Shop ebooks online Security - Readzis.co.uk
Readzis program recommandation
727 ebook(s)
Download this eBook Security Infrastructure Technology for Integrated Utilization of Big Data
Add to my wish list

Security Infrastructure Technology for Integrated Utilization of Big Data


Tomoaki Mimoto , Atsuko Miyaji


This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...

Publication date: 2020-04-23
Format: PDF, ePub
Publisher: Springer
Add to basket
Free
Download this eBook 21st Century Prometheus
Add to my wish list

21st Century Prometheus


Maurizio Martellini , Ralf Trapp


This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...

Publication date: 2020-03-11
Format: PDF, ePub
Publisher: Springer
Add to basket
£109,50
Download this eBook Designing a HIPAA-Compliant Security Operations Center
Add to my wish list

Designing a HIPAA-Compliant Security Operations Center


Eric C. Thompson


Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

Publication date: 2020-02-25
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook Solving Identity Management in Modern Applications
Add to my wish list

Solving Identity Management in Modern Applications


Abhishek Hingnikar , Yvonne Wilson


Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Publication date: 2019-12-18
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Identity Attack Vectors
Add to my wish list

Identity Attack Vectors


Morey J. Haber , Darran Rolls


Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

Publication date: 2019-12-17
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Resilience and Hybrid Threats
Add to my wish list

Resilience and Hybrid Threats


Lada Roslycky


Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and...

Publication date: 2019-12-15
Format: PDF
Add to basket
£86,51
Download this eBook Physical and Cyber Safety in Critical Water Infrastructure
Add to my wish list

Physical and Cyber Safety in Critical Water Infrastructure


Oleksandr A. Pivovarov


Water supply and water management services are among the most critical infrastructures in society, providing safe and affordable drinking water, managing wastewater to avoid floods and environmental pollution, and enabling the reuse and replenishment of scarce water...

Publication date: 2019-12-15
Format: PDF
Add to basket
£86,51
Download this eBook Security Controls Evaluation, Testing, and Assessment Handbook
Add to my wish list

Security Controls Evaluation, Testing, and Assessment Handbook


Leighton Johnson


Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential...

Publication date: 2019-11-21
Format: epub DRM-free
Publisher: Academic Press
Add to basket
£81,18
Download this eBook Cybercrime Prevention
Add to my wish list

Cybercrime Prevention


Collectif


This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world.This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an...

Publication date: 2019-11-16
Format: PDF, ePub
Publisher: Palgrave Pivot
Add to basket
£54,99
Download this eBook Handbook of Vascular Biometrics
Add to my wish list

Handbook of Vascular Biometrics


Christoph Busch , Sébastien Marcel , Andreas Uhl , Raymond Veldhuis


This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...

Publication date: 2019-11-14
Format: PDF, ePub
Publisher: Springer
Add to basket
Free
Download this eBook Ransomware Revealed
Add to my wish list

Ransomware Revealed


Nihad A. Hassan


Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Publication date: 2019-11-06
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Security Fundamentals
Add to my wish list

Security Fundamentals


Crystal Panek


A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...

Publication date: 2019-10-24
Format: PDF, ePub
Publisher: Sybex
Add to basket
£32,69
Download this eBook Practical Cryptography in Python
Add to my wish list

Practical Cryptography in Python


Christopher K. Monson , Seth James Nielson


Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Publication date: 2019-09-27
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook Cybercrime Investigators Handbook
Add to my wish list

Cybercrime Investigators Handbook


Graeme Edwards


The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...

Publication date: 2019-09-13
Format: PDF, ePub
Publisher: Wiley
Add to basket
£52,75
Download this eBook The Art of War for Computer Security
Add to my wish list

The Art of War for Computer Security


Tom Madsen


In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks....

Publication date: 2019-09-03
Format: PDF, ePub
Publisher: Springer
Add to basket
£109,50
Download this eBook Engineering Secure and Dependable Software Systems
Add to my wish list

Engineering Secure and Dependable Software Systems


Peter Müller , Alexander Pretschner


Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical...

Publication date: 2019-08-15
Format: PDF
Add to basket
£88,62
Download this eBook Waging Cyber War
Add to my wish list

Waging Cyber War


Jacob G. Oakley


Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....

Publication date: 2019-08-13
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Advances in Human Factors in Cybersecurity
Add to my wish list

Advances in Human Factors in Cybersecurity


Tareq Ahram , Waldemar Karwowski


This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Publication date: 2019-06-05
Format: PDF, ePub
Publisher: Springer
Add to basket
£129,50
Download this eBook The IoT Hacker's Handbook
Add to my wish list

The IoT Hacker's Handbook


Aditya Gupta


Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...

Publication date: 2019-03-30
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook PowerShell and Python Together
Add to my wish list

PowerShell and Python Together


Chet Hosmer


Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...

Publication date: 2019-03-30
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
<< < 678910 >

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés