Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamli……続きを見る
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systemsーenergy production, water, gas, and other vital systemsーbecomes more important, and hea……続きを見る
Portal's ZK-SWAPS white paper, available in ebook format. (Part 1 of 3)
ABSTRACT: In this white paper, we unveil a multilayered system purpose-built for spot trading cryptocurrencies which allows us……続きを見る
The comprehensive A-to-Z guide on network security, fully revised and updated
Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest de……続きを見る
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an o……続きを見る
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by ……続きを見る
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital……続きを見る
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.
N……続きを見る
Many people think of the Smart Grid as a power distribution group built on advanced smart meteringーbut that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new……続きを見る
Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to……続きを見る
Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations
This book offers a comprehensive introduction to the fundamental ……続きを見る
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Concise, ……続きを見る
Master building and integrating secure private networks using OpenVPN About This Book • Discover how to configure and set up a secure OpenVPN • Enhance user experience by using multiple authenticati……続きを見る
Understand the concepts, processes and technologies that will aid in your professional development as a new system administrator. While every information technology culture is specific to its parent……続きを見る
著者:Eric Diehl
出版社: Springer International Publishing
発売日: 2016年12月15日
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentica……続きを見る
著者:Eric F Crist
出版社: Packt Publishing
発売日: 2017年03月17日
Get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and running
About This Book
This is the first book on the market that resolves your issues related to troub……続きを見る
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applicati……続きを見る
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important ne……続きを見る
This SpringerBrief discusses how to develop intelligent systems for cyber attribution regarding cyber-attacks. Specifically, the authors review the multiple facets of the cyber attribution problem t……続きを見る
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstal……続きを見る
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk anal……続きを見る
Your data has already been sold... Get it back.
There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-……続きを見る
Digital health represents the fastest growing sector of healthcare. From internet-connected wearable sensors to diagnostics tests and disease treatments, it is often touted as the revolution set to ……続きを見る
What Do You Think About Cryptocurrencies? The Future or Just a Fad
Even though the cryptocurrency market is known for its volatility, the market is predicted to continue to grow at an astounding rat……続きを見る
For the very first time in the crypto world, cryptocurrency can now be mined on a smartphone!
The vision of Satoshi Nakamoto that created Bitcoin was to create a decentralized digital currency that ……続きを見る
An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and "Cyber Czar" Eric Rosenbach Cyberattacks continue to grow in number, intensity, and sophisti……続きを見る
Get to grips with the latest container examples, Python 3 features, GitLab DevOps, network data analysis, and cloud networking to get the most out of Python for network engineering with the latest e……続きを見る
Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law ……続きを見る
Introdução da segurança de redes Wi-Fi, focada em testes de segurança do protocolo WPS (Wi-Fi Protected Setup). Este e-livro oferece um primeiro passo essencial para entender o processo de teste de ……続きを見る
Power up your network applications with Python programming
Key Features
Master Python skills to develop powerful network applications
Grasp the fundamentals and functionalities of SDN
Design multi-……続きを見る