709 livres(s)
Télécharger le livre :  Jump-start Your SOC Analyst Career
Ajouter à ma liste d'envies

Jump-start Your SOC Analyst Career


Jarrett Rodrick , Tyler Wall


The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your...

Parution : 2024-05-31
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,72
Télécharger le livre :  The Reign of Botnets
Ajouter à ma liste d'envies

The Reign of Botnets


David Senecal


A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the...

Parution : 2024-05-29
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Tech Today
J'achète
34,20
Télécharger le livre :  Cybersecurity-Awareness
Ajouter à ma liste d'envies

Cybersecurity-Awareness


Martin Pils


In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken. Das Werk ist reich an praktischen Beispielen und Ratschlägen, bietet Strategien zur...

Parution : 2024-05-28
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
Collection : essentials
J'achète
9,99
Télécharger le livre :  Managing IT Service Security
Ajouter à ma liste d'envies

Managing IT Service Security


Eberhard Von Faber


This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order,...

Parution : 2024-05-27
Format(s) : PDF
Éditeur : Springer
J'achète
59,99
Télécharger le livre :  Computer-Supported Collaboration
Ajouter à ma liste d'envies

Computer-Supported Collaboration


Collectif


Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality...

Parution : 2024-05-24
Format(s) : PDF
Éditeur : Wiley-IEEE Press
J'achète
106,90
Télécharger le livre :  Designing to FIPS-140
Ajouter à ma liste d'envies

Designing to FIPS-140


Richard Fant , David Johnston


This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs...

Parution : 2024-04-25
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
60,74
Télécharger le livre :  Cybersecurity, Ethics, and Collective Responsibility
Ajouter à ma liste d'envies

Cybersecurity, Ethics, and Collective Responsibility


Terry Bossomaier , Seumas Miller


This is an open access title. It is made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 International licence. It is available to read and download as a PDF version on the Oxford Academic platform. The advent of the Internet,...

Parution : 2024-04-23
Format(s) : PDF, ePub
J'achète
21,94
Télécharger le livre :  Implementation and Analysis of Ciphers in Quantum Computing
Ajouter à ma liste d'envies

Implementation and Analysis of Ciphers in Quantum Computing


Anubhab Baksi , Kyungbae Jang


This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an...

Parution : 2024-04-17
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
139,99
Télécharger le livre :  Identity Attack Vectors
Ajouter à ma liste d'envies

Identity Attack Vectors


Morey J. Haber , Darran Rolls


Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their...

Parution : 2024-03-30
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
58,87
Télécharger le livre :  The Extended Reality Blueprint
Ajouter à ma liste d'envies

The Extended Reality Blueprint


Annie Eaton


Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...

Parution : 2024-03-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
32,80
Télécharger le livre :  Stepping Through Cybersecurity Risk Management
Ajouter à ma liste d'envies

Stepping Through Cybersecurity Risk Management


Jennifer L. Bayuk


Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...

Parution : 2024-03-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
91,80
Télécharger le livre :  The Curious Case of Usable Privacy
Ajouter à ma liste d'envies

The Curious Case of Usable Privacy


Simone Fischer-Hübner , Farzaneh Karegar


This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research,...

Parution : 2024-03-19
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
49,99
Télécharger le livre :  Toward a Quantum-Safe Communication Infrastructure
Ajouter à ma liste d'envies

Toward a Quantum-Safe Communication Infrastructure


Rainer Steinwandt


The accelerating pace at which quantum computing is developing makes it almost inevitable that some of the major cryptographic algorithms and protocols we rely on daily, for everything from internet shopping to running our critical infrastructure, may be compromised in...

Parution : 2024-03-15
Format(s) : PDF
J'achète
102,21
Télécharger le livre :  Building Cybersecurity Applications with Blockchain and Smart Contracts
Ajouter à ma liste d'envies

Building Cybersecurity Applications with Blockchain and Smart Contracts


Emmanuel Bertin , Ioanna Dionysiou , Nour El Madhoun


This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field of cybersecurity. It begins by defining the fundamentals of cybersecurity in the context of blockchain and smart contracts, and then moves on to the...

Parution : 2024-02-21
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
129,99
Télécharger le livre :  Digitale Selbstverteidigung für Dummies
Ajouter à ma liste d'envies

Digitale Selbstverteidigung für Dummies


Christina Czeschik


Der schwarze Gürtel für das Netz Sie wollen Ihre Privatsphäre und Ihre digitale Identität schützen? Dabei hilft Ihnen dieses Buch. Christina Czeschik klärt Sie darüber auf, wo Sie welche Daten und Metadaten hinterlassen, und hilft Ihnen dann dabei, darüber die...

Parution : 2024-02-19
Format(s) : ePub
Éditeur : Wiley-VCH
Collection : Für Dummies
J'achète
15,90
Télécharger le livre :  Pen Testing from Contract to Report
Ajouter à ma liste d'envies

Pen Testing from Contract to Report


Waqar Anwar , Alfred Basta , Nadine Basta


Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable...

Parution : 2024-02-12
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
84,60
Télécharger le livre :  Enterprise Cyber Risk Management as a Value Creator
Ajouter à ma liste d'envies

Enterprise Cyber Risk Management as a Value Creator


Bob Chaput


This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and...

Parution : 2024-01-23
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
37,37
Télécharger le livre :  CISSP Exam Certification Companion
Ajouter à ma liste d'envies

CISSP Exam Certification Companion


Mohamed Aly Bouke


This is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand...

Parution : 2023-12-15
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
58,87
Télécharger le livre :  ISO 27001: 2022/2023
Ajouter à ma liste d'envies

ISO 27001: 2022/2023


Heinrich Kersten , Klaus-Werner Schröder


Ein qualifiziertes Management der Informationssicherheit ist heutzutage für jede Organisation unverzichtbar. Die Normenreihe ISO 27000 ist dabei ein anerkannter „Wegweiser“ zu diesem Ziel. Im internationalen Kontext ist ihre Erfüllung für viele Organisationen ein...

Parution : 2023-12-12
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
Collection : Edition
J'achète
23,36
Télécharger le livre :  Discovering Cybersecurity
Ajouter à ma liste d'envies

Discovering Cybersecurity


Seth James Nielson


The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either...

Parution : 2023-12-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
53,26
<< < 12345 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés