70 livres(s)
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies

Cybersecurity Law


Jeff Kosseff


Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...

Parution : 2025-08-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
112,26
Télécharger le livre :  Building Effective Privacy Programs
Ajouter à ma liste d'envies

Building Effective Privacy Programs


Jason Edwards , Griffin Weaver


Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....

Parution : 2025-08-14
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
99,55
Télécharger le livre :  Securing Microsoft Azure OpenAI
Ajouter à ma liste d'envies

Securing Microsoft Azure OpenAI


Karl Ots


Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces...

Parution : 2025-03-11
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Tech Today
J'achète
48,09
Télécharger le livre :  A Beginner's Guide To Web Application Penetration Testing
Ajouter à ma liste d'envies

A Beginner's Guide To Web Application Penetration Testing


Ali Abdollahi


A hands-on, beginner-friendly intro to web application pentesting InA Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book,...

Parution : 2025-01-07
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Tech Today
J'achète
43,70
Télécharger le livre :  FAIK
Ajouter à ma liste d'envies

FAIK


Perry Carpenter


Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?...

Parution : 2024-08-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
26,24
Télécharger le livre :  Cybersecurity in Context
Ajouter à ma liste d'envies

Cybersecurity in Context


Chris Jay Hoofnagle , Golden G. Richard


“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits“A comprehensive,...

Parution : 2024-08-07
Format(s) : PDF
Éditeur : Wiley
J'achète
79,59
Télécharger le livre :  Practical Cyber Intelligence
Ajouter à ma liste d'envies

Practical Cyber Intelligence


Adam Tilmar Jakobsen


Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in...

Parution : 2024-07-31
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
94,34
Télécharger le livre :  The Reign of Botnets
Ajouter à ma liste d'envies

The Reign of Botnets


David Senecal


A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the...

Parution : 2024-05-29
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Tech Today
J'achète
34,92
Télécharger le livre :  Stepping Through Cybersecurity Risk Management
Ajouter à ma liste d'envies

Stepping Through Cybersecurity Risk Management


Jennifer L. Bayuk


Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...

Parution : 2024-03-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
93,73
Télécharger le livre :  Pen Testing from Contract to Report
Ajouter à ma liste d'envies

Pen Testing from Contract to Report


Waqar Anwar , Alfred Basta , Nadine Basta


Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable...

Parution : 2024-02-12
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
86,38
Télécharger le livre :  Cyber Threat Intelligence
Ajouter à ma liste d'envies

Cyber Threat Intelligence


Martin Lee


CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...

Parution : 2023-04-11
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
95,16
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies

Cybersecurity Law


Jeff Kosseff


CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...

Parution : 2022-11-10
Format(s) : ePub
Éditeur : Wiley
J'achète
103,07
Télécharger le livre :  Blockchain Security from the Bottom Up
Ajouter à ma liste d'envies

Blockchain Security from the Bottom Up


Howard E. Poston


The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...

Parution : 2022-07-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
26,24
Télécharger le livre :  The Metrics Manifesto
Ajouter à ma liste d'envies

The Metrics Manifesto


Richard Seiersen


Security professionals are trained skeptics. They poke and prod at other people’s digital creations, expecting them to fail in unexpected ways. Shouldn’t that same skeptical power be turned inward? Shouldn’t practitioners ask: “How do I know that my enterprise security...

Parution : 2022-05-03
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
34,92
Télécharger le livre :  Cybersecurity Risk Management
Ajouter à ma liste d'envies

Cybersecurity Risk Management


Cynthia Brumfield , Brian Haugli


Cybersecurity Risk Management InCybersecurity Risk Management: Mastering the Fundamentals Using the NISTCybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and...

Parution : 2021-11-23
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
101,03
Télécharger le livre :  8 Steps to Better Security
Ajouter à ma liste d'envies

8 Steps to Better Security


Kim Crawley


Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical...

Parution : 2021-08-17
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
26,24
Télécharger le livre :  The Art of Attack
Ajouter à ma liste d'envies

The Art of Attack


Maxie Reynolds


Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles...

Parution : 2021-07-08
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
26,24
Télécharger le livre :  Bow-Tie Industrial Risk Management Across Sectors
Ajouter à ma liste d'envies

Bow-Tie Industrial Risk Management Across Sectors


Luca Fiorentini


BOW-TIE INDUSTRIAL RISK MANAGEMENT ACROSS SECTORS Explore an approachable but rigorous treatment of systematic barrier-based approaches to risk management and failure analysisIn Bow-Tie Industrial Risk Management Across Sectors: A Barrier-Based Approach, accomplished...

Parution : 2021-05-18
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
109,20
Télécharger le livre :  Security Engineering
Ajouter à ma liste d'envies

Security Engineering


Ross Anderson


Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University...

Parution : 2020-11-25
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
64,32
Télécharger le livre :  Cyber Breach Response That Actually Works
Ajouter à ma liste d'envies

Cyber Breach Response That Actually Works


Andrew Gorecki


You will be breached—the only question is whether you'll be ready     A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...

Parution : 2020-06-09
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
39,31
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés