414 livres(s)
Télécharger le livre :  Building Cybersecurity Applications with Blockchain and Smart Contracts
Ajouter à ma liste d'envies

Building Cybersecurity Applications with Blockchain and Smart Contracts


Emmanuel Bertin , Ioanna Dionysiou , Nour El Madhoun


This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field of cybersecurity. It begins by defining the fundamentals of cybersecurity in the context of blockchain and smart contracts, and then moves on to the...

Parution : 2024-02-21
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
137,79
Télécharger le livre :  Pen Testing from Contract to Report
Ajouter à ma liste d'envies

Pen Testing from Contract to Report


Waqar Anwar , Alfred Basta , Nadine Basta


Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential...

Parution : 2024-02-08
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
89,68
Télécharger le livre :  CISSP Exam Certification Companion
Ajouter à ma liste d'envies

CISSP Exam Certification Companion


Mohamed Aly Bouke


This is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand...

Parution : 2023-12-15
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,40
Télécharger le livre :  Discovering Cybersecurity
Ajouter à ma liste d'envies

Discovering Cybersecurity


Seth James Nielson


The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either...

Parution : 2023-12-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,46
Télécharger le livre :  Cryptoeconomics
Ajouter à ma liste d'envies

Cryptoeconomics


Zhu Han , Jing Li , Dusit Niyato


The book offers a succinct overview of the technical components of blockchain networks, also known as distributed digital ledger networks. Written from an academic perspective, it surveys ongoing research challenges as well as existing literature. Several chapters...

Parution : 2023-11-16
Format(s) : PDF, ePub
J'achète
129,90
Télécharger le livre :  A Blueprint for Implementing Best Practice Procedures in a Digital Forensic Laboratory
Ajouter à ma liste d'envies

A Blueprint for Implementing Best Practice Procedures in a Digital Forensic Laboratory


Andrew Jones , David Lilburn Watson


Digital Forensic Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, Second Edition provides a one-stop shop for a set of procedures that meet international best practices and standards for handling...

Parution : 2023-11-09
Format(s) : epub sans DRM
Éditeur : Academic Press
J'achète
115,54
Télécharger le livre :  Cyber Malware
Ajouter à ma liste d'envies

Cyber Malware


Iman Almomani , Nick Ayres , Mohamed Amine Ferrag , Leandros A. Maglaras


This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover...

Parution : 2023-11-08
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
105,99
Télécharger le livre :  Liquidity
Ajouter à ma liste d'envies

Liquidity


John Aidan Byrne , Robert A. Schwartz , Eileen Stempel


In market structure, we tend to be equity focused, but one of the challenges is liquidity creation. This book examines liquidity creation and regulation. Based on the Baruch College Financial Markets Conference, Liquidity: How to Find it, Regulate it, Get it, this book...

Parution : 2023-10-05
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
148,39
Télécharger le livre :  Adversarial Learning and Secure AI
Ajouter à ma liste d'envies

Adversarial Learning and Secure AI


George Kesidis , David J. Miller , Zhen Xiang


Providing a logical framework for student learning, this is the first textbook on adversarial learning. It introduces vulnerabilities of deep learning, then demonstrates methods for defending against attacks and making AI generally more robust. To help students connect...

Parution : 2023-08-31
Format(s) : PDF
J'achète
68,03
Télécharger le livre :  The SAGE Handbook of Human–Machine Communication
Ajouter à ma liste d'envies

The SAGE Handbook of Human–Machine Communication


Andrea L. Guzman , Steven Jones , Rhonda Mcewen


The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and...

Parution : 2023-06-01
Format(s) : PDF, ePub
J'achète
99,06
Télécharger le livre :  The Definitive Guide to PCI DSS Version 4
Ajouter à ma liste d'envies

The Definitive Guide to PCI DSS Version 4


Arthur B. Cooper Jr. , Jeff Hall , David Mundhenk , Ben Rothke


This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor...

Parution : 2023-05-24
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,40
Télécharger le livre :  Data Exfiltration Threats and Prevention Techniques
Ajouter à ma liste d'envies

Data Exfiltration Threats and Prevention Techniques


Yasaman Samadi , Nasrin Sohrabi , Jakapan Suaboot , Zahir Tari


DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...

Parution : 2023-05-16
Format(s) : PDF, ePub
Éditeur : Wiley-IEEE Press
J'achète
122,32
Télécharger le livre :  Cyber Threat Intelligence
Ajouter à ma liste d'envies

Cyber Threat Intelligence


Martin Lee


CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...

Parution : 2023-04-06
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
98,79
Télécharger le livre :  Cyber Deception
Ajouter à ma liste d'envies

Cyber Deception


Tiffany Bao , Milind Tambe , Cliff Wang


This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...

Parution : 2023-03-08
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
158,99
Télécharger le livre :  The Political Economy of Risk in Finance and the Military
Ajouter à ma liste d'envies

The Political Economy of Risk in Finance and the Military


Marc Schelhase


This book is about risk conceptions, experiences and reflections. It applies the concept of the risk triangle, with its societal, organisational and personal angles, to two areas of inquiry: financial markets and the military, seeking to demonstrate the...

Parution : 2022-12-12
Format(s) : PDF, ePub
Éditeur : Palgrave Macmillan
J'achète
137,79
Télécharger le livre :  Insolvency and Bankruptcy Reforms in India
Ajouter à ma liste d'envies

Insolvency and Bankruptcy Reforms in India


Susan Thomas


This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...

Parution : 2022-11-30
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
116,59
Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies

Solving Identity Management in Modern Applications


Abhishek Hingnikar , Yvonne Wilson


Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Parution : 2022-11-17
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,40
Télécharger le livre :  Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems
Ajouter à ma liste d'envies

Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems


Lyudmila Sukhostat


Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...

Parution : 2022-11-15
Format(s) : PDF
J'achète
102,75
Télécharger le livre :  A European Perspective on Crisis Informatics
Ajouter à ma liste d'envies

A European Perspective on Crisis Informatics


Christian Reuter


Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show...

Parution : 2022-11-12
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
J'achète
90,09
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies

Cybersecurity Law


Jeff Kosseff


CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...

Parution : 2022-11-10
Format(s) : ePub
Éditeur : Wiley
J'achète
107,01
<< < 12345 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés