![]() |
Internet of Things Security: Architectures and Security Measures
ISBN: 9789811613746 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference between IoT security and traditional system and data security. It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system... This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, ... |
cena:
724,58 |
![]() |
Proceedings of International Conference on Network Security and Blockchain Technology: Icnsbt 2021
ISBN: 9789811931819 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the... The book is a collection of best selected research papers presented at International Conference on Network Security a... |
cena:
925,87 |
![]() |
Cybersecurity and Identity Access Management
ISBN: 9789811926570 / Angielski / Twarda / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
442,79 |
![]() |
The Auditor's Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance
ISBN: 9781032078250 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
186,06 |
![]() |
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
ISBN: 9781032206080 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
205,65 |
![]() |
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
ISBN: 9781032206073 / Angielski / Twarda / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
372,18 |
![]() |
Cybersecurity for Artificial Intelligence
ISBN: 9783030970864 / Angielski / Twarda / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a...
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in ...
|
cena:
644,07 |
![]() |
Intelligent Communication Technologies and Virtual Mobile Networks: Proceedings of ICICV 2022
ISBN: 9789811918438 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10–11, 2022. The book shares knowledge and results in theory, methodology and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data...
The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held...
|
cena:
1006,38 |
![]() |
Information Centric Networks (Icn): Architecture & Current Trends
ISBN: 9783030467388 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover,... This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm... |
cena:
684,33 |
![]() |
6g Security and Privacy: A Comprehensive Guide
ISBN: 9781119875406 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
525,86 |
![]() |
The Cybersecurity Body of Knowledge: The Acm/Ieee/Ais/Ifip Recommendations for a Complete Curriculum in Cybersecurity
ISBN: 9781032400211 / Angielski / Miękka / 614 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every... The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the disc... |
cena:
205,65 |
![]() |
Multi-Fractal Traffic and Anomaly Detection in Computer Communications
ISBN: 9781032408460 / Angielski / Twarda / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
376,30 |
![]() |
Cognitive Risk
ISBN: 9781032039091 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
563,24 |
![]() |
Cognitive Risk
ISBN: 9781032039114 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
176,27 |
![]() |
Cybersecurity Analytics
ISBN: 9781032401003 / Angielski / Miękka / 340 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email detector, or just interested in finding patterns in your datasets? This book can let you do it on your own. Numerous examples and datasets links are included so that the reader can "learn by doing." Anyone with a basic college-level calculus course and some probability knowledge...
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecuri...
|
cena:
244,84 |
![]() |
Learn Wireshark - Second Edition: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark
ISBN: 9781803231679 / Angielski / Miękka / 606 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn Wireshark provides an overview of protocol analysis. You'll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export, and share captures, create graphs, and become more proficient in troubleshooting latency issues.
Learn Wireshark provides an overview of protocol analysis. You'll become more confident in navigating the interface while examining protocols such as ...
|
cena:
202,81 |
![]() |
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr
ISBN: 9781803236544 / Angielski / Miękka / 816 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With this edition, you'll be able to secure your company's data and users in today's threat landscape. This book will help you to holistically approach the method of securing your Windows environment, with best practice recommendations, real-world scenarios, and by guiding you through implementing a zero-trust multi-layered approach.
With this edition, you'll be able to secure your company's data and users in today's threat landscape. This book will help you to holistically approac...
|
cena:
237,33 |
![]() |
Deep Dive: Exploring the Real-world Value of Open Source Intelligence
ISBN: 9781119933243 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
176,09 |
![]() |
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions
ISBN: 9783031158926 / Angielski / Miękka / 48 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry. By implementing innovative deep learning solutions, cybersecurity researchers, students and practitioners can analyze patterns and learn how to prevent cyber-attacks and respond to changing malware behavior. The knowledge and tools introduced in this brief can also assist cybersecurity teams to become more proactive in preventing threats and responding to active attacks in real time....
This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and s...
|
cena:
221,37 |
![]() |
Artificial Intelligence and National Security
ISBN: 9783031067082 / Angielski / Twarda / 230 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses...
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties...
|
cena:
442,79 |