Biomedical systemsーsuch as pacemakers and automated insulin pumpsーare Cyber-Physical Systems (CPSs) that must operate safely and reliably at all times. This book introduces a systematic design met……続きを見る
Learn everything you need to know about perfecting your home network in one simple guide.
Do you need to build or upgrade your home network, but aren't sure where to begin? Would you like your home ……続きを見る
Cybercriminals can ruin your lifeーthis book teaches you to stop them before they can.
Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It's important to learn t……続きを見る
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while s……続きを見る
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with s……続きを見る
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and……続きを見る
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of ad……続きを見る
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers agains……続きを見る
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to prot……続きを見る
El objetivo de este libro es analizar la seguridad informática, desde el punto de vista de la víctima, descubrir cuáles son sus debilidades ante los cambios tecnológicos en el mundo, sobre todo cono……続きを見る
This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications w……続きを見る
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers agains……続きを見る
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to prot……続きを見る
Over the past two decades, the booming ecommerce and fintech industries have become a breeding ground for fraud. Organizations that conduct business online are constantly engaged in a cat-and-mouse ……続きを見る
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether.……続きを見る
Unleash the power of Python scripting to execute effective and efficient penetration testsAbout This BookSharpen your pentesting skills with PythonDevelop your fluency with Python to write sharper s……続きを見る
著者:L Mohan Arun
出版社: L Mohan Arun
発売日: 2015年11月04日
In this book you'll learn how to:
Be able to tell whether your website is infected by script injection attack.
Fix your own website when a script injection attack is detected.
Save hundreds of dolla……続きを見る
著者:Ben Buchanan
出版社: Harvard University Press
発売日: 2020年02月25日
“A must-read…It reveals important truths.”
ーVint Cerf, Internet pioneer
“One of the finest books on information security published so far in this centuryーeasily accessible, tightly argued, superbl……続きを見る
著者:Stanley Shanapinda
出版社: Springer International Publishing
発売日: 2020年10月01日
This book outlines the legal powers of a major Western nation – Australia – to collect and use location information. Mobile service and social media service providers now have the ability to track, ……続きを見る
About This Book
Learn wireless penetration testing with Kali Linux; Backtrack's evolution
Detect hidden wireless networks and discover their names
Explore advanced Wi-Fi hacking techniques includin……続きを見る