for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It reflects the changes to the CBK in response to new laws and evolving technology.
Bemærk: Kan ikke leveres før jul.
Shows how to strategically maximize a limited security budget without compromising the quality of risk management initiatives. This book describes how to manage the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book investigates the prevalence, nature and impacts of image-based sexual abuse, and examines the legal and non-legal responses to this problem in a comparative, cross-country context.
Bemærk: Kan ikke leveres før jul.
This handbook is a source of information for the discipline of cybersecurity from a human factors perspective. It is an important and valuable... Læs mere
Bemærk: Kan ikke leveres før jul.
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives.
Bemærk: Kan ikke leveres før jul.
Suitable for corporate security officers, this work helps them garner executive support and funding for their security programs. It helps understand... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
Bemærk: Kan ikke leveres før jul.
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The book includes many examples, applications and advanced research issues, as well as implementation using MATLAB wherever required.