Tous les ebooks security

 
Télécharger le livre :  Cybersecurity Law
Ajouter à ma liste d'envies
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...

Editeur : Wiley
Parution : 2025-08-26

PDF, ePub

116,00
Télécharger le livre :  Building Effective Privacy Programs
Ajouter à ma liste d'envies
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....

Editeur : Wiley
Parution : 2025-08-15

PDF, ePub

102,86
Télécharger le livre :  Securing Microsoft Azure OpenAI
Ajouter à ma liste d'envies
Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces...

Editeur : Wiley
Parution : 2025-03-11
Collection : Tech Today
PDF, ePub

49,69
Télécharger le livre :  Securing the Digital Frontier
Ajouter à ma liste d'envies
Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats...

Editeur : Wiley-Scrivener
Parution : 2025-02-14

PDF, ePub

220,60
Télécharger le livre :  A Beginner's Guide To Web Application Penetration Testing
Ajouter à ma liste d'envies
A hands-on, beginner-friendly intro to web application pentesting InA Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book,...

Editeur : Wiley
Parution : 2025-01-07
Collection : Tech Today
PDF, ePub

45,15
Télécharger le livre :  Emerging Threats and Countermeasures in Cybersecurity
Ajouter à ma liste d'envies
This book is an essential resource for anyone seeking to stay ahead in the dynamic field of cybersecurity, providing a comprehensive toolkit for understanding and combating digital threats and offering practical, insightful guidance ideal for cybersecurity...

Editeur : Wiley-Scrivener
Parution : 2024-11-13
Collection : Advances in Antenna, Microwave, and Communication Engineering
PDF, ePub

253,20
Télécharger le livre :  Modern Technologies Enabling Innovative Methods for Maritime Monitoring and Strengthening Resilience in Maritime Critical Infrastructures
Ajouter à ma liste d'envies
Maritime infrastructures are fundamental to the working of societies and economies. They play a crucial role in supply, with 90% of commercial trade exchanges carried out worldwide handled by the maritime industry, in the functioning of the economy, the maintenance of...

Editeur : SAGE Publications Ltd
Parution : 2024-10-15

PDF

131,22
Télécharger le livre :  FAIK
Ajouter à ma liste d'envies
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?...

Editeur : Wiley
Parution : 2024-08-20

PDF, ePub

27,11
Télécharger le livre :  Cybersecurity in Context
Ajouter à ma liste d'envies
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits“A comprehensive,...

Editeur : Wiley
Parution : 2024-08-07

PDF

82,24
Télécharger le livre :  Practical Cyber Intelligence
Ajouter à ma liste d'envies
Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in...

Editeur : Wiley
Parution : 2024-07-31

PDF, ePub

97,48
Télécharger le livre :  ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Ajouter à ma liste d'envies
CISSP Study Guide - fully updated for the 2024CISSP Body of Knowledge ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated based on the latest 2024CISSP Detailed Content Outline. This bestselling...

Editeur : Sybex
Parution : 2024-05-24
Collection : Sybex Study Guide
PDF, ePub

63,19
Télécharger le livre :  Computer-Supported Collaboration
Ajouter à ma liste d'envies
Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality...

Editeur : Wiley-IEEE Press
Parution : 2024-05-24
Collection : IEEE Press Series on Human-Machine Systems
PDF

112,78
Télécharger le livre :  The Extended Reality Blueprint
Ajouter à ma liste d'envies
Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...

Editeur : Wiley
Parution : 2024-03-26

PDF, ePub

34,60
Télécharger le livre :  Stepping Through Cybersecurity Risk Management
Ajouter à ma liste d'envies
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...

Editeur : Wiley
Parution : 2024-03-20

PDF, ePub

96,85
Télécharger le livre :  Toward a Quantum-Safe Communication Infrastructure
Ajouter à ma liste d'envies
The accelerating pace at which quantum computing is developing makes it almost inevitable that some of the major cryptographic algorithms and protocols we rely on daily, for everything from internet shopping to running our critical infrastructure, may be compromised in...

Editeur : SAGE Publications Ltd
Parution : 2024-03-15

PDF

108,59
Télécharger le livre :  Digitale Selbstverteidigung für Dummies
Ajouter à ma liste d'envies
Der schwarze Gürtel für das Netz Sie wollen Ihre Privatsphäre und Ihre digitale Identität schützen? Dabei hilft Ihnen dieses Buch. Christina Czeschik klärt Sie darüber auf, wo Sie welche Daten und Metadaten hinterlassen, und hilft Ihnen dann dabei, darüber die...

Editeur : Wiley-VCH
Parution : 2024-02-19
Collection : Für Dummies
ePub

16,77
Télécharger le livre :  Pen Testing from Contract to Report
Ajouter à ma liste d'envies
Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential...

Editeur : Wiley
Parution : 2024-02-08

PDF, ePub

89,25
Télécharger le livre :  The SAGE Handbook of Human–Machine Communication
Ajouter à ma liste d'envies
The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and...

Editeur : SAGE Publications Ltd
Parution : 2023-06-01

PDF, ePub

98,59
Télécharger le livre :  Data Exfiltration Threats and Prevention Techniques
Ajouter à ma liste d'envies
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...

Editeur : Wiley-IEEE Press
Parution : 2023-05-16

PDF, ePub

121,75
Télécharger le livre :  Cyber Threat Intelligence
Ajouter à ma liste d'envies
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...

Editeur : Wiley
Parution : 2023-04-06

PDF, ePub

98,33
123 >