205 rezultatov
- 
                  
                    
                  
                  
  
  
     Data and Goliath(2016) SCHNEIER, BRUCE (HARVARD KENNEDY SCHOOL)A shocking look at the ways governments and organisations track and control us and the ways we can fight back.Vezava: Mehka23,27 € Data and Goliath(2016) SCHNEIER, BRUCE (HARVARD KENNEDY SCHOOL)A shocking look at the ways governments and organisations track and control us and the ways we can fight back.Vezava: Mehka23,27 €
- 
                  
                    
                  
                  
  
  
     Autonomous Cyber Deception(2019)It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercisesVezava: Trda91,86 € Autonomous Cyber Deception(2019)It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercisesVezava: Trda91,86 €
- 
                  
                    
                  
                  
  
  
     Cybersecurity ABCs(2021) BARKER, JESSICA,DAVIS, ADRIAN,HALLAS, BRUCE,MC MAHON, CIARANCybersecurity problems don’t always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security cultuVezava: Mehka44,54 € Cybersecurity ABCs(2021) BARKER, JESSICA,DAVIS, ADRIAN,HALLAS, BRUCE,MC MAHON, CIARANCybersecurity problems don’t always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security cultuVezava: Mehka44,54 €
- 
                  
                    
                  
                  
  
  
     Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems(2015) JOSIAH DYKSTRAVezava: Mehka56,06 € Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems(2015) JOSIAH DYKSTRAVezava: Mehka56,06 €
- 
                  
                    
                  
                  
  
  
     Data in Society(2019)This book analyses societal trends and controversies related to developments in data ownership, access, construction, dissemination and interpretation, looking at the ways that society interacts with and uses statistical data.Vezava: Mehka60,81 € Data in Society(2019)This book analyses societal trends and controversies related to developments in data ownership, access, construction, dissemination and interpretation, looking at the ways that society interacts with and uses statistical data.Vezava: Mehka60,81 €
- 
                  
                    
                  
                  
  
  
     International Relations in the Cyber Age - The Co-Evolution Dilemma(2019) NAZLI CHOUCRIVezava: Trda63,96 € International Relations in the Cyber Age - The Co-Evolution Dilemma(2019) NAZLI CHOUCRIVezava: Trda63,96 €
- 
                  
                    
                  
                  
  
  
     Cybersecurity - The Insights You Need from Harvard Business Review(2019) ALEX BLAUVezava: Mehka24,94 € Cybersecurity - The Insights You Need from Harvard Business Review(2019) ALEX BLAUVezava: Mehka24,94 €
- 
                  
                    
                  
                  
  
  
     Crime Dot Com(2021) WHITE, GEOFFA thrilling, true account of computer hacking – past, present and future.Vezava: Mehka18,21 € Crime Dot Com(2021) WHITE, GEOFFA thrilling, true account of computer hacking – past, present and future.Vezava: Mehka18,21 €
- 
                  
                    
                  
                  
  
  
     Malware Data Science(2018) SAXE, JOSHUA,SANDERS, HILLARYIdentify, analyse, and classify large-scale malware using machine learning and data visualisation.Vezava: Mehka69,68 € Malware Data Science(2018) SAXE, JOSHUA,SANDERS, HILLARYIdentify, analyse, and classify large-scale malware using machine learning and data visualisation.Vezava: Mehka69,68 €
- 
                  
                    
                  
                  
  
  
     Rootkits and Bootkits(2019) MATROSOV, ALEX,RODIONOV, EUGENE,BRATUS, SERGEYA master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats.Vezava: Mehka61,94 € Rootkits and Bootkits(2019) MATROSOV, ALEX,RODIONOV, EUGENE,BRATUS, SERGEYA master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats.Vezava: Mehka61,94 €
- 
                  
                    
                  
                  
  
  
     Building an Effective Security Program(2020) WILLIAMS, CHRIS,DONALDSON, SCOTT,SIEGEL, STANLEYVezava: Mehka73,50 € Building an Effective Security Program(2020) WILLIAMS, CHRIS,DONALDSON, SCOTT,SIEGEL, STANLEYVezava: Mehka73,50 €
- 
                  
                    
                  
                  
  
  
     Quantum Key Distribution(2021) WOLF, RAMONAThis textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications.Vezava: Mehka58,20 € Quantum Key Distribution(2021) WOLF, RAMONAThis textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications.Vezava: Mehka58,20 €
 
     
     
     
      




 
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
          





 
              
             
              
             
              
             
              
            