216 rezultatov
-
-
Security Issues for Wireless Sensor Networks(2022) VERMA, PARAG,DUMKA, ANKUR,BHARDWAJ, ANUJ,KAUR, NAVNEET,ASHOK, ALAKNANDA (PANTNAGAR, COLLEGE OF TECHNOLOGY, G.B. PANT UNIVERSITY OF AGRICULTURE AND TECHNOLOGY, RUDRAPUI, UTTARAKHAND, INDIA),BISHT, ANIL KUMAR,GANGWAR, RAKSH PAL SINGHThis book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor networkVezava: Trda77,51 €
-
Information Security Policies, Procedures, and Standards(2020) LANDOLL, DOUGLAS J.This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. HighlightingVezava: Mehka62,71 €
-
Cybersecurity for Everyone(2020) SKILLICORN, DAVID B. (QUEEN'S UNIVERSITY, KINGSTON, ONTARIO, CANADA)Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position to do something about cybersecurity do not have the skills to understand the issues fully. Cybersecurity for Everyone is intended to help by describing the issVezava: Trda48,23 €
-
Data Power(2021) THATCHER, JIM E.,DALTON, CRAIG M.An introduction to learning how to protect ourselves and organise against Big DataVezava: Mehka35,63 €
-
Handbook of Applied Cryptography(1996) MENEZES, ALFRED J. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA),KATZ, JONATHAN,VAN OORSCHOT, PAUL C. (OTTAWA, ONTARIO, CANADA),VANSTONE, SCOTT A. (UNIVERSITY OF WATERLOO, ONTARIO, CANADA)Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatVezava: Trda259,41 €
-
Biometrics(2018) FAIRHURST, MICHAEL (PROFESSOR OF COMPUTER VISION, UNIVERSITY OF KENT)With the rise of digital technologies the need for effective means of identification has grown enormously. Biometrics is the rapidly growing science of identifying individuals through biological characteristics, from iris patterning to voice recognition.Vezava: Mehka14,01 €
-
Hardware Security(2018) BHUNIA, SWARUP (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA),TEHRANIPOOR, MARK M., PH.D. (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA)Vezava: Mehka127,96 €
-
Google Hacking for Penetration Testers(2015) GARDNER, BILL (BILL GARDNER OSCP, I-NET+, SECURITY+, ASST. PROF. AT MARSHALL UNIVERSITY),LONG, JOHNNY (SECURITY RESEARCHER, FOUNDER OF HACKERS FOR CHARITY),BROWN, JUSTIN (INFORMATION SECURITY PROFESSIONAL AT ONE WORLDS LAB)Vezava: Mehka77,10 €
-
Internet of Things(2020) SHACKELFORD, SCOTT J. (CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, INDIANA UNIVERSITY BLOOMINGTON)Vezava: Mehka15,41 €
-
Industry Unbound(2021) WALDMAN, ARI EZRA (NORTHEASTERN UNIVERSITY, BOSTON)Using rich first-hand sources, Waldman provides an unprecedented account of how tech companies undermine privacy law from the inside. Industry Unbound brings together seemingly separate issues–discourse, law, and design–to reveal tech companies' strategieVezava: Trda39,19 €
-
CISM Certified Information Security Manager Study Guide(2022) CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME)Vezava: Mehka64,53 €
-
Network Security Assessment 3e(2017) MCNAB, CHRISHow secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testingVezava: Mehka56,06 €
-
(R)evolution(2020) QUENOY, IRINA DUPresents a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies.Vezava: Trda361,56 €
-
Introduction to Mathematical Cryptography(2014) HOFFSTEIN, JEFFREY,PIPHER, JILL,SILVERMAN, JOSEPH H.An Introduction to Mathematical CryptographyVezava: Trda96,46 €
-
Freedom to Think(2022) ALEGRE, SUSIEThe story of our most fundamental human right - and why it is in grave dangerVezava: Trda33,27 €
-