This book is your ticket to the Dark Web and OSINT world. It traces OSINT’s roots from WWII to today. It explains the Dark Web’s start with Tor in 2002. You’ll learn about Surface, Deep, and Dark We……続きを見る
This book is your ticket to the Dark Web and OSINT world. It traces OSINT's roots from WWII to today. It explains the Dark Web's start with Tor in 2002. You'll learn about Surface, Deep, and Dark We……続きを見る
The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Prepar……続きを見る
Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors com……続きを見る
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement……続きを見る
A New Dawn in Digital Wealth Awaits
In the rapidly evolving world of finance, a monumental shift is underway–one that promises to redefine how we perceive money and value. "Crypto Revolution: Unrave……続きを見る
The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics info……続きを見る
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create h……続きを見る
This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mat……続きを見る
Biometrics are used in many situations of our daily lives, but we still don’t fully understand the way they work and what potential lies behind them. This book covers a fascinating and broad area th……続きを見る
This book is a comprehensive resource designed to demystify the complex world of data governance for professionals across various sectors. This guide provides in-depth insights, methodologies, and b……続きを見る
Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contra……続きを見る
著者:Mario Guerra
出版社: Editorial Ra-Ma
発売日: 2021年11月15日
Forense Digital es una disciplina que combina elementos legales, informáticos y de telecomunicaciones orientados a la identificación, recolección y análisis de evidencias digitales, preservando la c……続きを見る
著者:Mario Guerra
出版社: Editorial Ra-Ma
発売日: 2023年06月15日
“Si conoces a tu enemigo y te conoces a ti mismo, no temerás el resultado de cien batallas. Si te conoces a ti mismo, pero no al enemigo, por cada victoria obtenida, también sufrirás una derrota. Si……続きを見る
著者:Mario Guerra
出版社: Editorial Ra-Ma
発売日: 2018年12月10日
Se considera malware cualquier tipo de software dañino contra el normal funcionamiento de un dispositivo, aplicación o red. Dentro del término malware se engloban virus, troyanos, gusanos, backdoors……続きを見る
En la actualidad nadie duda que la información se ha convertido en uno de los activos principales de las empresas, representando las tecnologías y los sistemas relacionados con la información su pri……続きを見る
Explore IoT’s powerful transformation of finance, including banking and cryptocurrencies, its security concerns, and role in predictive analysis.
続きを見る
eBook: Jornada Segurança da Informação: unindo visão executiva e técnica para estratégia, comportamento, inovação e tendências Esta obra foi desenvolvida por 21 profissionais atuantes no setor da Se……続きを見る
This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U……続きを見る
VirtualBox for Beginners
Dive into the transformative world of IT with “VirtualBox for Beginners,” a comprehensive guide designed to demystify the complexities of virtualization. Over the past decad……続きを見る
著者:Mario Guerra Soto
出版社: RA-MA, S.A. Editorial y Publicaciones
発売日: 2024年01月16日
Forense Digital es una disciplina que combina elementos legales, informáticos y de telecomunicaciones orientados a la identificación, recolección y análisis de evidencias digitales, preservando la c……続きを見る
著者:Mario Guerra Soto
出版社: RA-MA, S.A. Editorial y Publicaciones
発売日: 2024年01月23日
Se considera malware cualquier tipo de software dañino contra el normal funcionamiento de un dispositivo, aplicación o red. Dentro del término malware se engloban virus, troyanos, gusanos, backdoors……続きを見る
著者:Mario Guerra Soto
出版社: RA-MA, S.A. Editorial y Publicaciones
発売日: 2024年01月23日
Forense Digital es una disciplina que combina elementos legales, informáticos y de telecomunicaciones orientados a la identificación, recolección y análisis de evidencias digitales, preservando la c……続きを見る
著者:Mario Guerra Soto
出版社: RA-MA, S.A. Editorial y Publicaciones
発売日: 2024年01月23日
“Si conoces a tu enemigo y te conoces a ti mismo, no temerás el resultado de cien batallas. Si te conoces a ti mismo, pero no al enemigo, por cada victoria obtenida, también sufrirás una derrota. Si……続きを見る
This important reference work is an extensive resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and i……続きを見る
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new t……続きを見る
Start making the most of the latest collaboration tools in Microsoft 365ーincluding Teams, SharePoint, Power Apps, Power BI, Power Automate, Microsoft Groups, Office ProPlus, Yammer, Planner, Stream……続きを見る
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far un……続きを見る
I numeri dicono molto: in Italia si parla di 25 mila furti d’identità e 11 mila reati informatici denunciati ogni anno, oltre 100 mila vittime di virus informatici, mentre un milione di nuovi malwar……続きを見る
CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field
As technology contin……続きを見る