for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets monitoring as a continuous process aimed at... Læs mere
Bemærk: Kan leveres før jul.
Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform.
Bemærk: Kan ikke leveres før jul.
Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps.
Bemærk: Kan leveres før jul.
The security world is changing as the advent of modern Web 2.0 sites and rich Internet applications has given rise to a generation of hacking techniques. This book offers... Læs mere
Bemærk: Kan ikke leveres før jul.
Explaining how to write secure programs using Java's cryptographic tools, this text discusses authentication, key management, public and private key encryption.
Bemærk: Kan ikke leveres før jul.
Network administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This text focuses on ways to secure Cisco routers, it is a reference for protecting the protectors.
Bemærk: Kan ikke leveres før jul.
Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational components-building blocks that you can combine in many ways.
Bemærk: Kan ikke leveres før jul.
An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations... Læs mere
Bemærk: Kan ikke leveres før jul.
Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT... Læs mere
Bemærk: Kan ikke leveres før jul.
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
Bemærk: Kan leveres før jul.
Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems.
Bemærk: Kan leveres før jul.
An ethical introduction to social engineering.