![]() |
Hacking and Security
ISBN: 9781493224258 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, with step-by-step instructions. With information on mobile, cloud, and IoT security you can fortify your system against any threat!
Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where y...
|
cena:
231,02 |
![]() |
Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings
ISBN: 9783031255373 / Angielski / Miękka / 799 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings.The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).
This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings.The...
|
cena:
483,04 |
![]() |
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
ISBN: 9781803234984 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threats Key Features Get up to speed with the ins and outs of cybercriminal activity on the dark web Become familiar with the tools and techniques that are used to fight serious crime Gain a keen understanding of the crime ecosystem on the dark web and the best practices to keep it in check Book DescriptionIn today's world, the crime-prevention landscape is impossible to navigate. The dark web means new...
Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools...
|
cena:
151,01 |
![]() |
Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography
ISBN: 9781032213194 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security.
The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique an...
|
cena:
636,71 |
![]() |
The Psychology of Insider Risk: Detection, Investigation and Case Management
ISBN: 9781032482446 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Clinical Psychologist and former intelligence officer Eric Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. It also outlines the many current and future challenges insider risk professionals face.
Clinical Psychologist and former intelligence officer Eric Shaw brings over 30 years of psychological consultation experience to the national security...
|
cena:
612,21 |
![]() |
The Psychology of Insider Risk: Detection, Investigation and Case Management
ISBN: 9781032482484 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Clinical Psychologist and former intelligence officer Eric Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. It also outlines the many current and future challenges insider risk professionals face.
Clinical Psychologist and former intelligence officer Eric Shaw brings over 30 years of psychological consultation experience to the national security...
|
cena:
235,04 |
![]() |
Access Control Models and Architectures For IoT and Cyber Physical Systems
ISBN: 9783030810917 / Angielski / Miękka / 173 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS.The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also...
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretic...
|
cena:
603,81 |
![]() |
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers
ISBN: 9783031265525 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022.The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis,Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Be...
|
cena:
322,01 |
![]() |
The Little Handbook of DFIR: Just some thoughts about Digital Forensics and Incident Response!
ISBN: 9798371735119 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
80,88 |
![]() |
Cybersecurity for Decision Makers
ISBN: 9781032334967 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory w...
|
cena:
636,71 |
![]() |
Cybersecurity for Decision Makers
ISBN: 9781032334974 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory w...
|
cena:
249,73 |
![]() |
Network Programmability and Automation: Skills for the Next-Generation Network Engineer
ISBN: 9781098110833 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. The updated second edition of this practical guide shows network engineers how to use a range of technologies and tools, including Linux, Python, APIs, and Git, to automate systems through code. This edition also includes brand new topics such as network development environments, cloud and programming with Go.
The updated second edition of this practical guide shows network engineers how to use a range of technologies and tools, including Linux, Python, APIs...
|
cena:
231,17 |
![]() |
Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization
ISBN: 9781801072472 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Build a blue team for efficient cyber threat management in your organization Key Features Explore blue team operations and understand how to detect, prevent, and respond to threats Dive deep into the intricacies of risk assessment and threat management Learn about governance, compliance, regulations, and other best practices for blue team implementation Book DescriptionWe've reached a point where all organizational data is connected through some network. With advancements and connectivity comes ever-evolving cyber threats - compromising sensitive data and access to vulnerable systems....
Build a blue team for efficient cyber threat management in your organization Key Features Explore blue team operations and understand how to detect,...
|
cena:
151,01 |
![]() |
Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices
ISBN: 9783031268441 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for...
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning,...
|
cena:
322,01 |
![]() |
Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server
ISBN: 9798987508909 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
56,06 |
![]() |
Learn AAVE DeFi Protocol: 100+ Coding Q&A
ISBN: 9798374587180 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
80,88 |
![]() |
Cybersecurity Jobs & Career Paths
ISBN: 9798215089323 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
58,49 |
![]() |
Cybersecurity Jobs: Resume Marketing
ISBN: 9798215925676 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
99,23 |
![]() |
Auditing It Infrastructures for Compliance with Cloud Labs
ISBN: 9781284249156 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
489,77 |