The rapid evolution of cloud computing has reshaped the digital landscape, empowering businesses and individuals with unprecedented scalability, cost efficiency, and global accessibility. Yet as org……続きを見る
Tietosi ovat haluttua kauppatavaraa. Suojaa tietosi, suojaat itsesi.
Kirja opettaa digiajan tärkeimmät kansalaistaidot: täydellinen opas oman yksityisyytesi suojaamiseen.
Tietosuojamurrot ovat herät……続きを見る
The ideal prep guide for earning your CCST Cybersecurity certification
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam is the perfect way to study for your certification as y……続きを見る
In einer Ära, in der Softwareentwicklung nicht nur Schnelligkeit, sondern auch maximale Sicherheit erfordert, bietet Lutz G. Hummels Buch 'Von DevOps zu DevSecOps' eine entscheidende Perspektive auf……続きを見る
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems ……続きを見る
Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to s……続きを見る
Your updated guide to success on the CCNA Certification exam
In the newly revised second edition of the CCNA Certification Study Guide – Volume 2: Exam 200-301 v1.1, renowned Cisco educator and netw……続きを見る
This is a practical and comprehensive guide to all aspects of writing about science and technology, including both `how to write' and the practical and commercial aspects of publishing as they affec……続きを見る
Hoe maak je jezelf en de samenleving weerbaar in een onrustige wereld? Klimaatverandering, crises, Cyberaanvallen lijken steeds meer orde van de dag. Dit boek geeft je een praktische handleiding.
De……続きを見る
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, ……続きを見る
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adoptin……続きを見る
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adoptin……続きを見る
著者:Tim Maurer
出版社: Cambridge University Press
発売日: 2018年01月30日
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsors……続きを見る
著者:Tommy Lorenzo
出版社: Tommy Lorenzo
発売日: 2024年04月29日
As technology increasingly permeates our lives, digital safety has become of vital importance. "Keeping Cyber Security Simple" offers an accessible introduction into cybersecurity aimed specifically……続きを見る
The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasivene……続きを見る
Cryptography
An introduction to one of the backbones of the digital world
Cryptography is one of the most important aspects of information technology security, central to the protection of digital a……続きを見る
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing info……続きを見る
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and ……続きを見る
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guideKey FeaturesGain hands-on experience with ……続きを見る
This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds. Whether you are a beginner or a……続きを見る
著者:Andrea Simmons
出版社: IT Governance Publishing
発売日: 2023年10月10日
The role of the information security manager has changed. Have you?
The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more un……続きを見る
Emerging Technologies for Digital Infrastructure Development is a comprehensive and insightful book that reviews the transformative impact of cutting-edge technologies on the digital landscape. It p……続きを見る
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law affecting information and communication technology (ICT) - in the Bangladesh c……続きを見る
Discover the hidden depths of the digital underworld in this comprehensive, interdisciplinary exploration of the dark web.
Ideal for security agencies, professionals, counter-terrorism experts, and ……続きを見る
Gives you the superpower to be a healthy skeptic when consuming data and information.
Data Duped is a book about how we are commonly deceived by numbers in our everyday lives. From lotteries, produc……続きを見る
"Nu er der ikke længere nogen vej tilbage. Terningerne er kastet – computerspillet er i gang.
Enten bliver det her mit livs historie, eller jeg må indstille mig på et par år i Horserød. Ikke fordi t……続きを見る
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the sy……続きを見る
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing i……続きを見る
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by ……続きを見る
著者:Jimmy Cai
出版社: Stark Publishing
発売日: 2013年07月30日
What is spyware? What is adware? You’ve probably heard of them because everyone that gets online is either bombarded with information about the products that can help to protect against these ……続きを見る