![]() |
The Active Defender: Immersion in the Offensive Security Mindset
ISBN: 9781119895213 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
118,52 |
![]() |
Auditing IT Infrastructures for Compliance
ISBN: 9781284236606 / Angielski / Miękka / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
406,51 |
![]() |
Asymmetric Cryptography: Primitives and Protocols
ISBN: 9781789450965 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
644,44 |
![]() |
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity
ISBN: 9783031219191 / Angielski / Twarda / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the...
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the...
|
cena:
684,33 |
![]() |
Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers
ISBN: 9789811982842 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022.The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China,...
|
cena:
160,99 |
![]() |
Frontiers in Cyber Security: 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings
ISBN: 9789811984440 / Angielski / Miękka / 430 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022.The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, du...
|
cena:
362,27 |
![]() |
Security Strategies in Linux Platforms and Applications
ISBN: 9781284255850 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
406,51 |
![]() |
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies
ISBN: 9781484290354 / Angielski / Miękka / 570 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Beginning-Intermediate user level
Beginning-Intermediate user level
|
cena:
152,93 |
![]() |
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World
ISBN: 9781668452509 / Angielski / Twarda / 508 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. The book also explores methods and algorithms of learning for implementing better security methods in fields such as business and healthcare.
Discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks...
|
cena:
1660,07 |
![]() |
Cybersecurity Issues, Challenges, and Solutions in the Business World
ISBN: 9781668458273 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application...
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or...
|
cena:
1355,90 |
![]() |
Cybersecurity Issues, Challenges, and Solutions in the Business World
ISBN: 9781668458280 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application...
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or...
|
cena:
1020,79 |
![]() |
Mastering Malware Analysis - Second Edition: A malware analyst\'s practical guide to combating malicious software, APT, cybercrime, and IoT attacks
ISBN: 9781803240244 / Angielski / Miękka / 572 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn effective malware analysis tactics to prevent your systems from getting infected Key Features Investigate cyberattacks and prevent malware-related incidents from occurring in the future Learn core concepts of static and dynamic malware analysis, memory forensics, decryption, and much more Get practical guidance in developing efficient solutions to handle malware incidents Book DescriptionNew and developing technologies inevitably bring new types of malware with them, creating a huge demand for IT professionals that can keep malware at bay. With the help of this updated second edition...
Learn effective malware analysis tactics to prevent your systems from getting infected Key Features Investigate cyberattacks and prevent malware-rel...
|
cena:
237,33 |
![]() |
Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating
ISBN: 9781803248776 / Angielski / Miękka / 570 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape Key Features Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and more Explore the latest tools for ethical hacking, pentesting, and Red/Blue teaming Includes recent real-world examples to illustrate the best practices to improve security posture Book DescriptionCybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat...
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape Key Features Updated for r...
|
cena:
181,23 |
![]() |
Provable and Practical Security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11–12, 2022, Proceedings
ISBN: 9783031209161 / Angielski / Miękka / 291 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022.The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.
This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in Nov...
|
cena:
261,63 |
![]() |
Searchable Encryption: From Concepts to Systems
ISBN: 9783031213762 / Angielski / Twarda / 170 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from...
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality ...
|
cena:
563,56 |
![]() |
Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings
ISBN: 9783031222948 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 – December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during No...
|
cena:
301,89 |
![]() |
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I
ISBN: 9783031223174 / Angielski / Miękka / 743 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;...
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryp...
|
cena:
442,79 |
![]() |
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part III
ISBN: 9783031223679 / Angielski / Miękka / 245 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;...
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryp...
|
cena:
261,63 |
![]() |
Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings
ISBN: 9783031223891 / Angielski / Miękka / 510 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in ...
|
cena:
322,01 |
![]() |
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control
ISBN: 9780367647452 / Angielski / Miękka / 186 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book sheds light upon the security threats, defenses, and remediation on various networking and data processing domains including wired networks, wireless networks, mobile ad hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.
This book sheds light upon the security threats, defenses, and remediation on various networking and data processing domains including wired networks,...
|
cena:
205,65 |