Tous les livres du thème "

Security

" : 47 Résultat(s)
page 1 sur 5 suivant

Proceedings of the 2nd International Academic Conference on Blockchain, Information Technology and Smart Finance (ICBIS 2023)

Mohammad Zoynul Abedin , Wan Azman Saini Bin Wan Ngah , Jerome Yen

This is an open access book.With the rapid development of modern economy and Internet technology, the traditional financial industry has to develop Internet finance to provide better services and meet the needs of the times. It is against this background that the...



 COMMENCER GRATUITEMENT

Gratuit
acheter l'ebook

The Definitive Guide to PCI DSS Version 4

Arthur B. Cooper Jr. , Jeff Hall , David Mundhenk , Ben Rothke

This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor...

2023-05-24 |

Apress



 COMMENCER GRATUITEMENT

62,11 l'ebook
acheter l'ebook

Bitcoin und Blockchain

Patrick Rosenberger

Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft könnten sämtliche Bestandteile unseres Lebens unter dem Einfluss eines dezentralen Netzwerks stehen. Banken,...

2023-04-26 |

Springer



 COMMENCER GRATUITEMENT

19,71 l'ebook
acheter l'ebook

Digitale Kompetenz

Volker Lang

Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen...

2023-01-18 |

Springer Vieweg



 COMMENCER GRATUITEMENT

24,64 l'ebook
acheter l'ebook

Insolvency and Bankruptcy Reforms in India

Susan Thomas

This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that...



 COMMENCER GRATUITEMENT

116,04 l'ebook
acheter l'ebook

Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants

Sven Matthias Peldszus

For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the...

2022-07-13 |

Springer Vieweg



 COMMENCER GRATUITEMENT

94,94 l'ebook
acheter l'ebook

Theoretical Cybersecurity

Collectif

There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text...

2022-07-12 |

Apress



 COMMENCER GRATUITEMENT

56,19 l'ebook
acheter l'ebook

40 Years of Experience with the National Market System (NMS)

John Aidan Byrne , Robert A. Schwartz , Eileen Stempel

In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...



 COMMENCER GRATUITEMENT

147,69 l'ebook
acheter l'ebook

IT Security Controls

Oben Kuyucu , Virgilio Viegas

Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your...

2022-03-23 |

Apress



 COMMENCER GRATUITEMENT

66,05 l'ebook
acheter l'ebook

Phishing and Communication Channels

Gunikhan Sonowal

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive...

2021-12-08 |

Apress



 COMMENCER GRATUITEMENT

56,19 l'ebook
acheter l'ebook

page 1 sur 5 suivant