Télécharger le livre :  Computer-Supported Collaboration
Ajouter à ma liste d'envies
Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality...

Editeur : Wiley-IEEE Press
Parution : 2024-05-24
Collection : IEEE Press Series on Human-Machine Systems
PDF

112,78
Télécharger le livre :  Designing to FIPS-140
Ajouter à ma liste d'envies
This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs...

Editeur : Apress
Parution : 2024-04-25

PDF, ePub

64,08
Télécharger le livre :  Implementation and Analysis of Ciphers in Quantum Computing
Ajouter à ma liste d'envies
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an...

Editeur : Springer
Parution : 2024-04-17

PDF, ePub

147,69
Télécharger le livre :  Identity Attack Vectors
Ajouter à ma liste d'envies
Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their...

Editeur : Apress
Parution : 2024-03-30

PDF, ePub

62,11
Télécharger le livre :  The Extended Reality Blueprint
Ajouter à ma liste d'envies
Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...

Editeur : Wiley
Parution : 2024-03-26

PDF, ePub

34,60
Télécharger le livre :  Stepping Through Cybersecurity Risk Management
Ajouter à ma liste d'envies
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...

Editeur : Wiley
Parution : 2024-03-20

PDF, ePub

96,85
Télécharger le livre :  The Curious Case of Usable Privacy
Ajouter à ma liste d'envies
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research,...

Editeur : Springer
Parution : 2024-03-19

PDF, ePub

52,74
Télécharger le livre :  Toward a Quantum-Safe Communication Infrastructure
Ajouter à ma liste d'envies
The accelerating pace at which quantum computing is developing makes it almost inevitable that some of the major cryptographic algorithms and protocols we rely on daily, for everything from internet shopping to running our critical infrastructure, may be compromised in...

Editeur : SAGE Publications Ltd
Parution : 2024-03-15

PDF

108,59
Télécharger le livre :  Building Cybersecurity Applications with Blockchain and Smart Contracts
Ajouter à ma liste d'envies
This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field of cybersecurity. It begins by defining the fundamentals of cybersecurity in the context of blockchain and smart contracts, and then moves on to the...

Editeur : Springer
Parution : 2024-02-21

PDF, ePub

137,14
Télécharger le livre :  Digitale Selbstverteidigung für Dummies
Ajouter à ma liste d'envies
Der schwarze Gürtel für das Netz Sie wollen Ihre Privatsphäre und Ihre digitale Identität schützen? Dabei hilft Ihnen dieses Buch. Christina Czeschik klärt Sie darüber auf, wo Sie welche Daten und Metadaten hinterlassen, und hilft Ihnen dann dabei, darüber die...

Editeur : Wiley-VCH
Parution : 2024-02-19
Collection : Für Dummies
ePub

16,77
Télécharger le livre :  Pen Testing from Contract to Report
Ajouter à ma liste d'envies
Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential...

Editeur : Wiley
Parution : 2024-02-08

PDF, ePub

89,25
Télécharger le livre :  Enterprise Cyber Risk Management as a Value Creator
Ajouter à ma liste d'envies
This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and...

Editeur : Apress
Parution : 2024-01-23

PDF, ePub

39,43
Télécharger le livre :  CISSP Exam Certification Companion
Ajouter à ma liste d'envies
This is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand...

Editeur : Apress
Parution : 2023-12-15
Collection : Certification Study Companion Series
PDF, ePub

62,11
Télécharger le livre :  ISO 27001: 2022/2023
Ajouter à ma liste d'envies
Ein qualifiziertes Management der Informationssicherheit ist heutzutage für jede Organisation unverzichtbar. Die Normenreihe ISO 27000 ist dabei ein anerkannter „Wegweiser“ zu diesem Ziel. Im internationalen Kontext ist ihre Erfüllung für viele Organisationen ein...

Editeur : Springer Vieweg
Parution : 2023-12-12
Collection : Edition
PDF, ePub

24,64
Télécharger le livre :  Discovering Cybersecurity
Ajouter à ma liste d'envies
The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either...

Editeur : Apress
Parution : 2023-12-08

PDF, ePub

56,19
Télécharger le livre :  Cyber Malware
Ajouter à ma liste d'envies
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover...

Editeur : Springer
Parution : 2023-11-08

PDF, ePub

105,49
Télécharger le livre :  Liquidity
Ajouter à ma liste d'envies
In market structure, we tend to be equity focused, but one of the challenges is liquidity creation. This book examines liquidity creation and regulation. Based on the Baruch College Financial Markets Conference, Liquidity: How to Find it, Regulate it, Get it, this book...

Editeur : Springer
Parution : 2023-10-05
Collection : Zicklin School of Business Financial Markets Series
PDF, ePub

147,69
Télécharger le livre :  Proceedings of the 2nd International Academic Conference on Blockchain, Information Technology and Smart Finance (ICBIS 2023)
Ajouter à ma liste d'envies
This is an open access book.With the rapid development of modern economy and Internet technology, the traditional financial industry has to develop Internet finance to provide better services and meet the needs of the times. It is against this background that the...

Editeur : Atlantis Press
Parution : 2023-07-25
Collection : Atlantis Highlights in Computer Sciences
PDF, ePub

Gratuit
Télécharger le livre :  How to Catch a Phish
Ajouter à ma liste d'envies
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and...

Editeur : Apress
Parution : 2023-06-20

PDF, ePub

26,61
Télécharger le livre :  The SAGE Handbook of Human–Machine Communication
Ajouter à ma liste d'envies
The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and...

Editeur : SAGE Publications Ltd
Parution : 2023-06-01

PDF, ePub

98,59
<< < 12345 >