|
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...
Editeur :
Wiley
Parution :
2016-08-19
PDF, ePub
|
Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...
Editeur :
John Murray
Parution :
2016-08-18
ePub
|
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of...
Editeur :
Springer
Parution :
2016-08-16
Collection :
Advances in Intelligent Systems and Computing
ePub
|
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...
Editeur :
Springer
Parution :
2016-05-27
Collection :
Advanced Sciences and Technologies for Security Applications
ePub
|
This
book covers three major parts of Big Data: concepts, theories and
applications. Written by world-renowned leaders in Big Data, this book explores
the problems, possible solutions and directions for Big Data in research and
practice. It also focuses on...
Editeur :
Springer
Parution :
2016-03-03
PDF, ePub
|
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...
Editeur :
Wiley-ISTE
Parution :
2016-03-03
PDF, ePub
|
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...
Editeur :
Springer
Parution :
2015-09-24
Collection :
Lecture Notes in Electrical Engineering
PDF, ePub
|
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...
Editeur :
Wiley
Parution :
2015-08-27
PDF, ePub
|
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...
Editeur :
Wiley
Parution :
2015-07-10
PDF, ePub
|
|
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time....
Editeur :
Springer
Parution :
2015-05-30
PDF, ePub
|
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable...
Editeur :
Wiley
Parution :
2015-04-16
PDF, ePub
|
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...
Editeur :
Wiley
Parution :
2015-03-18
PDF, ePub
|
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...
Editeur :
Wiley
Parution :
2015-02-17
PDF, ePub
|
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most...
Editeur :
SAGE Publications Ltd
Parution :
2014-09-15
PDF
|
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such...
Editeur :
Springer
Parution :
2014-07-28
ePub
|
?What will business software look like in the future? And how will it be developed?This book covers the proceedings of the first international conference on Future Business Software – a new think tank discussing the trends in enterprise software with speakers from...
Editeur :
Springer
Parution :
2014-07-08
Collection :
Progress in IS
ePub
|
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of...
Editeur :
Springer
Parution :
2014-07-07
Collection :
Computer Communications and Networks
ePub
|
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...
Editeur :
Wiley-ISTE
Parution :
2014-02-19
PDF, ePub
|
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...
Editeur :
Wiley
Parution :
2014-02-12
PDF, ePub
|