A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybers……続きを見る
Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating i……続きを見る
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to su……続きを見る
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption softw……続きを見る
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book co……続きを見る
Did you know that your Ubuntu system could be configured to act as an immensely powerful router? Surprised? Read on to discover how to achieve this with just a few simple steps.
続きを見る
Cryptography is hard, but it’s less hard when it’s filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption an……続きを見る
Will the world’s next war be fought in cyberspace?
"It's going to happen," said former National Defense University Professor Dan Kuehl. So much of the world’s activity takes place on the internet no……続きを見る
著者:Satoshi Nakamoto
出版社: Antonio Tombolini Editore
発売日: 2014年12月10日
Original annotated and commented edition of the masterpiece of the mysterious Satoshi Nakamoto, inventor of Bitcoin, the digital currency on everyone’s lips.
However, few noticed that the innovative……続きを見る
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace alo……続きを見る
Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks
Key Features
Leverage best practices and emerging technologies to effecti……続きを見る
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, po……続きを見る
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb'……続きを見る
Computer thieves are everywhere and most of them are untraceable for weeks - months maybe. Learning to add computer security will ensure that all sensitive information stored online are kept safe. T……続きを見る
This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security.……続きを見る
Statistics about identity theft from the Federal Trade Commission (FTC) are staggering. The FTC now says that as many as one in every eight adults and one in every four households has been victimize……続きを見る
著者:Satoshi Nakamoto
出版社: Antonio Tombolini Editore
発売日: 2014年12月05日
Edizione originale, tradotta, annotata e commentata, del capolavoro del misterioso Satoshi Nakamoto, inventore di Bitcoin, la moneta elettronica sulla bocca di tutti.
In pochi, però, hanno notato ch……続きを見る
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-manag……続きを見る