Portal's ZK-SWAPS white paper, available in ebook format. (Part 1 of 3)
ABSTRACT: In this white paper, we unveil a multilayered system purpose-built for spot trading cryptocurrencies which allows us……続きを見る
In corporate security today, while the topic of information technology (IT) security metrics has been extensively covered, there are too few knowledgeable contributions to the significantly larger f……続きを見る
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the ……続きを見る
著者:George Christou
出版社: Palgrave Macmillan UK
発売日: 2016年05月24日
Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity p……続きを見る
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why as……続きを見る
In Gangs and Organized Crime, George W. Knox, Gregg W. Etter, and Carter F. Smith offer an informed and carefully investigated examination of gangs and organized crime groups, covering street gangs,……続きを見る
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.
Are you worried about your family members getting scammed……続きを見る
Cryptocurrency Trade 101 is a Book about the electronic trading (Buying and or Selling) of digital assets; it is written to bridge the gap created by the near absence of text material which comprehe……続きを見る
Deepen your understanding of blockchain technology and develop your own blockchain applications. This book provides a thorough review of distribution-based systems on blockchain technology, starting……続きを見る
This book gives a thorough and systematic introduction to Data, Data Sources, Dimensions of Data, Privacy, and Security Challenges associated with Data, Ethics, Laws, IPR Copyright, and Technology L……続きを見る
Cybersecurity risk is a top-of-the-house issue for all organizations. CybertaxーManaging the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage a……続きを見る
There’s a lot of information about big data technologies, but splicing these technologies into an end-to-end enterprise data platform is a daunting task not widely covered. With this practical book,……続きを見る
A fully updated edition of the world’s bestselling computer security book Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating att……続きを見る
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, met……続きを見る
著者:George Hill
出版社: George Hill publications
発売日: 2017年03月13日
Students of Computer Science & Engineering and Information Technology in general and Computer Networks in particular. It will help them to understand the concept of data communication and modulation……続きを見る
Implement Zero Trust initiatives efficiently and effectively
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern……続きを見る
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law affecting information and communication technology (ICT) - in Bulgaria covers ……続きを見る
It is unclear if U.S. policy makers and military leaders fully realize that we have already been thrust into an artificial intelligence (AI) race with authoritarian powers. Today, the United States’……続きを見る
Gangs have long been a social and criminal threat to society. Introduction to Gangs in America explains how gangs are addressed as a criminal justice and public policy problem, providing a student-f……続きを見る
著者:George Curtis
出版社: Taylor & Francis
発売日: 2024年03月02日
Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means. The ……続きを見る
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.……続きを見る
Learn how to pentest your hardware with the most common attract techniques and patterns
Key Features
Explore various pentesting tools and techniques to secure your hardware infrastructure
Protect y……続きを見る