Télécharger le livre :  The Second Economy
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and...

Editeur : Apress
Parution : 2016-10-20
PDF, ePub

39,43

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and...

Editeur : Syngress
Parution : 2016-10-12
PDF, epub sans DRM

75,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a Practical Information Security Program
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate...

Editeur : Syngress
Parution : 2016-10-03
epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Handbook of System Safety and Security
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of...

Editeur : Syngress
Parution : 2016-10-02
epub sans DRM

150,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This...

Editeur : Syngress
Parution : 2016-09-20
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Mobile Security and Privacy
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security.Mobile devices and apps have...

Editeur : Syngress
Parution : 2016-09-14
PDF, epub sans DRM

75,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT-Sicherheitsmanagement nach der neuen ISO 27001
Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der neuen Fassung der Norm ISO/IEC 27001. Die Autoren erläutern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das...

Editeur : Springer Vieweg
Parution : 2016-09-14
Collection : Edition PDF, ePub

42,39

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity for Hospitals and Healthcare Facilities
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a...

Editeur : Apress
Parution : 2016-09-06
PDF, ePub

78,87

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Coding for Penetration Testers
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...

Editeur : Syngress
Parution : 2016-09-03
PDF, epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Cyber Effect
Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...

Editeur : John Murray
Parution : 2016-08-18
ePub

3,99

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Advances in Human Factors in Cybersecurity
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2016-08-16
Collection : Advances in Intelligent Systems and Computing ePub

158,24

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Mobile Device Management
Ing. Markus Pierer M.Sc. proves whether or not there is a generic valid system comparison approach for various individual specifications facilitating the selection process for organizations. He illustrates important basics of enterprise mobility management, realizes...

Editeur : Springer Vieweg
Parution : 2016-08-12
PDF

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security in Fixed and Wireless Networks
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...

Editeur : Wiley
Parution : 2016-08-05
PDF, ePub

104,39

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Audio Content Security
Audio Content Security: Attack Analysis onAudio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of...

Editeur : Syngress
Parution : 2016-07-16
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Quantifying the User Experience
Quantifying the User Experience: Practical Statistics for User Research, Second Edition, provides practitioners and researchers with the information they need to confidently quantify, qualify, and justify their data. The book presents a practical guide on how to use...

Editeur : Morgan Kaufmann
Parution : 2016-07-12
PDF, epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  DNS Security
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Editeur : Syngress
Parution : 2016-06-10
PDF, epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data Breach Preparation and Response
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.Data breaches are inevitable incidents that can disrupt...

Editeur : Syngress
Parution : 2016-06-08
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Combatting Cybercrime and Cyberterrorism
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...

Editeur : Springer
Parution : 2016-05-27
ePub

89,66

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Threat Forecasting
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting...

Editeur : Syngress
Parution : 2016-05-17
epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OS X Incident Response
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts ofOS X, analysts will set themselves apart by acquiring an up-and-coming...

Editeur : Syngress
Parution : 2016-05-07
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
<< < 1011121314 >