Tous les livres du thème "

Security

" : 47 Résultat(s)
précédent page 3 sur 5 suivant

Cognitive Modeling for Automated Human Performance Evaluation at Scale

Shujun Li , Patrice Rusconi , Haiyue Yuan

Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In...

2020-09-16 |

Springer

Collection :

Human–Computer Interaction Series



 COMMENCER GRATUITEMENT

63,29 l'ebook
acheter l'ebook

CompTIA Security+ Certification Study Guide

Ahmed F. Sheikh

Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.  Computer network vulnerabilities and threats are covered...

2020-09-12 |

Apress



 COMMENCER GRATUITEMENT

62,11 l'ebook
acheter l'ebook

Firewalls Don't Stop Dragons

Carey Parker

Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your...

2020-09-11 |

Apress



 COMMENCER GRATUITEMENT

36,47 l'ebook
acheter l'ebook

Information Fusion in Distributed Sensor Networks with Byzantines

Andrea Abrardo , Mauro Barni , Kassem Kallas , Benedetta Tondi

This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...



 COMMENCER GRATUITEMENT

126,59 l'ebook
acheter l'ebook

Privileged Attack Vectors

Morey J. Haber

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...

2020-06-13 |

Apress



 COMMENCER GRATUITEMENT

78,87 l'ebook
acheter l'ebook

Security Infrastructure Technology for Integrated Utilization of Big Data

Tomoaki Mimoto , Atsuko Miyaji

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...

2020-04-23 |

Springer



 COMMENCER GRATUITEMENT

Gratuit
acheter l'ebook

21st Century Prometheus

Maurizio Martellini , Ralf Trapp

This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...

2020-03-11 |

Springer



 COMMENCER GRATUITEMENT

116,04 l'ebook
acheter l'ebook

Designing a HIPAA-Compliant Security Operations Center

Eric C. Thompson

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

2020-02-25 |

Apress



 COMMENCER GRATUITEMENT

56,19 l'ebook
acheter l'ebook

Identity Attack Vectors

Morey J. Haber , Darran Rolls

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

2019-12-17 |

Apress



 COMMENCER GRATUITEMENT

46,34 l'ebook
acheter l'ebook

Handbook of Vascular Biometrics

Christoph Busch , Sébastien Marcel , Andreas Uhl , Raymond Veldhuis

This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...



 COMMENCER GRATUITEMENT

Gratuit
acheter l'ebook

précédent page 3 sur 5 suivant