681 livres(s)
Télécharger le livre :  Bow-Tie Industrial Risk Management Across Sectors
Ajouter à ma liste d'envies

Bow-Tie Industrial Risk Management Across Sectors


Luca Fiorentini


BOW-TIE INDUSTRIAL RISK MANAGEMENT ACROSS SECTORS Explore an approachable but rigorous treatment of systematic barrier-based approaches to risk management and failure analysisIn Bow-Tie Industrial Risk Management Across Sectors: A Barrier-Based Approach, accomplished...

Parution : 2021-05-18
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
112,83
Télécharger le livre :  Exploring Malicious Hacker Communities
Ajouter à ma liste d'envies

Exploring Malicious Hacker Communities


Collectif


Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security...

Parution : 2021-04-29
Format(s) : PDF, ePub
J'achète
68,95
Télécharger le livre :  Protective Security
Ajouter à ma liste d'envies

Protective Security


Jim Seaman


This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization....

Parution : 2021-04-09
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Digital Fluency
Ajouter à ma liste d'envies

Digital Fluency


Volker Lang


If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge...

Parution : 2021-04-09
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Jump-start Your SOC Analyst Career
Ajouter à ma liste d'envies

Jump-start Your SOC Analyst Career


Jarrett Rodrick , Tyler Wall


The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your...

Parution : 2021-03-04
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Big Breaches
Ajouter à ma liste d'envies

Big Breaches


Neil Daswani , Moudy Elbayadi


The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become...

Parution : 2021-02-24
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Authentication and Access Control
Ajouter à ma liste d'envies

Authentication and Access Control


Sirapat Boonkrong


Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography...

Parution : 2020-12-11
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Security Engineering
Ajouter à ma liste d'envies

Security Engineering


Ross Anderson


Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University...

Parution : 2020-11-24
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
66,46
Télécharger le livre :  70 Tips and Tricks for Mastering the CISSP Exam
Ajouter à ma liste d'envies

70 Tips and Tricks for Mastering the CISSP Exam


R. Sarma Danturthi


Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick...

Parution : 2020-11-09
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  A Complete Guide to Burp Suite
Ajouter à ma liste d'envies

A Complete Guide to Burp Suite


Sagar Rahalkar


Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used...

Parution : 2020-11-06
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Device-Independent Quantum Information Processing
Ajouter à ma liste d'envies

Device-Independent Quantum Information Processing


Rotem Arnon-Friedman


Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the...

Parution : 2020-10-31
Format(s) : PDF, ePub
Éditeur : Springer
Collection : Springer Theses
J'achète
158,24
Télécharger le livre :  Building Secure Firmware
Ajouter à ma liste d'envies

Building Secure Firmware


Jiewen Yao , Vincent Zimmer


Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence,...

Parution : 2020-10-27
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Security, Privacy and User Interaction
Ajouter à ma liste d'envies

Security, Privacy and User Interaction


Markus Jakobsson


This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails.This book goes on to explain, using a series of examples,  how to rethink security solutions to take users into consideration. By...

Parution : 2020-10-27
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
52,74
Télécharger le livre :  Serverless Security
Ajouter à ma liste d'envies

Serverless Security


Miguel A. Calles


Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application,...

Parution : 2020-10-05
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Cognitive Modeling for Automated Human Performance Evaluation at Scale
Ajouter à ma liste d'envies

Cognitive Modeling for Automated Human Performance Evaluation at Scale


Shujun Li , Patrice Rusconi , Haiyue Yuan


Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In...

Parution : 2020-09-16
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
63,29
Télécharger le livre :  CompTIA Security+ Certification Study Guide
Ajouter à ma liste d'envies

CompTIA Security+ Certification Study Guide


Ahmed F. Sheikh


Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.  Computer network vulnerabilities and threats are covered...

Parution : 2020-09-12
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Firewalls Don't Stop Dragons
Ajouter à ma liste d'envies

Firewalls Don't Stop Dragons


Carey Parker


Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your...

Parution : 2020-09-11
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
36,47
Télécharger le livre :  Investigations and the Art of the Interview
Ajouter à ma liste d'envies

Investigations and the Art of the Interview


Lawrence J. Fennelly , Inge Sebyan Black


The Art of Investigative Interviewing, Fourth Edition, builds on the successes of the previous editions providing the reader guidance on conducting investigative interviews, both ethically and professionally.The book can be used by anyone who is involved in...

Parution : 2020-08-27
Format(s) : epub sans DRM
J'achète
73,80
Télécharger le livre :  The Coupling of Safety and Security
Ajouter à ma liste d'envies

The Coupling of Safety and Security


Corinne Bieder , Kenneth Pettersen Gould


This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological,...

Parution : 2020-08-21
Format(s) : PDF, ePub
Éditeur : Springer
J'ajoute au panier
Gratuit
Télécharger le livre :  Rational Cybersecurity for Business
Ajouter à ma liste d'envies

Rational Cybersecurity for Business


Dan Blum


Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and...

Parution : 2020-08-12
Format(s) : PDF, ePub
Éditeur : Apress
J'ajoute au panier
Gratuit
<< < 45678 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés