for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security... Læs mere
Bemærk: Kan leveres før jul.
This detailed guide distills the complex, fast moving ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood.
Bemærk: Kan ikke leveres før jul.
InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most... Læs mere
Bemærk: Kan ikke leveres før jul.
Examples in the book describe security vulnerabilities and how to look for them
Bemærk: Kan ikke leveres før jul.
Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting... Læs mere
Bemærk: Kan ikke leveres før jul.
There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. This work collects 34... Læs mere
Bemærk: Kan ikke leveres før jul.
SNORT, the defacto standard of intrusion detection tools, can save countless headaches; the new SNORT Cookbook will save countless hours of trial and error. Each "recipe" offers a clear... Læs mere
Bemærk: Kan ikke leveres før jul.
'Smart Home Hacks' covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Learn how to equip... Læs mere
Bemærk: Kan ikke leveres før jul.
This text provides the strategies, tips and tricks needed to secure a Windows system from viruses. It teaches what viruses can and cannot do and how to recognize, remove, and prevent them.
Bemærk: Kan ikke leveres før jul.
A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP.
Bemærk: Kan leveres før jul.
SSH is a popular protocol for securing your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations... Læs mere
Bemærk: Kan ikke leveres før jul.
This compelling expose explores the shadowy world of the people responsible for today's junk-email epidemic. Investigative journalist Brian McWilliams delivers a fascinating account of the... Læs mere