Java hat den Ruf, eine relativ sichere Programmiersprache zu sein. Verschiedene Spracheigenschaften und Java-interne Sicherheitsmechanismen unterstützen den Entwickler beim Erstellen sicherer Anwend……続きを見る
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal in……続きを見る
An introduction to designing and configuring Cisco IPsec VPNs
Understand the basics of the IPsec protocol and learn implementation best practices
Study up-to-date IPsec design, incorporating current……続きを見る
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securin……続きを見る
Prinzipiell kann jedes Computerprogramm Schwachstellen enthalten. Auch JavaScript- und HTML5-Code stellen hier keine Ausnahme dar. Im ersten Kapitel dieses shortcuts werden XSS und browserbasierte B……続きを見る
# NOTA IMPORTANTE Este eBook cubre la versión de 1Password para WINDOWS. Si buscas una publicación para dominar 1Password en MAC, busca este mismo título en la iBooks Store.
&i……続きを見る
Corporations are spying on you more than government spies ever could. Just follow the money to find out how and why. Corporations can often predict what you will do next, detect subtle changes in yo……続きを見る
著者:Maija Elina Poikela
出版社: Springer International Publishing
発売日: 2019年12月22日
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to ……続きを見る
The crypto wars have raged for half a century.
In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antid……続きを見る
An expert on computer privacy and security shows how we can build privacy into the design of systems from the start.
We are tethered to our devices all day, every day, leaving data trails of our sea……続きを見る
出版社: Springer International Publishing
発売日: 2021年06月24日
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced sy……続きを見る
Start your Cybersecurity career with expert advice on how to get certified, find your first job, and progress
Purchase of the print or Kindle book includes a free eBook in PDF format
Key Features
L……続きを見る
This book discusses the state-of-the-art in privacy-preserving deep learning (PPDL), especially as a tool for machine learning as a service (MLaaS), which serves as an enabling technology by combini……続きを見る
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy.
Our Data, Ourselves addresses a common and crucial question: What can we as private indivi……続きを見る
In today's world, we are bombarded with surveillance, privacy intrusion, and identity theft on a regular basis. This provides easy to use and simple methods to protect YOUR privacy and identity thef……続きを見る
Become a security automation expert and build solutions that save time while making your organization more secureKey FeaturesWhat’s insideAn exploration of the SOAR platform’s full features to strea……続きを見る
Advocates a cybersecurity “social contract” between government and business in seven key economic sectors
Cybersecurity vulnerabilities in the United States are extensive, affecting everything from ……続きを見る
Have you ever wondered how a hacker approaches finding flaws in the browser and JavaScript? This book shares the thought processes and gives you tools to find your own flaws. It shares the basics of……続きを見る
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal i……続きを見る
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal i……続きを見る
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey FeaturesGain a comprehensive understanding of threat validationL……続きを見る
Cyberspace has become the ultimate frontier and central issue of international conflict, geopolitical competition, and security. Emerging threats and technologies continuously challenge the prospect……続きを見る
Unlock Python's hacking potential in the world of offensive cyber securityKey FeaturesExplore Python's role in offensive security, from fundamentals to advanced techniquesDiscover the realm of cyber……続きを見る
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used an……続きを見る
Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key FeaturesPrepare to participate in a bug bounty programDiscover your first bug and claim ……続きを見る