Security systems have become an integral part of the building and large complex setups, and intervention of the computational ...
Lire la suiteFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
Lire la suiteProvides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
Lire la suiteIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Lire la suiteExplains the fundamentals, advanced technologies, and best practices used in planning, designing, building and operating ...
Lire la suiteCovering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions ...
Lire la suiteIn Digital Finance: Security Tokens and Unlocking the Real Potential Blockchain, readers will realize why security tokens ...
Lire la suiteProvides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. ...
Lire la suiteProvides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems ...
Lire la suiteThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Lire la suiteProvides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
Lire la suiteEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Lire la suiteFrom the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...
Lire la suiteUntangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...
Lire la suiteYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Lire la suiteOffers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...
Lire la suiteProvides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...
Lire la suite