for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The new fifth edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and... Læs mere
Bemærk: Kan ikke leveres før jul.
Explaining the complex sources of risk for any organization, this work provides guidance and strategies to prevent... Læs mere
Bemærk: Kan ikke leveres før jul.
Shows how to strategically maximize a limited security budget without compromising the quality of risk management initiatives. This book describes how to manage the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book investigates the prevalence, nature and impacts of image-based sexual abuse, and examines the legal and non-legal responses to this problem in a comparative, cross-country context.
Bemærk: Kan ikke leveres før jul.
This handbook is a source of information for the discipline of cybersecurity from a human factors perspective. It is an important and valuable... Læs mere
Bemærk: Kan ikke leveres før jul.
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives.
Bemærk: Kan ikke leveres før jul.
Suitable for corporate security officers, this work helps them garner executive support and funding for their security programs. It helps understand... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
Bemærk: Kan ikke leveres før jul.
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The book includes many examples, applications and advanced research issues, as well as implementation using MATLAB wherever required.