Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping...
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive...
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an...
Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding...
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security...
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on...
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively. Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security...
Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical...
Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis. The selection first tackles general practice and technological promise and experience of...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud...
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data...
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be...
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next...
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song...
Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors' years of experience in working with attorneys as digital forensics experts, common questions arise again and...
Windows Registry Forensics provides the background of theWindows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are...
The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader.The second chapter discusses how to implement large...
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at...
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about...
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Restez informé(e) des événements et promotions ebook
Paiements sécurisés