|
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor...
Editeur :
Apress
Parution :
2023-05-24
PDF, ePub
|
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...
Editeur :
Wiley-IEEE Press
Parution :
2023-05-16
PDF, ePub
|
Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...
Editeur :
Springer
Parution :
2023-04-26
PDF, ePub
|
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...
Editeur :
Wiley
Parution :
2023-04-06
PDF, ePub
|
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...
Editeur :
Springer
Parution :
2023-03-08
Collection :
Advances in Information Security
PDF, ePub
|
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen...
Editeur :
Springer Vieweg
Parution :
2023-01-18
PDF, ePub
|
This book is about risk conceptions, experiences and reflections. It applies the concept of the risk triangle, with its societal, organisational and personal angles, to two areas of inquiry: financial markets and the military, seeking to demonstrate the...
Editeur :
Palgrave Macmillan
Parution :
2022-12-12
Collection :
International Political Economy Series
PDF, ePub
|
This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...
Editeur :
Springer
Parution :
2022-11-30
Collection :
India Studies in Business and Economics
PDF, ePub
|
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...
Editeur :
Apress
Parution :
2022-11-17
PDF, ePub
|
Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...
Editeur :
SAGE Publications Ltd
Parution :
2022-11-15
PDF
|
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show...
Editeur :
Springer Vieweg
Parution :
2022-11-12
PDF, ePub
|
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...
Editeur :
Wiley
Parution :
2022-11-10
ePub
|
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...
Editeur :
Wiley-IEEE Press
Parution :
2022-11-02
Collection :
IEEE Press
PDF, ePub
|
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages,...
Editeur :
Wiley-ISTE
Parution :
2022-09-14
PDF, ePub
|
Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbstPentests durchzuführen. Von den nötigen Vorbereitungen über...
Editeur :
Wiley-VCH
Parution :
2022-08-17
Collection :
Für Dummies
ePub
|
The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...
Editeur :
Wiley
Parution :
2022-07-26
PDF, ePub
|
For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the...
Editeur :
Springer Vieweg
Parution :
2022-07-13
PDF, ePub
|
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text...
Editeur :
Apress
Parution :
2022-07-12
PDF, ePub
|
In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...
Editeur :
Springer
Parution :
2022-06-30
Collection :
Zicklin School of Business Financial Markets Series
PDF, ePub
|
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the...
Editeur :
Springer
Parution :
2022-06-01
Collection :
Synthesis Lectures on Information Security, Privacy, and Trust
PDF
|