This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the ag……続きを見る
著者:William Easttom
出版社: Springer International Publishing
発売日: 2020年12月22日
This textbook is a practical yet in depth guide to cryptography and its principles and practices. The book places cryptography in real-world security situations using the hands-on information contai……続きを見る
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI……続きを見る
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesse……続きを見る
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students enteri……続きを見る
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discove……続きを見る
著者:William Gamble
出版社: IT Governance Publishing
発売日: 2020年11月10日
The United States DoD (Department of Defense) is one of the largest employers in the world, with about 2.87 million employees. It spends more than a year among more than 350,000 contractors and subc……続きを見る
Mitnick fue el hacker más escurridizo de la historia. Logró colarse en ordenadores y redes de las agencias y compañías más grandes del mundo, aparentemente impenetrables, como Motorola, Sun Microsys……続きを見る
Science has made great strides in modeling space, time, mass and energy. Yet little attention has been paid to the precise representation of the information ubiquitous in nature.Introduction to Evol……続きを見る
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected
Key Features
Investigate the core methods of computer fore……続きを見る
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to prot……続きを見る
What is grokking algorithms? A new kind of algorithm? A new way of doing data science? No. The official definition of grokking is "To understand profoundly through intuition or empathy." It also mea……続きを見る
The perfect introduction to pen testing for all IT professionals and students
· Clearly explains key concepts, terminology, challenges, tools, and skills
· Covers the latest penetration testing stan……続きを見る
All you need to know about defending networks, in one book
· Clearly explains concepts, terminology, challenges, tools, and skills
· Covers key security standards and models for business and governm……続きを見る
Plongez dans l'univers captivant des Chromebooks avec le "Manuel du Débutant Chromebook: Votre guide pour maîtriser les dernières fonctionnalités (édition 2024)". Que vous soyez novice en informatiq……続きを見る
Easy, Powerful Code Security Techniques for Every PHP Developer
Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or ……続きを見る
Best Practices for Comprehensive Oracle Database Security
Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, im……続きを見る
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in……続きを見る
Battlefield Forensics for Persian Gulf States provides an illustrative reference of various weapons, toolmarks, headstamps, and other traits in order to identify the origins of a variety of guns, ca……続きを見る
Python Programming Illustrated Guide For Beginners & Intermediates
Whether you are at a beginner or intermediate level this book is crafted just for you! Learn Python Fundamentals
This is your begin……続きを見る
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this……続きを見る
This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forens……続きを見る
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features • Learn foundational concepts for effective……続きを見る
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison provides guidelines for hardening facilities, training staff, preparing for radicalized-terrorist inmates’ incarceration, and ……続きを見る
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this……続きを見る
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers agains……続きを見る
"This book is a must have resource guide for anyone who wants to ... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solutio……続きを見る
Risk never sleeps for business as cyber-attacks continue to mount against our organizations. The very technology infrastructure that enables new business innovation and creates market value is under……続きを見る