著者:George Mansour
出版社: Writes Publishing House
発売日: 2020年05月20日
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.
Are you worried about your family members getting scammed……続きを見る
Expert guide to create Zero Trust digital environments in an AI-everywhere landscape
Rise of the Machines: A Project Zero Trust Story is a continuation of the 2023 bestseller Project Zero Trust, pic……続きを見る
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak. Purchase of the print or Kindle b……続きを見る
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate……続きを見る
Implement industry best practices to identify vulnerabilities and protect your data, models, environment, and applications while learning how to recover from a security breachKey FeaturesLearn about……続きを見る
A internet e as tecnologias associadas tornaram-se omnipresentes nas nossas vidas e desafiam os direitos fundamentais dos cidadãos. Estabelecidos há mais dois séculos para proteger a dignidade human……続きを見る
Dieses Lehrbuch behandelt im ersten Teil schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Ge……続きを見る
Perché dovrebbero attaccare proprio me? Oggi nessuno può considerarsi al sicuro, perché la Cybersecurity riguarda tutti: non è solo un problema tecnico, ma è soprattutto culturale. Gli strumenti inf……続きを見る
Implement Zero Trust initiatives efficiently and effectively
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern……続きを見る
Ob Google, Apple, Yahoo, Microsoft, Facebook oder Twitter: Alle Onlinekonten können vor Hackangriffen gesichert werden - nur machen es viel zu wenige. Dabei ist es so einfach.
Alle wichtigen Onlinek……続きを見る
著者:George Hill
出版社: George Hill publications
発売日: 2017年03月13日
Students of Computer Science & Engineering and Information Technology in general and Computer Networks in particular. It will help them to understand the concept of data communication and modulation……続きを見る
Dieses Lehrbuch behandelt schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewährleistung vo……続きを見る
Geblockte Inhalte nutzen und unerkannt per Tarnkappe surfen
• Daten im offenen WLAN verschlüsselt übertragen
• Die besten VPN-Anbieter im Vergleich: Protokolle, Standorte, Geschwindigkeiten
Unerkann……続きを見る
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key Fe……続きを見る
This book focuses on searching and hands-on experience, which makes the text suitable for those who wish to learn searching for their own use as well. It is intended for those who will act as search……続きを見る
The first comprehensive guide to discovering and preventing attacks on the Android OS
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking rem……続きを見る
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, met……続きを見る