![]() |
Privacy, Security And Forensics in The Internet of Things (IoT)
ISBN: 9783030912208 / Angielski / Miękka / 210 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This book offers a wide range of theoretical and technical solutions to address these challenges. Topics covered in this book include; IoT, privacy, ethics and security, the use of machine learning algorithms in classifying malicious websites, investigation of cases involving cryptocurrency, the challenges police and law enforcement face in policing cyberspace, the use of the IoT in modern terrorism and violent extremism, the challenges of the IoT in view of industrial control...
This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This book offers a wide range of theor...
|
cena:
724,58 |
![]() |
Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust?
ISBN: 9781032185163 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger. This book will use practical lessons in Data Integrity, and Trust, and data's business utility.
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...
|
cena:
323,20 |
![]() |
Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust?
ISBN: 9781032185187 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger. This book will use practical lessons in Data Integrity, and Trust, and data's business utility.
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will positi...
|
cena:
220,35 |
![]() |
Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox
ISBN: 9781032263892 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box)...
|
cena:
249,73 |
![]() |
The Zero Trust Framework: Threat Hunting & Quantum Mechanics
ISBN: 9781032492780 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, incl...
|
cena:
274,23 |
![]() |
Secure Software Systems
ISBN: 9781284261158 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
406,51 |
![]() |
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
ISBN: 9781484293188 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intermediate user level
Intermediate user level
|
cena:
231,17 |
![]() |
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
ISBN: 9781801817332 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBook Key Features Master ZAP to protect your systems from different cyber attacks Learn cybersecurity best practices using this step-by-step guide packed with practical examples Implement advanced testing techniques, such as XXE attacks and Java deserialization, on web applications Book DescriptionMaintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book...
Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBo...
|
cena:
194,18 |
![]() |
Cybersecurity in the COVID-19 Pandemic
ISBN: 9780367721435 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data.
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated comp...
|
cena:
102,81 |
![]() |
Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment
ISBN: 9781839381805 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
77,65 |
![]() |
Cybersecurity Design Principles: Building Secure Resilient Architecture
ISBN: 9781839381829 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
109,54 |
![]() |
CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance
ISBN: 9781839381836 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
135,43 |
![]() |
Space-Air-Ground Integrated Network Security
ISBN: 9789819911240 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are...
This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated n...
|
cena:
805,10 |
![]() |
Code-Based Cryptography: 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers
ISBN: 9783031296888 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2...
|
cena:
221,37 |
![]() |
Handbook of Research on Cybersecurity Risk in Contemporary Business Systems
ISBN: 9781668472071 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Global Perspectives on Cybersecurity Risk in Contemporary Business Systems examines current risks...
The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless n...
|
cena:
1505,41 |
![]() |
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
ISBN: 9781718503342 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you'll learn that EDR is not a magical black box - it's just a complex software application built around a few easy-to-understand components. The author uses his years of experience as a red team operator to investigate each of the most common sensor components,...
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that d...
|
cena:
286,79 |
![]() |
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I
ISBN: 9783031305443 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42ndAnnual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric...
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42ndAnnual International Conference on Theory and Applications of...
|
cena:
442,79 |
![]() |
Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings
ISBN: 9783031307300 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..
This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, Franc...
|
cena:
221,37 |
![]() |
Blockchain Technology for Secure Social Media Computing
ISBN: 9781839535437 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
558,76 |
![]() |
Blockchains: A Handbook on Fundamentals, Platforms and Applications
ISBN: 9783031321450 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1207,67 |