Built on Fortune 500 experience, this guide delivers hands-on methods to secure generative AI with extensive coverage of RAG, agents, prompt injection, data pipelines, Zero Trust, and sustainable pr……続きを見る
Implementing an Information Security Framework: Ensuring Safe and Secure Learning Environments in K-12 Schools through Proactive Defense Strategies & Continuous Improvement.
This book provides a com……続きを見る
Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to s……続きを見る
著者:Tim Maurer
出版社: Cambridge University Press
発売日: 2018年01月30日
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsors……続きを見る
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, ……続きを見る
Je m’appelle Omar. Je suis marié et père de deux enfants, né à Bruxelles en 1972, à Molenbeek, le même quartier que celui des frères Abdeslam, les types impliqués dans la tuerie du Bataclan. Des fil……続きを見る
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. ……続きを見る
著者:Andrea Simmons
出版社: IT Governance Publishing
発売日: 2023年10月10日
The role of the information security manager has changed. Have you?
The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more un……続きを見る
Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmw……続きを見る
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in tran……続きを見る
Explore the powers of Raspberry Pi and build your very own projects right out of the boxAbout This BookFrom robotics to gaming, this Learning Path will unlock your creativity!Build your own impressi……続きを見る
Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters……続きを見る
著者:Jimmy Song
出版社: O'Reilly Media
発売日: 2019年02月08日
Dive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a ……続きを見る
Use this book to build secure firmware.
As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents t……続きを見る
This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it?
'A must read for anyone looking to upskill their cy……続きを見る
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by ……続きを見る
著者:Jimmy Cai
出版社: Stark Publishing
発売日: 2013年07月30日
What is spyware? What is adware? You’ve probably heard of them because everyone that gets online is either bombarded with information about the products that can help to protect against these ……続きを見る
It seems that every day there's a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States. Today it's simply inexcusable not to ……続きを見る
Windows 8 überzeugt in jeder Beziehung. Dennoch knirscht es hin und wieder hinter der schönen Windows 8-Oberfläche und es treten kleine, aber manchmal auch größere Probleme auf. Das ist der Moment, ……続きを見る
Proven Methods for Building Secure Java-Based Web Applications
Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle P……続きを見る
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privac……続きを見る