681 livres(s)
Télécharger le livre :  Asset Attack Vectors
Ajouter à ma liste d'envies

Asset Attack Vectors


Morey J. Haber , Brad Hibbert


Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...

Parution : 2018-06-15
Format(s) : PDF
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Cyber Resilience of Systems and Networks
Ajouter à ma liste d'envies

Cyber Resilience of Systems and Networks


Alexander Kott , Igor Linkov


This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government.  Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security  - which is...

Parution : 2018-05-30
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
116,04
Télécharger le livre :  Windows Security Monitoring
Ajouter à ma liste d'envies

Windows Security Monitoring


Andrei Miroshnikov


Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the...

Parution : 2018-03-13
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
45,15
Télécharger le livre :  WHAT IF ARTIFICIAL INTELLIGENCE COULD MAKE US MORE HUMAN?
Ajouter à ma liste d'envies

WHAT IF ARTIFICIAL INTELLIGENCE COULD MAKE US MORE HUMAN?


Arnaud De Lacoste


The term “arti cial intelligence” conjures up all manner of science- ction style fantasies, from the end of work to machine domination and the extinction of the human race. But what if these fears were largely unfounded? Already a...

Parution : 2018-02-12
Format(s) : PDF sans DRM, epub sans DRM
Éditeur : Débats Publics
J'achète
11,99
Télécharger le livre :  Digital and Document Examination
Ajouter à ma liste d'envies

Digital and Document Examination


Max M. Houck


The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward. This volume, Digital and Document Examination, will serve as a graduate level text for those studying and teaching digital...

Parution : 2018-01-27
Format(s) : epub sans DRM
Éditeur : Academic Press
J'achète
97,01
Télécharger le livre :  Privileged Attack Vectors
Ajouter à ma liste d'envies

Privileged Attack Vectors


Morey J. Haber , Brad Hibbert


See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached....

Parution : 2017-12-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
28,47
Télécharger le livre :  Achieving and Sustaining Secured Business Operations
Ajouter à ma liste d'envies

Achieving and Sustaining Secured Business Operations


Neelesh Ajmani , Dinesh Kumar


Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company...

Parution : 2017-12-07
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Seeking the Truth from Mobile Evidence
Ajouter à ma liste d'envies

Seeking the Truth from Mobile Evidence


John Bair


Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing...

Parution : 2017-11-17
Format(s) : PDF, ePub
Éditeur : Academic Press
J'achète
68,52
Télécharger le livre :  Building a HIPAA-Compliant Cybersecurity Program
Ajouter à ma liste d'envies

Building a HIPAA-Compliant Cybersecurity Program


Eric C. Thompson


Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The...

Parution : 2017-11-11
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Ajouter à ma liste d'envies

Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges


Andrea Malizia , Maurizio Martellini


This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...

Parution : 2017-10-30
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
179,34
Télécharger le livre :  Strategic Cyber Defense
Ajouter à ma liste d'envies

Strategic Cyber Defense


Adrian V. Gheorghe , Yasir Gokce


With the increased dependence on digital and internet technologies, cyber security has come to be regarded as a national security issue, and the number of countries with a published cyber security strategy continues to rise. But these national cyber security strategies...

Parution : 2017-07-15
Format(s) : PDF
J'achète
93,72
Télécharger le livre :  Digital Privacy and Security Using Windows
Ajouter à ma liste d'envies

Digital Privacy and Security Using Windows


Nihad Hassan , Rami Hijazi


Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.This book...

Parution : 2017-07-02
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
66,05
Télécharger le livre :  Advances in Human Factors in Cybersecurity
Ajouter à ma liste d'envies

Advances in Human Factors in Cybersecurity


Denise Nicholson


This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Parution : 2017-06-13
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
147,69
Télécharger le livre :  Cell Phone Location Evidence for Legal Professionals
Ajouter à ma liste d'envies

Cell Phone Location Evidence for Legal Professionals


Larry Daniel


Cell Phone Location Evidence for Legal Professionals: UnderstandingCell Phone Location Evidence from the Warrant to the Courtroom is a guide, in plain language, for digital forensics professionals, attorneys, law enforcement professionals and students interested in the...

Parution : 2017-06-12
Format(s) : epub sans DRM
Éditeur : Academic Press
J'achète
72,74
Télécharger le livre :  Cybercrime and Business
Ajouter à ma liste d'envies

Cybercrime and Business


Sanford Moskowitz


Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today's corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately...

Parution : 2017-05-19
Format(s) : PDF, epub sans DRM
J'achète
72,74
Télécharger le livre :  Cyberspace
Ajouter à ma liste d'envies

Cyberspace


Luis A. García-Segura , J. Martín Ramírez


This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production....

Parution : 2017-05-11
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
89,66
Télécharger le livre :  Research Methods in Human-Computer Interaction
Ajouter à ma liste d'envies

Research Methods in Human-Computer Interaction


Jinjuan Heidi Feng , Harry Hochheiser , Jonathan Lazar


Research Methods in Human-Computer Interaction is a comprehensive guide to performing research and is essential reading for both quantitative and qualitative methods. Since the first edition was published in 2009, the book has been adopted for use at leading...

Parution : 2017-04-28
Format(s) : PDF, epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
68,52
Télécharger le livre :  Research Methods for Cyber Security
Ajouter à ma liste d'envies

Research Methods for Cyber Security


David O. Manz , Thomas W. Edgar


Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question,...

Parution : 2017-04-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
87,51
Télécharger le livre :  Safety of Web Applications
Ajouter à ma liste d'envies

Safety of Web Applications


Eric Quinton


Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for...

Parution : 2017-04-11
Format(s) : PDF, epub sans DRM
J'achète
98,06
Télécharger le livre :  Darkweb Cyber Threat Intelligence Mining
Ajouter à ma liste d'envies

Darkweb Cyber Threat Intelligence Mining


Collectif


The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a...

Parution : 2017-04-04
Format(s) : PDF, ePub
J'achète
76,34
<< < 7891011 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés