| |
Dieses Übungsbuch ergänzt das gleichnamige Lehrbuch. Es schließt die Lücke zwischen dem Unterrichts- und Lernstoff und der Vorbereitung auf die Prüfung. Mit Hilfe der Fragen und Antworten können Lernende den wichtigen Prüfungsstoff strukturiert wiederholen, den eigenen...
Editeur :
Springer Gabler
Parution :
2020-08-30
PDF, ePub
|
The Art of Investigative Interviewing, Fourth Edition, builds on the successes of the previous editions providing the reader guidance on conducting investigative interviews, both ethically and professionally.The book can be used by anyone who is involved in...
Editeur :
Butterworth-Heinemann
Parution :
2020-08-27
epub sans DRM
|
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological,...
Editeur :
Springer
Parution :
2020-08-21
Collection :
SpringerBriefs in Applied Sciences and Technology
PDF, ePub
|
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and...
Editeur :
Apress
Parution :
2020-08-12
PDF, ePub
|
Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein...
Editeur :
Springer Vieweg
Parution :
2020-07-30
PDF, ePub
|
Until recently, the Arctic was almost impossible for anyone other than indigenous peoples and explorers to traverse. Pervasive Arctic sea ice and harsh climatological conditions meant that the region was deemed incapable of supporting industrial activity or a Western...
Editeur :
SAGE Publications Ltd
Parution :
2020-07-15
PDF
|
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...
Editeur :
Springer
Parution :
2020-07-14
Collection :
Signals and Communication Technology
PDF, ePub
|
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...
Editeur :
Apress
Parution :
2020-06-13
PDF, ePub
|
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...
Editeur :
Wiley
Parution :
2020-06-09
PDF, ePub
|
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...
Editeur :
Springer
Parution :
2020-04-23
PDF, ePub
|
Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit...
Editeur :
Springer Vieweg
Parution :
2020-04-07
PDF, ePub
|
This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...
Editeur :
Springer
Parution :
2020-03-11
PDF, ePub
|
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...
Editeur :
Apress
Parution :
2020-02-25
PDF, ePub
|
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...
Editeur :
Apress
Parution :
2019-12-18
PDF, ePub
|
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...
Editeur :
Apress
Parution :
2019-12-17
PDF, ePub
|
Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and...
Editeur :
SAGE Publications Ltd
Parution :
2019-12-15
PDF
|
Water supply and water management services are among the most critical infrastructures in society, providing safe and affordable drinking water, managing wastewater to avoid floods and environmental pollution, and enabling the reuse and replenishment of scarce water...
Editeur :
SAGE Publications Ltd
Parution :
2019-12-15
PDF
|
Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential...
Editeur :
Academic Press
Parution :
2019-11-21
epub sans DRM
|
This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world.This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an...
Editeur :
Palgrave Pivot
Parution :
2019-11-16
Collection :
Crime Prevention and Security Management
PDF, ePub
|
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...
Editeur :
Springer
Parution :
2019-11-14
Collection :
Advances in Computer Vision and Pattern Recognition
PDF, ePub
|