Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
Resilience is defined as the ability to recover from or easily adapt to shocks and stresses. Resilience, unlike the concept of security (which is often and incorrectly conflated with resilience) refers to the system's ability to recover or regenerate its performance...
This book explores how technology can enhance water management by promoting transparency, sustainability, and collaborative decision-making. It highlights the potential of the Internet of Things (IoT) and blockchain technologies to address water-related challenges...
As we navigate an increasingly complex digital landscape, ensuring human factor security and safety has never been more critical. This groundbreaking book offers an innovative perspective by leveraging behavioral computing to address challenges in human factor security...
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into...
In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense. The book is rich in practical examples and advice, offering strategies for implementation and providing valuable...
This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma. The author uses his experience as a cryptologist to fill in gaps in the sources or to correct misguided...
This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order,...
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an...
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research,...
This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field of cybersecurity. It begins by defining the fundamentals of cybersecurity in the context of blockchain and smart contracts, and then moves on to the...
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover...
In market structure, we tend to be equity focused, but one of the challenges is liquidity creation. This book examines liquidity creation and regulation. Based on the Baruch College Financial Markets Conference, Liquidity: How to Find it, Regulate it, Get it, this book...
Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...
This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...
In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the...
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future...
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large...
This book provides cases and analyses of causes and consequences of difficulty in downsizing and exiting in the electronics industry during the “two lost decades” in Japan. Because of excess capacity in the industry, many electronics companies have been required for...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Restez informé(e) des événements et promotions ebook
Paiements sécurisés