungen. Um auf allgegenwärtige Strukturverschiebungen bei der Verarbeitung personenbezogener Daten und...
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server...
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather...
Resilience is defined as the ability to recover from or easily adapt to shocks and stresses. Resilience, unlike the concept of security (which is often and incorrectly conflated with resilience) refers to the system's ability to recover or regenerate its performance...
This book explores how technology can enhance water management by promoting transparency, sustainability, and collaborative decision-making. It highlights the potential of the Internet of Things (IoT) and blockchain technologies to address water-related challenges...
Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation...
As we navigate an increasingly complex digital landscape, ensuring human factor security and safety has never been more critical. This groundbreaking book offers an innovative perspective by leveraging behavioral computing to address challenges in human factor security...
Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an...
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into...
Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces...
Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats...
A hands-on, beginner-friendly intro to web application pentesting InA Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book,...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Restez informé(e) des événements et promotions ebook
Paiements sécurisés