A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure
Securing Cloud Containers: Building and Running Secure Cloud-Native Applications is a hands-on guide that shows……続きを見る
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in supporting ……続きを見る
The rapid evolution of cloud computing has reshaped the digital landscape, empowering businesses and individuals with unprecedented scalability, cost efficiency, and global accessibility. Yet as org……続きを見る
This book offers a thorough overview of permissioned blockchain systems, emphasizing how they can tackle key challenges in large-scale transaction management systems. Modern transaction systems oper……続きを見る
Tietosi ovat haluttua kauppatavaraa. Suojaa tietosi, suojaat itsesi.
Kirja opettaa digiajan tärkeimmät kansalaistaidot: täydellinen opas oman yksityisyytesi suojaamiseen.
Tietosuojamurrot ovat herät……続きを見る
The ideal prep guide for earning your CCST Cybersecurity certification
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam is the perfect way to study for your certification as y……続きを見る
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems ……続きを見る
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems ……続きを見る
Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to s……続きを見る
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems ……続きを見る
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby cras……続きを見る
Your updated guide to success on the CCNA Certification exam
In the newly revised second edition of the CCNA Certification Study Guide – Volume 2: Exam 200-301 v1.1, renowned Cisco educator and netw……続きを見る
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is,……続きを見る
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the……続きを見る
This is a practical and comprehensive guide to all aspects of writing about science and technology, including both `how to write' and the practical and commercial aspects of publishing as they affec……続きを見る
Hoe maak je jezelf en de samenleving weerbaar in een onrustige wereld? Klimaatverandering, crises, Cyberaanvallen lijken steeds meer orde van de dag. Dit boek geeft je een praktische handleiding.
De……続きを見る
著者:Tim Maurer
出版社: Cambridge University Press
発売日: 2018年01月30日
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsors……続きを見る
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment
In Open-Source Security Operations Center (SOC): A Complete Guide t……続きを見る
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, ……続きを見る
Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle and prioritizing adherence to regulatory standards and business sustainabilityKey Fe……続きを見る
著者:Tommy Lorenzo
出版社: Tommy Lorenzo
発売日: 2024年04月29日
As technology increasingly permeates our lives, digital safety has become of vital importance. "Keeping Cyber Security Simple" offers an accessible introduction into cybersecurity aimed specifically……続きを見る
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edg……続きを見る
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adoptin……続きを見る
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adoptin……続きを見る
Je m’appelle Omar. Je suis marié et père de deux enfants, né à Bruxelles en 1972, à Molenbeek, le même quartier que celui des frères Abdeslam, les types impliqués dans la tuerie du Bataclan. Des fil……続きを見る
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. ……続きを見る
The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasivene……続きを見る
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing info……続きを見る
Cryptography
An introduction to one of the backbones of the digital world
Cryptography is one of the most important aspects of information technology security, central to the protection of digital a……続きを見る
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and ……続きを見る