Electronic Books

Total Books: 1 - 17 /17
Advancing Computational Intelligence Techniques for Security Systems Design / Ozzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan

Security systems have become an integral part of the building and large complex setups, and intervention of the computational ...

Lire la suite
NoIMG
Building the Infrastructure for Cloud Security : A Solutions view

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...

Lire la suite
Computer Security Principles and Practice / William Stallings & Lawrie Brown

Provides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...

Lire la suite
Cryptography and Network Security: principles and practices / W. Stallings

Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...

Lire la suite
Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center, 2nd Edition / Hwaiyu Geng

Explains the fundamentals, advanced technologies, and best practices used in planning, designing, building and operating ...

Lire la suite
Deep Learning Approaches to Cloud Security / Pramod Singh Rathore, Vishal Dutt, Rashmi Agrawal, Satya Murthy Sasubilli, Srinivasa Rao Swarna

Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions ...

Lire la suite
Digital Finance: Security Tokens and Unlocking the Real Potential of Blockchain / Baxter Hines

In Digital Finance: Security Tokens and Unlocking the Real Potential Blockchain, readers will realize why security tokens ...

Lire la suite
Fundamentals of Information Systems Security ; Fourth Edition / David Kim; Michael G. Solomon

Provides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. ...

Lire la suite
NoIMG
Fundamentals of information systems security ; Third edition / David Kim, Michael Solomon

Provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems ...

Lire la suite
NoIMG
Intelligent Network Management and Control: Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio / Badr Benmammar

The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...

Lire la suite
Introduction to Machine Learning with Applications in Information Security / Mark Stamp

Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...

Lire la suite
Principles of Information Security / Michael E. Whitman and Herbert J. Mattord

Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...

Lire la suite
NoIMG
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication

From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...

Lire la suite
The Art of Attack: Attacker Mindset for Security Professionals / Maxie Reynolds

Untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...

Lire la suite
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

Lire la suite
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise / Jennifer Minella, Stephen Orr

Offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...

Lire la suite
Wireless and Mobile Device Security ; 2nd ed. / Jim Doherty

Provides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...

Lire la suite
Total Books: 1 - 17 /17