Ceh V12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
ISBN: 9781394186921 / Angielski / Miękka / 704 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
228,04 zł |
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud
ISBN: 9781803233581 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture management, and zero trust for your hybrid cloud deployments Key Features Secure cloud infrastructure, applications, data, and shift left security to create DevSecOps Explore patterns for continuous security, automated threat detection and accelerated incident response Leverage hybrid cloud security patterns for protecting critical data using a zero trust model Purchase of the print or Kindle book includes a free eBook in the PDF format Book...
Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture ma...
|
|
cena:
225,47 zł |
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
ISBN: 9781803243771 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks Key Features Leverage best practices and emerging technologies to effectively audit a cloud environment Get better at auditing and unlock career opportunities in cloud audits and compliance Explore multiple assessments of various features in a cloud environment to see how it's done Book DescriptionAs more and more companies are moving to cloud and multi-cloud environments, being able to assess the compliance of these environments properly is becoming more important....
Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks Key Features Leverage be...
|
|
cena:
215,87 zł |
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
ISBN: 9789811685880 / Angielski / Miękka / 230 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a...
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such...
|
|
cena:
585,00 zł |
Computational Intelligence for Cybersecurity Management and Applications
ISBN: 9781032335032 / Angielski / Twarda / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
509,67 zł |
Cybersecurity Essentials Made Easy: A No-Nonsense Guide to Cyber Security For Beginners
ISBN: 9798370744891 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
71,93 zł |
Information Security and Privacy in Smart Devices: Tools, Methods, and Applications
ISBN: 9781668459911 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In recent years, smart devices have become commonplace in our daily lives. On the internet of things (IoT), these devices powered new intelligent services. Their application enabled the rise of intelligent cities, smart agriculture, and Industry 4.0. However, smart devices collect and share large amounts of data, including the habits and preferences of their users. Cybersecurity incidents in intelligent environments may impact services used by millions across the world and make private information public. Information Security and Privacy in Smart Devices: Tools, Methods, and Applications...
In recent years, smart devices have become commonplace in our daily lives. On the internet of things (IoT), these devices powered new intelligent serv...
|
|
cena:
1424,43 zł |
Social Networking Sites, Body Image and Wellbeing: The Roles of Social
ISBN: 9781805240853 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
325,54 zł |
Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons
ISBN: 9781977410207 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
142,44 zł |
Computer Hacking: Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen
ISBN: 9783662670293 / Niemiecki Termin realizacji zamówienia: ok. 5-8 dni roboczych. Technische Maßnahmen, die es Cyberangreifern schwer machen, dienen zur Abschreckung, weil Hacker immer nur so hoch springen, wie sie müssen. Bei komplexen und vor allem sicherheitsrelevanten IT-Infrastrukturen reichen diese technischen Maßnahmen allein jedoch oft nicht aus.Dieses Lehrbuch betrachtet alle Aspekte der IT-Sicherheit und effektive Maßnahmen, um Angriffe zu detektieren und sich erfolgreich dagegen zu wehren.Es behandelt allgemeine Angriffsmechanismen und Angriffsszenarien, die von Angreifern angewendet werden. Dabei soll klar werden, dass es nicht ausreichend ist,...
Technische Maßnahmen, die es Cyberangreifern schwer machen, dienen zur Abschreckung, weil Hacker immer nur so hoch springen, wie sie müssen. Bei kom...
|
|
cena:
138,50 zł |
Security-First Compliance for Small Businesses
ISBN: 9780367652456 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. It has practical solutions for businesses to create "cybersustainable" security-focused policies, processes, and controls to protect today’s future for tomorrow’s digital ecosystem.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance ...
|
|
cena:
560,70 zł |
Security-First Compliance for Small Businesses
ISBN: 9781032550725 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. It has practical solutions for businesses to create "cybersustainable" security-focused policies, processes, and controls to protect today’s future for tomorrow’s digital ecosystem.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance ...
|
|
cena:
229,32 zł |
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
ISBN: 9781837630516 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Discover security techniques to prevent malware from infecting a Linux system, and detect it Prevent unauthorized people from breaking into a Linux system Protect important and sensitive data from being revealed to unauthorized persons Book DescriptionThe third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest...
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Purchase of the print...
|
|
cena:
239,85 zł |
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance
ISBN: 9781839381843 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
191,88 zł |
Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide
ISBN: 9783031292682 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA.Today’s cyber defense tools are mostly...
This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book...
|
|
cena:
623,99 zł |
Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox
ISBN: 9781032263885 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box)...
|
|
cena:
560,70 zł |
A Proactive Network Surveillance Framework
ISBN: 9782534887944 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
188,50 zł |
CompTIA CySA+ Study Guide: Exam CS0-003
ISBN: 9781394182909 / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
245,22 zł |
Behavioral Game Theory Analysis of Cybersecurity With Deception and Ids
ISBN: 9785288350108 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
132,76 zł |
Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022
ISBN: 9789819922284 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream...
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PS...
|
|
cena:
858,01 zł |