The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpo……続きを見る
China's information war against the United States is clever technically, broadly applied and successful. The intelligence community in the U.S. has publicly stated this is a kind of war we do not kn……続きを見る
Das Buch bietet konkrete Vorschläge zu Unternehmensrichtlinien und zur IT-Sicherheit, zum sicheren IT-Betrieb und zu sicheren IT-Systemen, zum Management und zur Organisation von IT-Sicherheit sowie……続きを見る
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network secu……続きを見る
People working in our cyber world have access to a wide range of information including sensitive personal or corporate information which increases the risk to it. One of the aspects of the protectio……続きを見る
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or ……続きを見る
著者:John F. Dooley
出版社: Springer Nature Switzerland
発売日: 2023年05月07日
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June ……続きを見る
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management ー including contingency planning, outlining immediate actions, preparing post-breach r……続きを見る
This book advances a theoretically informed realist criminology of computer crime. Looking beyond current strategies of online crime control, this book argues for a new sort of policy that addresses……続きを見る
There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the perf……続きを見る
Master building and integrating secure private networks using OpenVPN About This Book • Discover how to configure and set up a secure OpenVPN • Enhance user experience by using multiple authenticati……続きを見る
The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Tria……続きを見る
著者:Eric F Crist
出版社: Packt Publishing
発売日: 2017年03月17日
Get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and running
About This Book
This is the first book on the market that resolves your issues related to troub……続きを見る
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advant……続きを見る
In Gangs and Organized Crime, George W. Knox, Gregg W. Etter, and Carter F. Smith offer an informed and carefully investigated examination of gangs and organized crime groups, covering street gangs,……続きを見る
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications.……続きを見る
著者:Dietmar P.F. Möller
出版社: Springer International Publishing
発売日: 2020年12月04日
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vuln……続きを見る
CYBERSECURITY AND LOCAL GOVERNMENT
Learn to secure your local government’s networks with this one-of-a-kind resource
In Cybersecurity and Local Government, a distinguished team of researchers delive……続きを見る
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook incl……続きを見る
This book examines how cloud-based services challenge the current application of antitrust and privacy laws in the EU and the US. The author looks at the elements of data centers, the way informatio……続きを見る
This book provides an overview and assessment of the security risks, both manmade and natural, facing the railways and rail networks.
Railroads face significant threats from disasters, but with situ……続きを見る