The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirem……続きを見る
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how ……続きを見る
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. ……続きを見る
The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a pr……続きを見る
Here‘s your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of exis……続きを見る
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requireme……続きを見る
Handbook of Inclusive Knowledge Management: Ensuring Inclusivity, Diversity, and Equity in Knowledge Processing Activities examines the role that diversity, equity and inclusivity (DEI) plays in the……続きを見る
Syria's bloody civil war has plunged the cradle of the Levant into a painful spiral of violence. This spiral of violence has caused profound social, political, economic, and strategic changes in Syr……続きを見る
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Foc……続きを見る
In today’s ever‑evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take yo……続きを見る
著者:Robert J Girod
出版社: Taylor & Francis
発売日: 2024年03月28日
Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is a covert ……続きを見る
As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and An……続きを見る
This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The author……続きを見る
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mea……続きを見る
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relat……続きを見る
In the past decade, artificial intelligence (AI) has made significant advancements in various sectors of society, such as education, health, e-commerce, media and entertainment, banking and finance,……続きを見る
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international communit……続きを見る
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Trai……続きを見る
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The critical job of ensuring our children’s safety expands as students become more ind……続きを見る
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vu……続きを見る
Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning sys……続きを見る
In the “big data age”, providing informed consent online has never been more challenging. Countless companies collect and share our personal data through devices, apps, and websites, fuelling a grow……続きを見る
Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose ……続きを見る
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machin……続きを見る
Descubre el poder del marketing digital aplicado al ámbito legal. En "Marketing Digital para Abogados: Herramientas y Estrategias para Impulsar tu Presencia en Línea", encontrarás consejos prácticos……続きを見る
著者:Anna Chub
出版社: Peter Lang GmbH, Internationaler Verlag der Wissenschaften
発売日: 2024年11月20日
(Online-)Plattformen spielen im Zeitalter des digitalen Wandels eine immer größere Rolle. Durch die Implementierung u.a. des Digital Markets Acts hat sich dabei der Begriff des "Plattformkartellrech……続きを見る
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CI……続きを見る
Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that’s often left to the last minute or resolved with produ……続きを見る
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a pract……続きを見る
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world’s most distinguished military leaders, scholars, cyber operators, and policymakers in a d……続きを見る