The two government reports comprising this unique guide have been professionally converted for accurate flowing-text e-book format reproduction. Contents: Regulation of Cryptocurrency in Selected Ju……続きを見る
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition
Key Features
Rely on the most updated version of Kali to formulate your pentesting strat……続きを見る
Maurits Kaptein legt in ‘Hallo wereld, hallo computer’ haarfijn en in klare taal uit wat iedereen zou moeten weten over digitale technologie. Een manager die geen verstand heeft van financiën en zij……続きを見る
Computer Security Can be Achieved Even in a World full of Hackers, Viruses and Spam
You can Protect your Computer and your Valuable Information, Bank Accounts and Photos Without Breaking the Budget ……続きを見る
出版社: Springer International Publishing
発売日: 2018年11月08日
This book constitutes the refereed post-conference proceedings of the 29th International Workshop on Combinatorial Algorithms, IWOCA 2018, held in Singapore, Singapore, in July 2018. The 31 regular ……続きを見る
出版社: Springer International Publishing
発売日: 2018年11月08日
This book constitutes the refereed post-conference proceedings of the Third International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2017, held in ……続きを見る
Improve and reimagine your organization's security stance, desktop standards, and server administration with centralized management via Group Policy.
Key Features
Explore advanced filtering techniq……続きを見る
著者:IP Specialist
出版社: IP Specialist
発売日: 2018年11月20日
This workbook covers all the information you need to pass the Blockchain Council’s Certified Blockchain Expert v2 exam. The workbook is designed to deliver all information and technical knowledge in……続きを見る
Build real-world projects like a smart contract deployment platform, betting apps, wallet services, and much more using blockchain
Key Features
Apply blockchain principles and features for making y……続きを見る
Explore various Azure services to build solutions that leverage effective design patterns
Key Features
Create, deploy, and host cloud applications on Azure
Understand various Azure services that he……続きを見る
This book is written for those people who want to hack systems to test identify the security holes and vulnerabilities of those
systems. This book outlines different tricks and techniques that an et……続きを見る
The Beauty of Mathematics in Computer Science explains the mathematical fundamentals of information technology products and services we use every day, from Google Web Search to GPS Navigation, and f……続きを見る
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of ap……続きを見る
What is C?
C is a computer programming language. That means that you can use C to create lists of instructions for a computer to follow. C is one of thousands of programming languages currently in u……続きを見る
著者:Julien Danjou
出版社: No Starch Press
発売日: 2018年12月31日
An indispensable collection of practical tips and real-world advice for tackling common Python problems and taking your code to the next level. Features interviews with high-profile Python developer……続きを見る
This report has been professionally converted for accurate flowing-text e-book format reproduction. The United States power grid is a logical target for a major cyber attack because it connects all ……続きを見る
Integrate an end-to-end logistic chain using IBM Blockchain and IoT platforms
Key Features
Explore practical implementation of ledger technology in the IoT architecture
Study security best practice……続きを見る
Threats categories, computer security, Risk Analysis, Threats prioritization,Possible attack scenarios, Security policy for the usage of smartphones in the organization premises
Paperback: 32 pages
……続きを見る
This book is written for those people who want to hack systems to test identify the security holes and vulnerabilities of those systems.
This book outlines different tricks and techniques that an et……続きを見る
Opnet simulation, Building a model, Creating subnets, Connecting subnets, Configuring services, Profiles, VPN configuration, simulation, investigation, Behavior of voice and video applications.
Book……続きを見る
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable ……続きを見る
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains
Covers the basics of digital watermarking, its types, domain in which it is impleme……続きを見る
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Albe……続きを見る
出版社: Springer International Publishing
発売日: 2018年11月28日
This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between……続きを見る
The book comprises selected papers presented at the International Conference on Advanced Computing, Networking and Informatics (ICANI 2018), organized by Medi-Caps University, India. It includes nov……続きを見る
Threats categories, computer security, Risk Analysis, Threats prioritization,Possible attack scenarios, Security policy for the usage of smartphones in the organization premises
Paperback: 32 pages
……続きを見る
The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government……続きを見る
A practical, example-driven guide to configuring even the most advanced features of pfSense 2.x
Key Features
Build a high-availability fault-tolerant security system with pfSense 2.x
Leverage the l……続きを見る
Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents.
Smart cities improve the quality of life of……続きを見る
著者:Song Y. Yan
出版社: Springer International Publishing
発売日: 2018年12月06日
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapte……続きを見る