Tous les ebooks security

 
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...

Editeur : Wiley
Parution : 2025-08-26

PDF, ePub

116,00
Télécharger le livre :  Building Effective Privacy Programs
Ajouter à ma liste d'envies
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....

Editeur : Wiley
Parution : 2025-08-15

PDF, ePub

102,86
Télécharger le livre :  Cyber Resilience: Applied Perspectives
Ajouter à ma liste d'envies
Resilience is defined as the ability to recover from or easily adapt to shocks and stresses. Resilience, unlike the concept of security (which is often and incorrectly conflated with resilience) refers to the system's ability to recover or regenerate its performance...

Editeur : Springer
Parution : 2025-07-16

PDF, ePub

179,34
Télécharger le livre :  Unleashing the Power of Blockchain and IoT for Water Informatics
Ajouter à ma liste d'envies
This book explores how technology can enhance water management by promoting transparency, sustainability, and collaborative decision-making. It highlights the potential of the Internet of Things (IoT) and blockchain technologies to address water-related challenges...

Editeur : Springer
Parution : 2025-07-01

PDF, ePub

168,79
Télécharger le livre :  Everyday Cryptography
Ajouter à ma liste d'envies
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in supporting digital security for everyday technologies such as the internet, mobile...

Editeur : OUP Oxford
Parution : 2025-06-27

ePub

38,94
Télécharger le livre :  Navigating Misinformation
Ajouter à ma liste d'envies
Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation...

Editeur : Springer Vieweg
Parution : 2025-06-16

PDF, ePub

126,59
Télécharger le livre :  Cyber Operations
Ajouter à ma liste d'envies
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server...

Editeur : Apress
Parution : 2019-03-01

PDF, ePub

88,73
Télécharger le livre :  Digital Forensics Basics
Ajouter à ma liste d'envies
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather...

Editeur : Apress
Parution : 2019-02-25

PDF, ePub

56,19
Télécharger le livre :  Human Factor Security and Safety
Ajouter à ma liste d'envies
As we navigate an increasingly complex digital landscape, ensuring human factor security and safety has never been more critical. This groundbreaking book offers an innovative perspective by leveraging behavioral computing to address challenges in human factor security...

Editeur : Springer
Parution : 2025-06-04

PDF, ePub

200,44
Télécharger le livre :  Penetrationstests erfolgreich umsetzen
Ajouter à ma liste d'envies
Dieses Buch ist ein Praxisleitfaden für Verantwortliche in Unternehmen, die Pentests erfolgreich umsetzen wollen. Dabei werden aktuelle regulatorische Anforderungen und Herausforderungen ebenso beleuchtet wie die unterstützende Wirkung der KI. Professionelle...

Editeur : Springer Vieweg
Parution : 2025-05-31

PDF, ePub

36,47
Télécharger le livre :  Gamified Tabletop Exercises for Effective Disaster Recovery Testing
Ajouter à ma liste d'envies
Tabletop exercises are a common way to test disaster recovery and business continuity plans, but they can also be some of the most dry and boring meetings any professional can attend. Following a set script with no variation can cause folks to lose interest and question...

Editeur : Apress
Parution : 2025-05-07

PDF, ePub

39,43
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies
Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an...

Editeur : OUP Oxford
Parution : 2025-05-01

PDF

21,89
Télécharger le livre :  Datensicherheit
Ajouter à ma liste d'envies
Die 3. Auflage des Buches bietet eine leicht verständliche Einführung in die technische und organisatorische Datensicherheit anhand vieler praktischer Beispiele und Stichpunkte. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische...

Editeur : Springer Vieweg
Parution : 2025-04-24

PDF, ePub

34,50
Télécharger le livre :  Cybersecurity Education and Training
Ajouter à ma liste d'envies
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into...

Editeur : Springer
Parution : 2025-04-02

PDF, ePub

79,11
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies
Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an...

Editeur : OUP Oxford
Parution : 2025-04-01

ePub

21,89
Télécharger le livre :  Securing Microsoft Azure OpenAI
Ajouter à ma liste d'envies
Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces...

Editeur : Wiley
Parution : 2025-03-11
Collection : Tech Today
PDF, ePub

49,69
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies
Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats...

Editeur : Wiley-Scrivener
Parution : 2025-02-14

PDF, ePub

220,60
Télécharger le livre :  Cybersecurity Awareness
Ajouter à ma liste d'envies
In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense. The book is rich in practical examples and advice, offering strategies for implementation and providing valuable...

Editeur : Springer
Parution : 2025-01-18
Collection : essentials
PDF, ePub

10,54
Télécharger le livre :  A Beginner's Guide To Web Application Penetration Testing
Ajouter à ma liste d'envies
A hands-on, beginner-friendly intro to web application pentesting InA Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book,...

Editeur : Wiley
Parution : 2025-01-07
Collection : Tech Today
PDF, ePub

45,15
Télécharger le livre :  Datensicherung als Teil der IT- und Cybersecurity
Ajouter à ma liste d'envies
Dieses Buch bietet eine umfassende Einführung in die Welt der Datensicherung und führt durch die essenziellen Bereiche – von Bedrohungen bis hin zu praktischen Schutzstrategien. Die digitale Ära macht Daten zum Rückgrat und Wettbewerbsvorteil von Unternehmen, wobei...

Editeur : Springer Gabler
Parution : 2024-12-26

PDF, ePub

39,43
123 >