![]() |
Chaotic Secure Communication: Principles and Technologies
ISBN: 9783110426885 / Angielski / Twarda / 346 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secu...
|
cena:
594,70 |
![]() |
How Privacy Keeps You From Tindering: To swipe or not to swipe!: Privacy and The Law
ISBN: 9781539753223 / Angielski / Miękka / 64 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in detail or do they take all the data that we give them for their own benefit? This book will look at an indepth analysis of Tinder's privacy policy and whether or not it protects our rights. It also gives us a clear understanding of how much information the user is willing to share.
What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in detail or do they take all the data ...
|
cena:
80,92 |
![]() |
Trusted Computing: Principles and Applications
ISBN: 9783110476040 / Angielski / Twarda / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
594,70 |
![]() |
Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, Icgs3 2017, London, Uk, Jan
ISBN: 9783319510637 / Angielski / Miękka / 407 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017. The 32 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on the future of digital forensics; cyber intelligence and operation; information systems security management; systems security, safety, and sustainability; cyber infrastructure protection.
This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held... |
cena:
201,24 |
![]() |
Mobile Payment security analysis Types and Penetration Testing an Security Architecture: Mobile Payment security analysis and Penetration Testing , Pa
ISBN: 9781518877322 / Angielski / Miękka / 166 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this High professional Book with more than 360 references we discusses the different types of technologies used for mobile payment systems, such as: SMS, USSD, WAP, BLE, QR Code, Offline NFC, HCE, P2P-Paid, Cloud Based m-payment, Mobile Wallet. For every type of these payment mobile systems we will show the Security Architecture and Operations we will explain how every type is working and will discuss and analysis the possible security threats for every type also in General we will explain how these systems could be hacked by black hat attackers .we will provide recommendations and Best...
In this High professional Book with more than 360 references we discusses the different types of technologies used for mobile payment systems, such as...
|
cena:
647,39 |
![]() |
Next Generation of Cyber Threats a New Principles in Modern Attacks: The New Principles of Modern Attacks for Pen Testing
ISBN: 9781540614254 / Angielski / Miękka / 66 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
485,54 |
![]() |
Security Breaches and Threat Prevention in the Internet of Things
ISBN: 9781522522966 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
922,53 |
![]() |
Network Security Through Data Analysis: From Data to Action
ISBN: 9781491962848 / Angielski / Miękka / 428 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, the updated second edition of this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It's ideal... Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security re... |
cena:
231,17 |
![]() |
Security, Privacy and Reliability in Computer Communications and Networks
ISBN: 9788793379893 / Angielski / Twarda / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability.
Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the... Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfil...
|
cena:
401,56 |
![]() |
Convergence Security: Journal Volume 1 - 2016
ISBN: 9788793519534 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Convergence security can be defined as the security created by merging the physical and information security or the combining security with other non-IT technologies. Convergence Security Journal is an open access journal dedicated to the publication and discussion of research articles, short communications, and review papers on all areas of convergence security. The primary objective is to publish a high-quality journal with free Internet-based access for researchers and other interested people throughout the world. Papers published by the journal represent important advances of... Convergence security can be defined as the security created by merging the physical and information security or the combining security with other n... |
cena:
145,67 |
![]() |
Python Scapy Dot11: Programacion en Python para pentesters Wi-Fi
ISBN: 9781542748704 / Hiszpański / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
121,18 |
![]() |
Der Paketfilter bei OpenWrt
ISBN: 9781542690645 / Niemiecki / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. OpenWrt bietet sich als alternatives Betriebssystem an fur SOHO-Router, die nicht mehr oder zu selten aktualisiert werden. Aufgrund seiner Modularitat eignet es sich auch fur andere Projekte mit der unterstutzten Hardware. Somit sind die Hurden, einen Router mit OpenWrt zu betreiben, sehr gering. Dabei sollte nicht auer Acht gelassen werden, dass mit einem schlecht gewarteten Router sehr leicht beinahe jeder Zugriff auf die angeschlossenen Netzwerke und die darin enthaltenen Gerate erlangen kann. Hier kann man mit dem in OpenWrt enthaltenen Paketfilter regulierend eingreifen.Wenn man die...
OpenWrt bietet sich als alternatives Betriebssystem an fur SOHO-Router, die nicht mehr oder zu selten aktualisiert werden. Aufgrund seiner Modularitat...
|
cena:
80,51 |
![]() |
Mastering Modern Web Penetration Testing
ISBN: 9781785284588 / Angielski / Miękka / 298 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does About This Book This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications Penetrate and secure your web application using various techniques Get this comprehensive reference guide that provides advanced tricks and tools of the trade for seasoned penetration testers Who This Book Is For This book is for security professionals and penetration testers...
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does About This Book This book cover...
|
cena:
211,44 |
![]() |
Kali Linux 2 - Assuring Security by Penetration Testing, Third Edition: Achieve the gold standard in penetration testing with Kali using this masterpi
ISBN: 9781785888427 / Angielski / Miękka / 572 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
211,44 |
![]() |
Mastering Metasploit, Second Edition
ISBN: 9781786463166 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Instant Citrix Security How-to
ISBN: 9781849686723 / Angielski / Miękka / 74 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
116,49 |
![]() |
Instant Java Password and Authentication Security
ISBN: 9781849697767 / Angielski / Miękka / 38 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
129,43 |
![]() |
Cybersecurity and Privacy - Bridging the Gap
ISBN: 9788793519664 / Angielski / Twarda / 238 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The huge potential in future connected services hinges on the precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is appearing increasingly on the agenda at both the company and individual level.
Cybersecurity and Privacy - Bridging the Gap addresses two very complex fields of the digital world: cybersecurity and privacy. These multifaceted and multidisciplinary issues are usually understood and valued differently by different individuals, data holders, and legal bodies, but a change in one field immediately... The huge potential in future connected services hinges on the precondition that privacy and security needs are dealt with in order for new services to...
|
cena:
352,59 |
![]() |
Computer and Information Security Handbook
ISBN: 9780128038437 / Angielski / Twarda / 1280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their... Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available ... |
cena:
499,57 |
![]() |
Security Solutions for AWS: Understanding Network Security and Performance Monitoring for Amazon Web Services
ISBN: 9780947480554 / Angielski / Miękka / 52 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
40,26 |