PICK&READ
Bonjour !
Connectez-vous pour afficher vos livres, identifier ceux en cours de lecture ou déjà lus
Pas encore de compte ?
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server...
Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise...
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books...
Das Buch bietet konkrete Vorschläge zu Unternehmensrichtlinien und zur IT-Sicherheit, zum sicheren IT-Betrieb und zu sicheren IT-Systemen, zum Management und zur Organisation von IT-Sicherheit sowie zum Schutz von Daten. Es ist damit wertvolles Hilfsmittel für...
50 Jahre Lehre in Informatik an den drei Münchner Universitäten (Ludwig-Maximilians-Universität, Technische Universität München und Universität der Bundeswehr Neubiberg) sind der Anlass für diese Sammlung aktueller Informatik-Aktivitäten in Forschung und Lehre im Jahr...
En poursuivant votre navigation, vous acceptez l'utilisation de cookies qui permettront notamment de vous offrir contenus, services, et publicités liés à vos centres d'intérêt.