709 livres(s)
Télécharger le livre :  Data Analytics for Cybersecurity
Ajouter à ma liste d'envies

Data Analytics for Cybersecurity


Vandana P. Janeja


As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and...

Parution : 2022-07-21
Format(s) : PDF
J'achète
70,18
Télécharger le livre :  Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Ajouter à ma liste d'envies

Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants


Sven Matthias Peldszus


For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the...

Parution : 2022-07-13
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
J'achète
94,94
Télécharger le livre :  Theoretical Cybersecurity
Ajouter à ma liste d'envies

Theoretical Cybersecurity


Collectif


There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text...

Parution : 2022-07-12
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  40 Years of Experience with the National Market System (NMS)
Ajouter à ma liste d'envies

40 Years of Experience with the National Market System (NMS)


John Aidan Byrne , Robert A. Schwartz , Eileen Stempel


In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...

Parution : 2022-06-30
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
147,69
Télécharger le livre :  Anomaly Detection as a Service
Ajouter à ma liste d'envies

Anomaly Detection as a Service


Long Cheng , Xiaokui Shu , Salvatore J. Stolfo , Danfeng (Daphne) Yao


Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the...

Parution : 2022-06-01
Format(s) : PDF
Éditeur : Springer
J'achète
58,01
Télécharger le livre :  Cyber-Physical Security and Privacy in the Electric Smart Grid
Ajouter à ma liste d'envies

Cyber-Physical Security and Privacy in the Electric Smart Grid


Bruce Mcmillin , Thomas Roth


This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future...

Parution : 2022-06-01
Format(s) : PDF
Éditeur : Springer
J'achète
26,36
Télécharger le livre :  The Metrics Manifesto
Ajouter à ma liste d'envies

The Metrics Manifesto


Richard Seiersen


Security professionals are trained skeptics. They poke and prod at other people’s digital creations, expecting them to fail in unexpected ways. Shouldn’t that same skeptical power be turned inward? Shouldn’t practitioners ask: “How do I know that my enterprise security...

Parution : 2022-05-03
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
36,08
Télécharger le livre :  Auditing Corporate Surveillance Systems
Ajouter à ma liste d'envies

Auditing Corporate Surveillance Systems


Isabel Wagner


News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability....

Parution : 2022-03-31
Format(s) : PDF
J'achète
73,88
Télécharger le livre :  Cyber Security and Network Security
Ajouter à ma liste d'envies

Cyber Security and Network Security


Abhijit Guha , Sabyasachi Pramanik , Debabrata Samanta , M. Vinay


CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other...

Parution : 2022-03-29
Format(s) : PDF, ePub
Éditeur : Wiley-Scrivener
J'achète
193,01
Télécharger le livre :  Fixed Income Investing
Ajouter à ma liste d'envies

Fixed Income Investing


Thomas Poufinas


Fixed income investments have been a topic of broad interest, in particular for institutional investors such as insurance companies and pensions schemes. They were considered safe heavens in turbulent times by almost all other institutional and individual investors and...

Parution : 2022-03-28
Format(s) : PDF, ePub
Éditeur : Palgrave Macmillan
J'achète
147,69
Télécharger le livre :  Security Awareness For Dummies
Ajouter à ma liste d'envies

Security Awareness For Dummies


Ira Winkler


Make security a priority on your team  Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and...

Parution : 2022-03-24
Format(s) : PDF, ePub
Éditeur : For Dummies
J'achète
28,47
Télécharger le livre :  IT Security Controls
Ajouter à ma liste d'envies

IT Security Controls


Oben Kuyucu , Virgilio Viegas


Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your...

Parution : 2022-03-23
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
66,05
Télécharger le livre :  Future-proofing
Ajouter à ma liste d'envies

Future-proofing


Collectif


Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...

Parution : 2022-02-03
Format(s) : ePub
Éditeur : OUP Oxford
J'achète
59,63
Télécharger le livre :  Future-proofing
Ajouter à ma liste d'envies

Future-proofing


Collectif


Innovative research solutions increasingly require deep engagement with practitioners to manage the complex problems they are attempting to solve. This often project-based research is equipped with finite resources over a limited period without much thought into...

Parution : 2022-02-03
Format(s) : PDF
Éditeur : OUP Oxford
J'achète
59,63
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies

Human-Centered AI


Ben Shneiderman


The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Parution : 2022-01-13
Format(s) : ePub
Éditeur : OUP Oxford
J'achète
17,03
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies

Human-Centered AI


Ben Shneiderman


The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Parution : 2022-01-13
Format(s) : PDF
Éditeur : OUP Oxford
J'achète
17,03
Télécharger le livre :  ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Ajouter à ma liste d'envies

ISC2 SSCP Systems Security Certified Practitioner Official Study Guide


Mike Wills


The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification.The SSCP is designed to show that holders have the technical skills to...

Parution : 2022-01-07
Format(s) : PDF, ePub
Éditeur : Sybex
Collection : Sybex Study Guide
J'achète
54,12
Télécharger le livre :  Phishing and Communication Channels
Ajouter à ma liste d'envies

Phishing and Communication Channels


Gunikhan Sonowal


Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive...

Parution : 2021-12-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Cybersecurity Risk Management
Ajouter à ma liste d'envies

Cybersecurity Risk Management


Cynthia Brumfield , Brian Haugli


Cybersecurity Risk Management InCybersecurity Risk Management: Mastering the Fundamentals Using the NISTCybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and...

Parution : 2021-11-23
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
104,39
Télécharger le livre :  Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Ajouter à ma liste d'envies

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers


Mustafa Khairallah


This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large...

Parution : 2021-11-17
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
147,69
<< < 34567 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés