Télécharger le livre :  The Definitive Guide to PCI DSS Version 4
Ajouter à ma liste d'envies
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor...

Editeur : Apress
Parution : 2023-05-24

PDF, ePub

62,11
Télécharger le livre :  Data Exfiltration Threats and Prevention Techniques
Ajouter à ma liste d'envies
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...

Editeur : Wiley-IEEE Press
Parution : 2023-05-16

PDF, ePub

121,75
Télécharger le livre :  Bitcoin und Blockchain
Ajouter à ma liste d'envies
Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...

Editeur : Springer
Parution : 2023-04-26

PDF, ePub

19,71
Télécharger le livre :  Cyber Threat Intelligence
Ajouter à ma liste d'envies
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...

Editeur : Wiley
Parution : 2023-04-06

PDF, ePub

98,33
Télécharger le livre :  Cyber Deception
Ajouter à ma liste d'envies
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...

Editeur : Springer
Parution : 2023-03-08
Collection : Advances in Information Security
PDF, ePub

158,24
Télécharger le livre :  Digitale Kompetenz
Ajouter à ma liste d'envies
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen...

Editeur : Springer Vieweg
Parution : 2023-01-18

PDF, ePub

24,64
Télécharger le livre :  The Political Economy of Risk in Finance and the Military
Ajouter à ma liste d'envies
This book is about risk conceptions, experiences and reflections. It applies the concept of the risk triangle, with its societal, organisational and personal angles, to two areas of inquiry: financial markets and the military, seeking to demonstrate the...

Editeur : Palgrave Macmillan
Parution : 2022-12-12
Collection : International Political Economy Series
PDF, ePub

137,14
Télécharger le livre :  Insolvency and Bankruptcy Reforms in India
Ajouter à ma liste d'envies
This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...

Editeur : Springer
Parution : 2022-11-30
Collection : India Studies in Business and Economics
PDF, ePub

116,04
Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Editeur : Apress
Parution : 2022-11-17

PDF, ePub

62,11
Télécharger le livre :  Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems
Ajouter à ma liste d'envies
Although cybersecurity is something of a latecomer on the computer science and engineering scene, there are now inclinations to consider cybersecurity a meta-discipline. Unlike traditional information and communication systems, the priority goal of the cybersecurity of...

Editeur : SAGE Publications Ltd
Parution : 2022-11-15

PDF

102,26
Télécharger le livre :  A European Perspective on Crisis Informatics
Ajouter à ma liste d'envies
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show...

Editeur : Springer Vieweg
Parution : 2022-11-12

PDF, ePub

89,66
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the...

Editeur : Wiley
Parution : 2022-11-10

ePub

106,50
Télécharger le livre :  Cybersecurity in Intelligent Networking Systems
Ajouter à ma liste d'envies
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...

Editeur : Wiley-IEEE Press
Parution : 2022-11-02
Collection : IEEE Press
PDF, ePub

122,80
Télécharger le livre :  Security in Vehicular Networks
Ajouter à ma liste d'envies
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages,...

Editeur : Wiley-ISTE
Parution : 2022-09-14

PDF, ePub

148,86
Télécharger le livre :  Penetration Tester werden für Dummies
Ajouter à ma liste d'envies
Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbstPentests durchzuführen. Von den nötigen Vorbereitungen über...

Editeur : Wiley-VCH
Parution : 2022-08-17
Collection : Für Dummies
ePub

23,84
Télécharger le livre :  Blockchain Security from the Bottom Up
Ajouter à ma liste d'envies
The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...

Editeur : Wiley
Parution : 2022-07-26

PDF, ePub

27,11
Télécharger le livre :  Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Ajouter à ma liste d'envies
For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the...

Editeur : Springer Vieweg
Parution : 2022-07-13

PDF, ePub

94,94
Télécharger le livre :  Theoretical Cybersecurity
Ajouter à ma liste d'envies
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text...

Editeur : Apress
Parution : 2022-07-12

PDF, ePub

56,19
Télécharger le livre :  40 Years of Experience with the National Market System (NMS)
Ajouter à ma liste d'envies
In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...

Editeur : Springer
Parution : 2022-06-30
Collection : Zicklin School of Business Financial Markets Series
PDF, ePub

147,69
Télécharger le livre :  Anomaly Detection as a Service
Ajouter à ma liste d'envies
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the...

Editeur : Springer
Parution : 2022-06-01
Collection : Synthesis Lectures on Information Security, Privacy, and Trust
PDF

58,01
<< < 23456 >