Learn to deploy proven cryptographic tools in your applications and services
Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, includi……続きを見る
Internet está transformando nuestra concepción del mundo y revolucionando nuestras vidas. No podemos vivir sin ella, pero tampoco podemos confiar ciegamente en sus bondades ni sumergirnos alocadamen……続きを見る
Online Anonymity: Manual for Invisible Surfer
This manual serves as a comprehensive guide for navigating the online world with enhanced privacy and anonymity. It empowers you to become an "invisible……続きを見る
Il Master in Cybersicurezza copre tutti gli aspetti fondamentali dell'hacking etico, della sicurezza informatica e delle tecnologie di difesa. Il corso inizia con un'introduzione alla differenza tra……続きを見る
Proteggi i tuoi dati e la tua privacy online con il nostro corso base di cybersicurezza. Impara a difenderti dalle minacce informatiche come virus, malware, phishing e attacchi DDoS, e scopri come u……続きを見る
Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this comprehensive guide
Purchase of the print or Kindle book includes a free PDF ……続きを見る
This certification guide focuses on identity solutions and strategies that will help you prepare for Microsoft Identity and Access Administrator certification, while enabling you to implement what y……続きを見る
Design, implement, and integrate a complete data sanitization program
In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished indu……続きを見る
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that ex……続きを見る
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun.……続きを見る
Build intelligent software stacks with the Puppet configuration management suite About This Book • Develop high-quality Puppet modules in an isolated development environment • Manage complex develop……続きを見る
著者:Brian Lennon
出版社: Harvard University Press
発売日: 2018年02月26日
Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. ……続きを見る
In Abgrenzung zum einfachen Hacking werden hochspezialisierte und hochgradig anspruchsvolle, oft auf einen längeren Zeitraum angelegte Cyberangriffe als Advanced Persistent Threats - kurz APTs - bez……続きを見る