Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements yo……続きを見る
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills
Key Features
Practical recipes to conduct effective penetration testing using the latest version of Kali Lin……続きを見る
'An explosive new book' Daily Mail
'[A] careful, comprehensive interrogation of every major Facebook scandal. An Ugly Truth provides the kind of satisfaction you might get if you hired a private inv……続きを見る
Don’t Let the Real Test Be Your First Test!
This fully updated self-study guide offers complete coverage of all eight Certified Information Systems Security Professional exam domains developed by th……続きを見る
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of ad……続きを見る
The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.
Drawing from the rea……続きを見る
Master the art of designing, developing, and operating secure infrastructures on Google CloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-ass……続きを見る
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods cyber-terrorist……続きを見る
Prepare for success on the challenging CASP+ CAS-004 exam
In the newly updated Second Edition of CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004, accomplished cybersecurity ……続きを見る
How can Cloud Foundry help you develop and deploy business-critical applications and tasks with velocity? This practical guide demonstrates how this open source, cloud-native application platform no……続きを見る
Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks and other attacks on surface tran……続きを見る
This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-d……続きを見る
A new edition of Shon Harris’ bestselling exam prep guideーfully updated for the new CISSP 2018 Common Body of Knowledge
This effective self-study guide fully prepares you for the challenging CISSP ……続きを見る
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Rem……続きを見る
As artificial intelligence (AI) becomes more and more woven into our everyday livesーand underpins so much of the infrastructure we rely onーthe ethical, security, and privacy implications require a……続きを見る
A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.
A crash course in modern hacking techniques, Ethical Hacking is alread……続きを見る
NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An importantーand deeply soberingーnew book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter.……続きを見る
Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world.
Key Features
Gain practical insight int……続きを見る
著者:Hans Riesel
出版社: Birkhäuser Boston
発売日: 2015年12月29日
From the original hard cover edition:
In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-d……続きを見る
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust ev……続きを見る
Learn to deploy proven cryptographic tools in your applications and services
Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, includi……続きを見る
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It ……続きを見る
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks
Key Features
Explore blockchain conc……続きを見る
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive i……続きを見る
Are you fascinated by the world of cryptocurrencies and blockchain technology? Do you want to learn how to create your own blockchain from scratch? Look no further! In "Build Your Own Blockchain in ……続きを見る
Ripple versus bitcoin
The battle of the cryptocurrencies
Do want to diversify your bitcoin investments in other cryptocurrencies?
Do you want to invest (more) in ripple and / or bitcoin?
Do you want……続きを見る
This open access book describes the most important legal sources and principles of data privacy and data protection in China, Germany and the United States. The authors collected privacy statements ……続きを見る
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book b……続きを見る
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forens……続きを見る