681 livres(s)
Télécharger le livre :  Cybersecurity and Resilience in the Arctic
Ajouter à ma liste d'envies

Cybersecurity and Resilience in the Arctic


Kamrul Hossain , Igor Linkov


Until recently, the Arctic was almost impossible for anyone other than indigenous peoples and explorers to traverse. Pervasive Arctic sea ice and harsh climatological conditions meant that the region was deemed incapable of supporting industrial activity or a Western...

Parution : 2020-07-15
Format(s) : PDF
J'achète
114,40
Télécharger le livre :  Information Fusion in Distributed Sensor Networks with Byzantines
Ajouter à ma liste d'envies

Information Fusion in Distributed Sensor Networks with Byzantines


Andrea Abrardo , Mauro Barni , Kassem Kallas , Benedetta Tondi


This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...

Parution : 2020-07-14
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
126,59
Télécharger le livre :  Privileged Attack Vectors
Ajouter à ma liste d'envies

Privileged Attack Vectors


Morey J. Haber


See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...

Parution : 2020-06-13
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
78,87
Télécharger le livre :  Cyber Breach Response That Actually Works
Ajouter à ma liste d'envies

Cyber Breach Response That Actually Works


Andrew Gorecki


You will be breached—the only question is whether you'll be ready     A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...

Parution : 2020-06-09
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
40,62
Télécharger le livre :  Security Infrastructure Technology for Integrated Utilization of Big Data
Ajouter à ma liste d'envies

Security Infrastructure Technology for Integrated Utilization of Big Data


Tomoaki Mimoto , Atsuko Miyaji


This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...

Parution : 2020-04-23
Format(s) : PDF, ePub
Éditeur : Springer
J'ajoute au panier
Gratuit
Télécharger le livre :  21st Century Prometheus
Ajouter à ma liste d'envies

21st Century Prometheus


Maurizio Martellini , Ralf Trapp


This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...

Parution : 2020-03-11
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
116,04
Télécharger le livre :  Designing a HIPAA-Compliant Security Operations Center
Ajouter à ma liste d'envies

Designing a HIPAA-Compliant Security Operations Center


Eric C. Thompson


Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

Parution : 2020-02-25
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies

Solving Identity Management in Modern Applications


Abhishek Hingnikar , Yvonne Wilson


Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Parution : 2019-12-18
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Identity Attack Vectors
Ajouter à ma liste d'envies

Identity Attack Vectors


Morey J. Haber , Darran Rolls


Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

Parution : 2019-12-17
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Resilience and Hybrid Threats
Ajouter à ma liste d'envies

Resilience and Hybrid Threats


Lada Roslycky


Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and...

Parution : 2019-12-15
Format(s) : PDF
J'achète
99,80
Télécharger le livre :  Physical and Cyber Safety in Critical Water Infrastructure
Ajouter à ma liste d'envies

Physical and Cyber Safety in Critical Water Infrastructure


Oleksandr A. Pivovarov


Water supply and water management services are among the most critical infrastructures in society, providing safe and affordable drinking water, managing wastewater to avoid floods and environmental pollution, and enabling the reuse and replenishment of scarce water...

Parution : 2019-12-15
Format(s) : PDF
J'achète
99,80
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Ajouter à ma liste d'envies

Security Controls Evaluation, Testing, and Assessment Handbook


Leighton Johnson


Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential...

Parution : 2019-11-21
Format(s) : epub sans DRM
Éditeur : Academic Press
J'achète
91,73
Télécharger le livre :  Cybercrime Prevention
Ajouter à ma liste d'envies

Cybercrime Prevention


Collectif


This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world.This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an...

Parution : 2019-11-16
Format(s) : PDF, ePub
Éditeur : Palgrave Pivot
J'achète
68,56
Télécharger le livre :  Handbook of Vascular Biometrics
Ajouter à ma liste d'envies

Handbook of Vascular Biometrics


Christoph Busch , Sébastien Marcel , Andreas Uhl , Raymond Veldhuis


This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...

Parution : 2019-11-14
Format(s) : PDF, ePub
Éditeur : Springer
J'ajoute au panier
Gratuit
Télécharger le livre :  Ransomware Revealed
Ajouter à ma liste d'envies

Ransomware Revealed


Nihad A. Hassan


Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Parution : 2019-11-06
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Security Fundamentals
Ajouter à ma liste d'envies

Security Fundamentals


Crystal Panek


A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...

Parution : 2019-10-24
Format(s) : PDF, ePub
Éditeur : Sybex
J'achète
36,08
Télécharger le livre :  Practical Cryptography in Python
Ajouter à ma liste d'envies

Practical Cryptography in Python


Christopher K. Monson , Seth James Nielson


Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Parution : 2019-09-27
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Cybercrime Investigators Handbook
Ajouter à ma liste d'envies

Cybercrime Investigators Handbook


Graeme Edwards


The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...

Parution : 2019-09-13
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
58,66
Télécharger le livre :  The Art of War for Computer Security
Ajouter à ma liste d'envies

The Art of War for Computer Security


Tom Madsen


In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks....

Parution : 2019-09-03
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
126,59
Télécharger le livre :  Engineering Secure and Dependable Software Systems
Ajouter à ma liste d'envies

Engineering Secure and Dependable Software Systems


Peter Müller , Alexander Pretschner


Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical...

Parution : 2019-08-15
Format(s) : PDF
J'achète
102,24
<< < 56789 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés