Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Find out about TCP/IP--based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan leveres før jul.
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.
Bemærk: Kan leveres før jul.
This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of... Læs mere
Bemærk: Kan ikke leveres før jul.
Describes the essential software security concepts that are needed to conduct relevant and effective tests. This book considers foundation concepts, processes and techniques in... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.
Bemærk: Kan ikke leveres før jul.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies.
Bemærk: Kan ikke leveres før jul.
This book addresses security analytics for the Internet of Everything. It provides a big picture on the concepts, techniques, applications, and open... Læs mere
Bemærk: Kan ikke leveres før jul.
This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, it's a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional computing assets.
Bemærk: Kan ikke leveres før jul.
There is a resurgence of interest in the security of data transmission in wireless systems from physical layer point of view. To enhance the security and data reliability in cooperative wireless networks, this book provides new solutions for these problems.
Bemærk: Kan ikke leveres før jul.