Built on Fortune 500 experience, this guide delivers hands-on methods to secure generative AI with extensive coverage of RAG, agents, prompt injection, data pipelines, Zero Trust, and sustainable pr……続きを見る
The book presents advanced techniques for enhancing mobility management across evolving wireless systems, including 5G and beyond. It introduces innovative handover decision algorithms that leverage……続きを見る
Biomedical systemsーsuch as pacemakers and automated insulin pumpsーare Cyber-Physical Systems (CPSs) that must operate safely and reliably at all times. This book introduces a systematic design met……続きを見る
Implementing an Information Security Framework: Ensuring Safe and Secure Learning Environments in K-12 Schools through Proactive Defense Strategies & Continuous Improvement.
This book provides a com……続きを見る
How You Can Inherit Success and Power from People Around You reveals the profound influence of social networks mentorship and collaboration on personal growth and success. By exploring hidden networ……続きを見る
A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure
Securing Cloud Containers: Building and Running Secure Cloud-Native Applications is a hands-on guide that shows……続きを見る
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in supporting ……続きを見る
The rapid evolution of cloud computing has reshaped the digital landscape, empowering businesses and individuals with unprecedented scalability, cost efficiency, and global accessibility. Yet as org……続きを見る
This book offers a thorough overview of permissioned blockchain systems, emphasizing how they can tackle key challenges in large-scale transaction management systems. Modern transaction systems oper……続きを見る
Tietosi ovat haluttua kauppatavaraa. Suojaa tietosi, suojaat itsesi.
Kirja opettaa digiajan tärkeimmät kansalaistaidot: täydellinen opas oman yksityisyytesi suojaamiseen.
Tietosuojamurrot ovat herät……続きを見る
The ideal prep guide for earning your CCST Cybersecurity certification
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam is the perfect way to study for your certification as y……続きを見る
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems ……続きを見る
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems ……続きを見る
De vredesparadox is actueler dan ooit en biedt een heldere en toegankelijke how to voor hoe we kunnen voorbereiden op de risicos van de toekomst en hoe we onszelf en onze gemeenschap beter kunnen be……続きを見る
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment
In Open-Source Security Operations Center (SOC): A Complete Guide t……続きを見る
Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to s……続きを見る
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems ……続きを見る
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is,……続きを見る
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the……続きを見る
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby cras……続きを見る
This is a practical and comprehensive guide to all aspects of writing about science and technology, including both `how to write' and the practical and commercial aspects of publishing as they affec……続きを見る
Your updated guide to success on the CCNA Certification exam
In the newly revised second edition of the CCNA Certification Study Guide – Volume 2: Exam 200-301 v1.1, renowned Cisco educator and netw……続きを見る
著者:Tim Maurer
出版社: Cambridge University Press
発売日: 2018年01月30日
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsors……続きを見る
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. ……続きを見る
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, ……続きを見る
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adoptin……続きを見る
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adoptin……続きを見る
Je m’appelle Omar. Je suis marié et père de deux enfants, né à Bruxelles en 1972, à Molenbeek, le même quartier que celui des frères Abdeslam, les types impliqués dans la tuerie du Bataclan. Des fil……続きを見る
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edg……続きを見る
著者:Tommy Lorenzo
出版社: Tommy Lorenzo
発売日: 2024年04月29日
As technology increasingly permeates our lives, digital safety has become of vital importance. "Keeping Cyber Security Simple" offers an accessible introduction into cybersecurity aimed specifically……続きを見る