![]() |
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
ISBN: 9781098117696 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
215,75 |
![]() |
The DevSecOps Playbook: Deliver Continuous Security at Speed
ISBN: 9781394169795 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
128,84 |
![]() |
Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English
ISBN: 9781484286272 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s...
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT manager...
|
cena:
231,17 |
![]() |
Security in Computing
ISBN: 9780137891214 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
479,26 |
![]() |
Computer Security - Esorics 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, P
ISBN: 9783031171451 / Angielski / Miękka / 741 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital...
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 202...
|
cena:
201,24 |
![]() |
Security Testing with Raspberry Pi, Second Edition
ISBN: 9798355202507 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
102,36 |
![]() |
Advanced Security Testing with Kali Linux
ISBN: 9798402350977 / Angielski / Miękka / 750 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
182,08 |
![]() |
Applied Cryptography and Network Security Workshops: Acns 2022 Satellite Workshops, Aiblock, Aihws, Aiots, Cimss, Cloud S&p, Sci, Secmt, Simla, Rome,
ISBN: 9783031168147 / Angielski / Miękka / 622 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: - AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security - AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security - AIoTS: 4th ACNS...
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Sec...
|
cena:
201,24 |
![]() |
Computer Security - ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, P
ISBN: 9783031171420 / Angielski / Miękka / 816 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital...
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 202...
|
cena:
201,24 |
![]() |
Computer Security - Esorics 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, P
ISBN: 9783031171390 / Angielski / Miękka / 723 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital...
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 202...
|
cena:
342,14 |
![]() |
5G Cyber Risks and Mitigation
ISBN: 9781032206127 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. 5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key role in mitigating these risks.
5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be...
|
cena:
587,73 |
![]() |
Big Data Analytics in Fog-Enabled IoT Networks: Towards a Privacy and Security Perspective
ISBN: 9781032206448 / Angielski / Twarda / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies like machine/deep learning, federated learning, blockchain, edge computing and the countermeasures to overcome the vulnerabilities of the Fog-enabled IoT system.
This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies ...
|
cena:
587,73 |
![]() |
Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
ISBN: 9781789953480 / Angielski / Miękka / 580 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Get to grips with network-based attacks and learn to defend your organization's network and network devices Key Features Exploit vulnerabilities and use custom modules and scripts to crack authentication protocols Safeguard against web, mail, database, DNS, voice, video, and collaboration server attacks Monitor and protect against brute-force attacks by implementing defense mechanisms Book DescriptionWith the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the...
Get to grips with network-based attacks and learn to defend your organization's network and network devices Key Features Exploit vulnerabilities and...
|
cena:
224,39 |
![]() |
Secure Multi-Party Computation Against Passive Adversaries
ISBN: 9783031121630 / Angielski / Twarda / 231 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC...
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious mode...
|
cena:
221,37 |
![]() |
Innovative Security Solutions for Information Technology and Communications: 14th International Conference, SecITC 2021, Virtual Event, November 25–26, 2021, Revised Selected Papers
ISBN: 9783031175091 / Angielski / Miękka / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.The 22 full papers included in this book were carefully reviewed and selected from 40 submissions. They deal with emergent topics in security and privacy from different communities.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative S...
|
cena:
201,24 |
![]() |
Smart Cities: Cyber Situational Awareness to Support Decision Making
ISBN: 9783031184635 / Angielski / Twarda / 129 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment.This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic...
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerate...
|
cena:
644,07 |
![]() |
Cryptology and Network Security: 21st International Conference, Cans 2022, Abu Dhabi, United Arab Emirates, November 13-16, 2022, Proceedings
ISBN: 9783031209734 / Angielski / Miękka / 391 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 21stInternational Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and...
This book constitutes the refereed proceedings of the 21stInternational Conference on Cryptology and Network Security, CANS 2022, which was held durin...
|
cena:
301,89 |
![]() |
Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings
ISBN: 9789811972416 / Angielski / Miękka / 366 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field’s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy...
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, whic...
|
cena:
201,24 |
![]() |
Developing Cybersecurity Programs and Policies in an AI-Driven World
ISBN: 9780138074104 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
393,30 |
![]() |
Trust, Privacy and Security in Digital Business: 19th International Conference, Trustbus 2022, Vienna, Austria, August 24, 2022, Proceedings
ISBN: 9783031179259 / Angielski / Miękka / 97 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust; Privacy; Security; Digital business; GDPR; Authenticity-enhancing technologies; Internet of Things; Intrusion detection;...
This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, ...
|
cena:
221,37 |