Télécharger le livre :  Data Exfiltration Threats and Prevention Techniques
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...

Editeur : Wiley-IEEE Press
Parution : 2023-05-22
PDF, ePub

117,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  SCADA Security
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems?the control system architecture that uses computers, networked data communications, and graphical user...

Editeur : Wiley
Parution : 2020-12-09
Collection : Wiley Series on Parallel and Distributed Computing PDF, ePub

123,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Verification of Communication Protocols in Web Services
In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have been putting various efforts and coming up with innovative ideas. Within the last few years, we have...

Editeur : Wiley
Parution : 2013-10-02
Collection : Wiley Series on Parallel and Distributed Computing PDF

128,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Fundamentals of Distributed Object Systems
Distributed Object Computing teaches readers the fundamentals of CORBA, the leading architecture for design of software used in parallel and distributed computing applications. Since CORBA is based on open standards, it is the only effective way to learn object-oriented...

Editeur : Wiley-Interscience
Parution : 2004-04-07
Collection : Wiley Series on Parallel and Distributed Computing PDF

135,74

Téléchargement immédiat
Dès validation de votre commande