排序依

共有5438

Grokking Web Application Security

Grokking Web Application Security

When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can st......more

My Name Is Satoshi

My Name Is Satoshi

The story of BTC starts and ends with Satoshi Nakamoto. Who was this genius who turned his back on $50 billion dollars a......more

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

  • Ingram,出版日期:2024-06-07

This book is an introductory account for policy makers, academia and interested readers on the digital technologies on I......more

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

Emerging Digital Technologies and India’s Security Sector: Ai, Blockchain, and Quantum Communications

  • Ingram,出版日期:2024-06-07

This book is an introductory account for policy makers, academia and interested readers on the digital technologies on I......more

Security Yearbook 2024

Security Yearbook 2024

A fascinating history of the cybersecurity industry as well as an up-to-date collection of leading cybersecurity vendors......more

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

Large Language Models in Cybersecurity: Threats, Exposure and Mitigation

  • Ingram,出版日期:2024-06-01

This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

  • Ingram,出版日期:2024-05-28

This open-access book is premised on the belief that understanding and protecting privacy requires a multidisciplinary a......more

Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques

Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques

Elevate your organization’s cybersecurity posture by implementing proven strategies and best practices to stay ahead of ......more

Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR

Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR

Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examp......more

Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches

Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches

Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructureKey Features ......more

Codes and Ciphers of the Civil War

Codes and Ciphers of the Civil War

Break this code: QDOJHQ FRPPHQGHG WKH SHRSOH RI WKH ZLWK Hint for the reader: patriots and tiki torches FTW. Solution in......more

Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection

Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection

Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced featuresKey Features......more

Information Technology Security and Risk Management: Inductive Cases for Information Security

Information Technology Security and Risk Management: Inductive Cases for Information Security

  • Ingram,出版日期:2024-05-16

Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases ......more

Heuristic Risk Management

Heuristic Risk Management

In the relentless cyber war, understanding that every individual and organization is a target is crucial. In this book, ......more

The Comprehensive Guide to Cybersecurity Careers: A Professional’s Roadmap for the Digital Security Age

The Comprehensive Guide to Cybersecurity Careers: A Professional’s Roadmap for the Digital Security Age

The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity p......more

The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices

The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices

This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and ins......more

Selected Areas in Cryptography: 29th International Conference, Sac 2022, Windsor, On, Canada, August 24-26, 2022, Revised Selected Papers

Selected Areas in Cryptography: 29th International Conference, Sac 2022, Windsor, On, Canada, August 24-26, 2022, Revised Selected Papers

  • Ingram,出版日期:2024-05-14

This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in......more

Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals

Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals

���� Become a Certified Penetration Tester! ���� Are you ready to level up your cybersecurity skills and become a certif......more

Operation REGAL: The Berlin Tunnel

Operation REGAL: The Berlin Tunnel

In a world consumed by information warfare, where the line between truth and deception becomes increasingly blurred, und......more

Security+ Exam Pass: Security Architecture, Threat Identification, Risk Management, Operations

Security+ Exam Pass: Security Architecture, Threat Identification, Risk Management, Operations

���� Get Ready to Ace Your Security+ Exam with the Ultimate Study Bundle! ���� Are you ready to take your cybersecurity ......more

Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning

Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning

In his second book with IT Governance Publishing, Richard Bingley’s Combatting Cyber Terrorism - A guide to understandin......more

Topics in Cryptology - Ct-Rsa 2024: Cryptographers’ Track at the Rsa Conference 2024, San Francisco, Ca, Usa, May 6-9, 2024, Proceedings

Topics in Cryptology - Ct-Rsa 2024: Cryptographers’ Track at the Rsa Conference 2024, San Francisco, Ca, Usa, May 6-9, 2024, Proceedings

  • Ingram,出版日期:2024-05-06

This book constitutes the refereed proceedings of the Cryptographer’s Track at the RSA Conference 2024, CT-RSA 2024, hel......more

The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age

The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age

The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Draw......more

MyData and Data Sovereignty in the Age of AI

MyData and Data Sovereignty in the Age of AI

The era of data sovereignty has arrived and the world is transforming into a data-driven society. This book begins its d......more

The Zero Trust Framework and Privileged Access Management (Pam)

The Zero Trust Framework and Privileged Access Management (Pam)

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more

The Zero Trust Framework and Privileged Access Management (Pam)

The Zero Trust Framework and Privileged Access Management (Pam)

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more

Beginning with Web3: An essential guide to building dApps in the new internet era (English Edition)

Beginning with Web3: An essential guide to building dApps in the new internet era (English Edition)

This book offers a clear, easy-to-understand introduction to the core concepts of Web3 and blockchain technology, settin......more

Windows Security Internals with Powershell

Windows Security Internals with Powershell

Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulner......more

Modern Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem

Modern Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem

Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerabil......more

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more

Blockchain-Based Cyber Security: Applications and Paradigms

Blockchain-Based Cyber Security: Applications and Paradigms

  • Ingram,出版日期:2024-04-29

The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber s......more

Responsible, Transparent, and Trustworthy AI Systems

Responsible, Transparent, and Trustworthy AI Systems

Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications,......more

Homeland and territorial security with AI: Aitek 6 knowledge cartridge

Homeland and territorial security with AI: Aitek 6 knowledge cartridge

This book explores the innovative concept of a knowledge cartridge dedicated to internal and territorial security, emplo......more

Intelligent Security Solutions for Cyber-Physical Systems

Intelligent Security Solutions for Cyber-Physical Systems

  • Ingram,出版日期:2024-04-22

A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more

High Performance Privacy Preserving AI

High Performance Privacy Preserving AI

Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many mor......more

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5

  • Ingram,出版日期:2024-04-18

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings

  • Ingram,出版日期:2024-04-17

This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis ......more

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems

The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more

The National Security Agency and The EC-121 Shootdown

The National Security Agency and The EC-121 Shootdown

In a world of escalating tensions and unpredictable adversaries, understanding the intricate workings of intelligence ga......more

The Native-Born: The First White Australians

The Native-Born: The First White Australians

The story of white Australians born in this land before 1850; most were the children of convicts, had no access to land ......more

Data-Centric Security in Software Defined Networks (Sdn)

Data-Centric Security in Software Defined Networks (Sdn)

The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12,

  • Ingram,出版日期:2024-04-09

This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the "internet of Things"

This comprehensive book presents a new approach to dynamic distributed virtual systems. Wireless grids edgeware promises......more

Generative AI Security: Theories and Practices

Generative AI Security: Theories and Practices

  • Ingram,出版日期:2024-04-06

This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more

Cyber Operations: A Case Study Approach

Cyber Operations: A Case Study Approach

Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more

Robust Machine Learning: Distributed Methods for Safe AI

Robust Machine Learning: Distributed Methods for Safe AI

Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Emergency managers and public safety professionals are more frequently being called on to address increasingly challengi......more

Information Technology Security: Modern Trends and Challenges

Information Technology Security: Modern Trends and Challenges

  • Ingram,出版日期:2024-04-02

This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more

Memory Dump Analysis Anthology, Volume 15

Memory Dump Analysis Anthology, Volume 15

This reference volume consists of revised, edited, cross-referenced, and thematically organized selected articles from S......more

Randomized Response Techniques: Certain Thought-Provoking Aspects

Randomized Response Techniques: Certain Thought-Provoking Aspects

This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more

Building Full Stack DeFi Applications: A practical guide to creating your own decentralized finance projects on blockchain

Building Full Stack DeFi Applications: A practical guide to creating your own decentralized finance projects on blockchain

Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications w......more

The OSINT Handbook: A practical guide to gathering and analyzing online information

The OSINT Handbook: A practical guide to gathering and analyzing online information

Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more

Advances in Emerging Financial Technology & Digital Money

Advances in Emerging Financial Technology & Digital Money

  • Ingram,出版日期:2024-03-29

The financial sector is witnessing rapid technological innovations, leading to the emergence of Fintech (financial techn......more

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Cybersecurity Architect’s Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more

Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks

Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks

Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehe......more

Blockchain-Based Internet of Things: Opportunities, Challenges and Solutions

Blockchain-Based Internet of Things: Opportunities, Challenges and Solutions

  • Ingram,出版日期:2024-03-28

This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challen......more

Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks

Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks

This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversari......more

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecur......more

Bitcoin Development Philosophy

Bitcoin Development Philosophy

Bitcoin Development Philosophy is a comprehensive guide aimed at developers who have a foundational understanding of Bit......more

Database and Application Security: A Practitioners Guide

Database and Application Security: A Practitioners Guide

An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the ave......more

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part I

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part I

  • Ingram,出版日期:2024-03-20

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II

Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II

  • Ingram,出版日期:2024-03-20

This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more

Locksport

Locksport

A comprehensive, fully illustrated guide to the fascinating sport of picking locks, Locksport is authored by five of the......more

Blockchain and Dlt: A Comprehensive Guide to Getting Started with Blockchain and Web3

Blockchain and Dlt: A Comprehensive Guide to Getting Started with Blockchain and Web3

Blockchain secures individual transactions with cryptography, creating a tamper-proof chain. In contrast, distributed le......more

Critical Infrastructure Protection in the Light of the Armed Conflicts

Critical Infrastructure Protection in the Light of the Armed Conflicts

  • Ingram,出版日期:2024-03-16

This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflic......more

551 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類

縮小搜尋範圍

依價格帶搜尋

依購買狀態搜尋