681 livres(s)
Télécharger le livre :  Advances in Human Factors in Cybersecurity
Ajouter à ma liste d'envies

Advances in Human Factors in Cybersecurity


Denise Nicholson


This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of...

Parution : 2016-08-16
Format(s) : ePub
Éditeur : Springer
J'achète
158,24
Télécharger le livre :  Mobile Device Management
Ajouter à ma liste d'envies

Mobile Device Management


Markus Pierer


Ing. Markus Pierer M.Sc. proves whether or not there is a generic valid system comparison approach for various individual specifications facilitating the selection process for organizations. He illustrates important basics of enterprise mobility management, realizes...

Parution : 2016-08-12
Format(s) : PDF
Éditeur : Springer Vieweg
J'achète
52,74
Télécharger le livre :  Audio Content Security
Ajouter à ma liste d'envies

Audio Content Security


Iraj Sadegh Amiri , Sogand Ghorbani


Audio Content Security: Attack Analysis onAudio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of...

Parution : 2016-07-16
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Quantifying the User Experience
Ajouter à ma liste d'envies

Quantifying the User Experience


James R Lewis , Jeff Sauro


Quantifying the User Experience: Practical Statistics for User Research, Second Edition, provides practitioners and researchers with the information they need to confidently quantify, qualify, and justify their data. The book presents a practical guide on how to use...

Parution : 2016-07-12
Format(s) : PDF, epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
42,15
Télécharger le livre :  DNS Security
Ajouter à ma liste d'envies

DNS Security


Allan Liska , Geoffrey Stowe


DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Parution : 2016-06-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Data Breach Preparation and Response
Ajouter à ma liste d'envies

Data Breach Preparation and Response


Kevvie Fowler


Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.Data breaches are inevitable incidents that can disrupt...

Parution : 2016-06-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Combatting Cybercrime and Cyberterrorism
Ajouter à ma liste d'envies

Combatting Cybercrime and Cyberterrorism


Babak Akhgar , Ben Brewster


This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...

Parution : 2016-05-27
Format(s) : ePub
Éditeur : Springer
J'achète
89,66
Télécharger le livre :  Threat Forecasting
Ajouter à ma liste d'envies

Threat Forecasting


David Desanto , Will Gragido , Iain Davison , John Pirc


Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting...

Parution : 2016-05-17
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  OS X Incident Response
Ajouter à ma liste d'envies

OS X Incident Response


Jaron Bradley


OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts ofOS X, analysts will set themselves apart by acquiring an up-and-coming...

Parution : 2016-05-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Network Performance and Security
Ajouter à ma liste d'envies

Network Performance and Security


Chris Chapman


Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how...

Parution : 2016-03-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Big Data Concepts, Theories, and Applications
Ajouter à ma liste d'envies

Big Data Concepts, Theories, and Applications


Song Guo , Shui Yu


This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice.  It also focuses on...

Parution : 2016-03-03
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
158,24
Télécharger le livre :  Radio-Frequency Human Exposure Assessment
Ajouter à ma liste d'envies

Radio-Frequency Human Exposure Assessment


Joe Wiart


Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...

Parution : 2016-03-03
Format(s) : PDF, ePub
Éditeur : Wiley-ISTE
J'achète
163,47
Télécharger le livre :  Malware Diffusion Models for Modern Complex Networks
Ajouter à ma liste d'envies

Malware Diffusion Models for Modern Complex Networks


Vasileios Karyotis , M.H.R. Khouzani


Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable...

Parution : 2016-02-02
Format(s) : PDF, epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
90,68
Télécharger le livre :  The Information Systems Security Officer's Guide
Ajouter à ma liste d'envies

The Information Systems Security Officer's Guide


Gerald L. Kovacich


The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents...

Parution : 2016-01-12
Format(s) : PDF, epub sans DRM
J'achète
53,75
Télécharger le livre :  Deploying Secure Containers for Training and Development
Ajouter à ma liste d'envies

Deploying Secure Containers for Training and Development


Henry Dalziel , Jon Schipp


In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. -...

Parution : 2015-12-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Essential Skills for Hackers
Ajouter à ma liste d'envies

Essential Skills for Hackers


Kevin Cardwell , Henry Dalziel


Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...

Parution : 2015-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  CISSP Study Guide
Ajouter à ma liste d'envies

CISSP Study Guide


Eric Conrad , Joshua Feldman , Seth Misenar


CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...

Parution : 2015-12-08
Format(s) : PDF
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members
Ajouter à ma liste d'envies

Cyber Security Awareness for Corporate Directors and Board Members


Henry Dalziel , David Willson


Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...

Parution : 2015-12-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Ajouter à ma liste d'envies

Security Controls Evaluation, Testing, and Assessment Handbook


Leighton Johnson


Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...

Parution : 2015-12-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Digital Forensics
Ajouter à ma liste d'envies

Digital Forensics


John Sammons


Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Parution : 2015-12-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
37,93
<< < 910111213 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés