709 livres(s)
Télécharger le livre :  Adversarial Learning and Secure AI
Ajouter à ma liste d'envies

Adversarial Learning and Secure AI


George Kesidis , David J. Miller , Zhen Xiang


Providing a logical framework for student learning, this is the first textbook on adversarial learning. It introduces vulnerabilities of deep learning, then demonstrates methods for defending against attacks and making AI generally more robust. To help students connect...

Parution : 2023-08-31
Format(s) : PDF
J'achète
67,71
Télécharger le livre :  Proceedings of the 2nd International Academic Conference on Blockchain, Information Technology and Smart Finance (ICBIS 2023)
Ajouter à ma liste d'envies

Proceedings of the 2nd International Academic Conference on Blockchain, Information Technology and Smart Finance (ICBIS 2023)


Mohammad Zoynul Abedin , Wan Azman Saini Bin Wan Ngah , Jerome Yen


This is an open access book.With the rapid development of modern economy and Internet technology, the traditional financial industry has to develop Internet finance to provide better services and meet the needs of the times. It is against this background that the...

Parution : 2023-07-25
Format(s) : PDF, ePub
Éditeur : Atlantis Press
J'ajoute au panier
Gratuit
Télécharger le livre :  How to Catch a Phish
Ajouter à ma liste d'envies

How to Catch a Phish


Nicholas Oles


Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and...

Parution : 2023-06-20
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
26,61
Télécharger le livre :  The SAGE Handbook of Human–Machine Communication
Ajouter à ma liste d'envies

The SAGE Handbook of Human–Machine Communication


Andrea L. Guzman , Steven Jones , Rhonda Mcewen


The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and...

Parution : 2023-06-01
Format(s) : PDF, ePub
J'achète
98,59
Télécharger le livre :  The Definitive Guide to PCI DSS Version 4
Ajouter à ma liste d'envies

The Definitive Guide to PCI DSS Version 4


Arthur B. Cooper Jr. , Jeff Hall , David Mundhenk , Ben Rothke


This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor...

Parution : 2023-05-24
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Data Exfiltration Threats and Prevention Techniques
Ajouter à ma liste d'envies

Data Exfiltration Threats and Prevention Techniques


Yasaman Samadi , Nasrin Sohrabi , Jakapan Suaboot , Zahir Tari


DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...

Parution : 2023-05-16
Format(s) : PDF, ePub
Éditeur : Wiley-IEEE Press
J'achète
121,75
Télécharger le livre :  Bitcoin und Blockchain
Ajouter à ma liste d'envies

Bitcoin und Blockchain


Patrick Rosenberger


Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...

Parution : 2023-04-26
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
19,71
Télécharger le livre :  Cyber Threat Intelligence
Ajouter à ma liste d'envies

Cyber Threat Intelligence


Martin Lee


CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...

Parution : 2023-04-06
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
98,33
Télécharger le livre :  Cyber Deception
Ajouter à ma liste d'envies

Cyber Deception


Tiffany Bao , Milind Tambe , Cliff Wang


This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...

Parution : 2023-03-08
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
158,24
Télécharger le livre :  Digitale Kompetenz
Ajouter à ma liste d'envies

Digitale Kompetenz


Volker Lang


Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen...

Parution : 2023-01-18
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
J'achète
24,64
Télécharger le livre :  The Political Economy of Risk in Finance and the Military
Ajouter à ma liste d'envies

The Political Economy of Risk in Finance and the Military


Marc Schelhase


This book is about risk conceptions, experiences and reflections. It applies the concept of the risk triangle, with its societal, organisational and personal angles, to two areas of inquiry: financial markets and the military, seeking to demonstrate the...

Parution : 2022-12-12
Format(s) : PDF, ePub
Éditeur : Palgrave Macmillan
J'achète
137,14
Télécharger le livre :  Insolvency and Bankruptcy Reforms in India
Ajouter à ma liste d'envies

Insolvency and Bankruptcy Reforms in India


Susan Thomas


This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...

Parution : 2022-11-30
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
116,04
Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies

Solving Identity Management in Modern Applications


Abhishek Hingnikar , Yvonne Wilson


Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Parution : 2022-11-17
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems
Ajouter à ma liste d'envies

Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems


Lyudmila Sukhostat


Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...

Parution : 2022-11-15
Format(s) : PDF
J'achète
102,26
Télécharger le livre :  A European Perspective on Crisis Informatics
Ajouter à ma liste d'envies

A European Perspective on Crisis Informatics


Christian Reuter


Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show...

Parution : 2022-11-12
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
J'achète
89,66
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies

Cybersecurity Law


Jeff Kosseff


CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...

Parution : 2022-11-10
Format(s) : ePub
Éditeur : Wiley
J'achète
106,50
Télécharger le livre :  Cybersecurity in Intelligent Networking Systems
Ajouter à ma liste d'envies

Cybersecurity in Intelligent Networking Systems


Rose Qingyang Hu , Yi Qian , Shengjie Xu


CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...

Parution : 2022-11-02
Format(s) : PDF, ePub
Éditeur : Wiley-IEEE Press
Collection : IEEE Press
J'achète
122,80
Télécharger le livre :  Security in Vehicular Networks
Ajouter à ma liste d'envies

Security in Vehicular Networks


Salim Batim , Leila Benarous , Abdelhamid Mellouk


Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages,...

Parution : 2022-09-14
Format(s) : PDF, ePub
Éditeur : Wiley-ISTE
J'achète
148,86
Télécharger le livre :  Penetration Tester werden für Dummies
Ajouter à ma liste d'envies

Penetration Tester werden für Dummies


Robert Shimonski


Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbstPentests durchzuführen. Von den nötigen Vorbereitungen über...

Parution : 2022-08-17
Format(s) : ePub
Éditeur : Wiley-VCH
Collection : Für Dummies
J'achète
23,84
Télécharger le livre :  Blockchain Security from the Bottom Up
Ajouter à ma liste d'envies

Blockchain Security from the Bottom Up


Howard E. Poston


The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...

Parution : 2022-07-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
<< < 23456 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés