Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
CISSP Study Guide - fully updated for the 2024CISSP Body of Knowledge ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated based on the latest 2024CISSP Detailed Content Outline. This bestselling...
Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality...
This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs...
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an...
Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their...
Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research,...
The accelerating pace at which quantum computing is developing makes it almost inevitable that some of the major cryptographic algorithms and protocols we rely on daily, for everything from internet shopping to running our critical infrastructure, may be compromised in...
This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field of cybersecurity. It begins by defining the fundamentals of cybersecurity in the context of blockchain and smart contracts, and then moves on to the...
Der schwarze Gürtel für das Netz Sie wollen Ihre Privatsphäre und Ihre digitale Identität schützen? Dabei hilft Ihnen dieses Buch. Christina Czeschik klärt Sie darüber auf, wo Sie welche Daten und Metadaten hinterlassen, und hilft Ihnen dann dabei, darüber die...
Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential...
This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and...
This is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand...
Ein qualifiziertes Management der Informationssicherheit ist heutzutage für jede Organisation unverzichtbar. Die Normenreihe ISO 27000 ist dabei ein anerkannter „Wegweiser“ zu diesem Ziel. Im internationalen Kontext ist ihre Erfüllung für viele Organisationen ein...
The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either...
The book offers a succinct overview of the technical components of blockchain networks, also known as distributed digital ledger networks. Written from an academic perspective, it surveys ongoing research challenges as well as existing literature. Several chapters...
Digital Forensic Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, Second Edition provides a one-stop shop for a set of procedures that meet international best practices and standards for handling...
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover...
In market structure, we tend to be equity focused, but one of the challenges is liquidity creation. This book examines liquidity creation and regulation. Based on the Baruch College Financial Markets Conference, Liquidity: How to Find it, Regulate it, Get it, this book...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Restez informé(e) des événements et promotions ebook
Paiements sécurisés