Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet’s next big thing: the blockchain.
Bemærk: Kan leveres før jul.
Offers a practical guide to achieving security throughout computer networks. This guide provides readers with a better understanding of why... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their... Læs mere
Bemærk: Kan ikke leveres før jul.
Computer Audit, Control, and Security, 2nd Edition describes the types of internal controls, security, and integrity procedures that management should build into its automated systems and that auditors should look for when reviewing those systems.
Bemærk: Kan ikke leveres før jul.
Find out about TCP/IP--based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your... Læs mere
Bemærk: Kan leveres før jul.
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information.
Bemærk: Kan ikke leveres før jul.
The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.
Bemærk: Kan ikke leveres før jul.
This book is about how to test Web based applications so that customers know that they are very safe to access them, and that their information and data will not... Læs mere
Bemærk: Kan ikke leveres før jul.
Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions affair to understand the transfer of personal data from the European Union (EU) to the United States.
Bemærk: Kan ikke leveres før jul.
How are we to deal with Big Data? When is it beneficial to us? How might we regulate it? Offering careful and critical analyses, this timely... Læs mere
Bemærk: Kan ikke leveres før jul.
This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.
Bemærk: Kan ikke leveres før jul.
This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using... Læs mere