Télécharger le livre :  From Digital Traces to Algorithmic Projections
From Digital Traces to Algorithmic Projections describes individual digital fingerprints in interaction with the different algorithms they encounter throughout life. Centered on the human user, this formalism makes it possible to distinguish the voluntary projections of...

Editeur : Iste Press - Elsevier
Parution : 2018-09-07
epub sans DRM

73,80

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists...

Editeur : Sybex
Parution : 2018-08-31
PDF, ePub

37,98

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Firewalls Don't Stop Dragons
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is...

Editeur : Apress
Parution : 2018-08-24
PDF, ePub

39,43

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT-Sicherheit mit System
Durch die digitale Transformation, Cloud-Computing und dynamisch steigende Bedrohungen sind die Effizienz, Existenz und Zukunft eines Unternehmens mehr denn je abhängig von der Sicherheit,  Kontinuität sowie den Risiken der Informationsverarbeitung. Die...

Editeur : Springer Vieweg
Parution : 2018-08-20
PDF

70,67

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Open Source Intelligence Methods and Tools
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism...

Editeur : Apress
Parution : 2018-06-30
PDF

56,19

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT-Risikomanagement von Cloud-Services in Kritischen Infrastrukturen
Der Einsatz von Cloud-Services birgt neben vielfältigen Vorteilen auch Risiken für die IT-Sicherheit von Unternehmen. Dies gilt insbesondere für Betreiber Kritischer Infrastrukturen, die durch das IT-Sicherheitsgesetz dazu verpflichtet werden, ihre IT besser vor...

Editeur : Springer Vieweg
Parution : 2018-06-28
Collection : essentials PDF

4,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Advances in Human Factors in Cybersecurity
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2018-06-23
Collection : Advances in Intelligent Systems and Computing PDF, ePub

147,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Asset Attack Vectors
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...

Editeur : Apress
Parution : 2018-06-15
PDF

46,34

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Resilience of Systems and Networks
This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government.  Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security  - which is...

Editeur : Springer
Parution : 2018-05-30
PDF, ePub

116,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Security Monitoring
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the...

Editeur : Wiley
Parution : 2018-03-13
PDF, ePub

45,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WHAT IF ARTIFICIAL INTELLIGENCE COULD MAKE US MORE HUMAN?
The term “arti cial intelligence” conjures up all manner of science- ction style fantasies, from the end of work to machine domination and the extinction of the human race. But what if these fears were largely unfounded? Already a...

Editeur : Débats Publics
Parution : 2018-02-12
PDF sans DRM, epub sans DRM

11,99

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital and Document Examination
The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward. This volume, Digital and Document Examination, will serve as a graduate level text for those studying and teaching digital...

Editeur : Academic Press
Parution : 2018-01-27
epub sans DRM

97,01

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Privileged Attack Vectors
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached....

Editeur : Apress
Parution : 2017-12-08
PDF, ePub

28,47

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Achieving and Sustaining Secured Business Operations
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company...

Editeur : Apress
Parution : 2017-12-07
PDF, ePub

34,50

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Seeking the Truth from Mobile Evidence
Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing...

Editeur : Academic Press
Parution : 2017-11-17
PDF, ePub

68,52

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a HIPAA-Compliant Cybersecurity Program
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The...

Editeur : Apress
Parution : 2017-11-11
PDF, ePub

62,11

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...

Editeur : Springer
Parution : 2017-10-30
PDF, ePub

179,34

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Strategic Cyber Defense
With the increased dependence on digital and internet technologies, cyber security has come to be regarded as a national security issue, and the number of countries with a published cyber security strategy continues to rise. But these national cyber security strategies...

Editeur : SAGE Publications Ltd
Parution : 2017-07-15
PDF

92,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Das IT-Gesetz: Compliance in der IT-Sicherheit
Das Buch bietet konkrete Vorschläge zu Unternehmensrichtlinien und zur IT-Sicherheit, zum sicheren IT-Betrieb und zu sicheren IT-Systemen, zum Management und zur Organisation von IT-Sicherheit sowie zum Schutz von Daten. Es ist damit wertvolles Hilfsmittel für...

Editeur : Springer Vieweg
Parution : 2017-07-10
PDF, ePub

66,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Privacy and Security Using Windows
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.This book...

Editeur : Apress
Parution : 2017-07-02
PDF, ePub

66,05

Téléchargement immédiat
Dès validation de votre commande
<< < 89101112 >