Tous les ebooks security

 
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...

Editeur : Wiley
Parution : 2025-08-26

PDF, ePub

116,00
Télécharger le livre :  Building Effective Privacy Programs
Ajouter à ma liste d'envies
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....

Editeur : Wiley
Parution : 2025-08-15

PDF, ePub

102,86
Télécharger le livre :  Everyday Cryptography
Ajouter à ma liste d'envies
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in supporting digital security for everyday technologies such as the internet, mobile...

Editeur : OUP Oxford
Parution : 2025-06-27

ePub

38,94
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies
Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an...

Editeur : OUP Oxford
Parution : 2025-05-01

PDF

21,89
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies
Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an...

Editeur : OUP Oxford
Parution : 2025-04-01

ePub

21,89
Télécharger le livre :  Securing Microsoft Azure OpenAI
Ajouter à ma liste d'envies
Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces...

Editeur : Wiley
Parution : 2025-03-11
Collection : Tech Today
PDF, ePub

49,69
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies
Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats...

Editeur : Wiley-Scrivener
Parution : 2025-02-14

PDF, ePub

220,60
Télécharger le livre :  A Beginner's Guide To Web Application Penetration Testing
Ajouter à ma liste d'envies
A hands-on, beginner-friendly intro to web application pentesting InA Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book,...

Editeur : Wiley
Parution : 2025-01-07
Collection : Tech Today
PDF, ePub

45,15
Télécharger le livre :  Emerging Threats and Countermeasures in Cybersecurity
Ajouter à ma liste d'envies
This book is an essential resource for anyone seeking to stay ahead in the dynamic field of cybersecurity, providing a comprehensive toolkit for understanding and combating digital threats and offering practical, insightful guidance ideal for cybersecurity...

Editeur : Wiley-Scrivener
Parution : 2024-11-13
Collection : Advances in Antenna, Microwave, and Communication Engineering
PDF, ePub

253,20
Télécharger le livre :  Modern Technologies Enabling Innovative Methods for Maritime Monitoring and Strengthening Resilience in Maritime Critical Infrastructures
Ajouter à ma liste d'envies
Maritime infrastructures are fundamental to the working of societies and economies. They play a crucial role in supply, with 90% of commercial trade exchanges carried out worldwide handled by the maritime industry, in the functioning of the economy, the maintenance of...

Editeur : SAGE Publications Ltd
Parution : 2024-10-15

PDF

131,22
Télécharger le livre :  FAIK
Ajouter à ma liste d'envies
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?...

Editeur : Wiley
Parution : 2024-08-20

PDF, ePub

27,11
Télécharger le livre :  Cybersecurity in Context
Ajouter à ma liste d'envies
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits“A comprehensive,...

Editeur : Wiley
Parution : 2024-08-07

PDF

82,24
Télécharger le livre :  Practical Cyber Intelligence
Ajouter à ma liste d'envies
Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in...

Editeur : Wiley
Parution : 2024-07-31

PDF, ePub

97,48
Télécharger le livre :  ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Ajouter à ma liste d'envies
CISSP Study Guide - fully updated for the 2024CISSP Body of Knowledge ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated based on the latest 2024CISSP Detailed Content Outline. This bestselling...

Editeur : Sybex
Parution : 2024-05-24
Collection : Sybex Study Guide
PDF, ePub

63,19
Télécharger le livre :  Computer-Supported Collaboration
Ajouter à ma liste d'envies
Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality...

Editeur : Wiley-IEEE Press
Parution : 2024-05-24
Collection : IEEE Press Series on Human-Machine Systems
PDF

112,78
Télécharger le livre :  The Extended Reality Blueprint
Ajouter à ma liste d'envies
Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...

Editeur : Wiley
Parution : 2024-03-26

PDF, ePub

34,60
Télécharger le livre :  Stepping Through Cybersecurity Risk Management
Ajouter à ma liste d'envies
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...

Editeur : Wiley
Parution : 2024-03-20

PDF, ePub

96,85
Télécharger le livre :  Toward a Quantum-Safe Communication Infrastructure
Ajouter à ma liste d'envies
The accelerating pace at which quantum computing is developing makes it almost inevitable that some of the major cryptographic algorithms and protocols we rely on daily, for everything from internet shopping to running our critical infrastructure, may be compromised in...

Editeur : SAGE Publications Ltd
Parution : 2024-03-15

PDF

108,59
Télécharger le livre :  Digitale Selbstverteidigung für Dummies
Ajouter à ma liste d'envies
Der schwarze Gürtel für das Netz Sie wollen Ihre Privatsphäre und Ihre digitale Identität schützen? Dabei hilft Ihnen dieses Buch. Christina Czeschik klärt Sie darüber auf, wo Sie welche Daten und Metadaten hinterlassen, und hilft Ihnen dann dabei, darüber die...

Editeur : Wiley-VCH
Parution : 2024-02-19
Collection : Für Dummies
ePub

16,77
Télécharger le livre :  Pen Testing from Contract to Report
Ajouter à ma liste d'envies
Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential...

Editeur : Wiley
Parution : 2024-02-08

PDF, ePub

89,25
123 >