Seguridad informática

/ Seguridad informática (3593)

  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Critical Research on Scalability and Security Issues in Virtual Cloud Environments
    Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a cri...
    Disponible

    295,18 €

  • Information Security and Ethics
    Quigley
    ...
    Disponible

    105,56 €

  • How to Keep Your Stuff Safe Online
    Raef Meeuwisse
    Any everyday person can protect themselves from the majority of online cybercrime.  All you have to do is follow some basic security steps, most of which are completely FREE to implement.This short guide is designed to be an easy and quick read that helps you identify and implement basic but highly effective security in a matter of hours.  The main security guidance is covered ...
    Disponible

    7,26 €

  • Security Breaches and Threat Prevention in the Internet of Things
    As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategie...
    Disponible

    236,13 €

  • Decentralized Computing Using Blockchain Technologies and Smart Contracts
    S. Adarsh / S. Asharaf / SAdarsh / SAsharaf
    Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other applications. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities is a concise and informative source of academic research on the latest developments in bl...
    Disponible

    157,24 €

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Information Security in Diverse Computing Environments
    Anne Kayem
    Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical fram...
    Disponible

    321,34 €

  • Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
    Rawat
    While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile a...
    Disponible

    256,74 €

  • Security Engineering for Cloud Computing
    Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing. Security Engineer...
    Disponible

    255,61 €

  • Cyber Warfare and Cyber Terrorism
    ...
    Disponible

    217,45 €

  • Securing the Information Infrastructure
    Florence M. Kizza / Florence MKizza / Joseph M. Kizza / Joseph MKizza
    ...
    Disponible

    131,88 €

  • Computer Synthesized Speech Technologies
    While the use of technology to compensate for individual shortcomings is nothing new, there has been tremendous progress in the application of technology toward assisting individuals with disabilities, particularly with the use of computer synthesized speech (CSS) to help speech impaired people communicate using voice. Computer Synthesized Speech Technologies: Tools for Aiding ...
    Disponible

    321,20 €

  • Socioeconomic and Legal Implications of Electronic Intrusion
    In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for individuals and businesses. Socioeconomic and Legal Implications of Electronic Intrusion focuses on abusive and illegal practices of penetration in the sphere of private communications. A leading international reference source withi...
    Disponible

    256,05 €

  • Integrating Security and Software Engineering
    ...
    Disponible

    125,06 €

  • Cryptographic Solutions for Secure Online Banking and Commerce
    Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking an...
    Disponible

    262,60 €

  • National Security and Counterintelligence in the Era of Cyber Espionage
    Eugenie de Silva
    As technology continues to advance, the threats imposed on these innovations also continue to grow and evolve. As such, law enforcement specialists diligently work to counteract these threats, promote national safety, and defend the individual rights of citizens. National Security and Counterintelligence in the Era of Cyber Espionage highlights technological advancements in int...
    Disponible

    262,41 €

  • Handbook of Research on Information Security and Assurance
    Jatinder NDGupta
    While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to ...
    Disponible

    348,16 €

  • Learn Social Engineering
    Dr. Erdal Ozkaya / DrErdal Ozkaya
    ...
    Disponible

    61,18 €

  • Managerial Guide for Handling Cyber-Terrorism and Information Warfare
    Janczewski
    ...
    Disponible

    111,81 €

  • Multidisciplinary Perspectives in Cryptology and Information Security
    Al Maliky
    With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applicat...
    Disponible

    321,63 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Trust and Technology in a Ubiquitous Modern Environment
    In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-main...
    Disponible

    236,44 €

  • You’ll See This Message When It Is Too Late
    Josephine Wolff
    ...
    Disponible

    28,65 €

  • CompTIA Security+ SY0-701 Practice Tests
    Mark McGinley
    Turn your exam anxiety into confidence with laser-focused practice tests that simulate the real the CompTIA Security+ SY0-701 exam experience to comprehensively test your knowledge and exam prepKey Features:- Work through rigorously aligned mock questions with 100% coverage of the latest SY0-701 exam- Strategic practice tests designed to not just test, but to transform your unc...
    Disponible

    35,59 €

  • Integrating Artificial Intelligence in Cybersecurity and Forensic Practices
    The exponential rise in digital transformation has brought unprecedented advances and complexities in cybersecurity and forensic practices. As cyber threats become increasingly sophisticated, traditional security measures alone are no longer sufficient to counter the dynamic landscape of cyber-attacks, data breaches, and digital fraud. The emergence of Artificial Intelligence (...
    Disponible

    347,89 €

  • Integrating Artificial Intelligence in Cybersecurity and Forensic Practices
    The exponential rise in digital transformation has brought unprecedented advances and complexities in cybersecurity and forensic practices. As cyber threats become increasingly sophisticated, traditional security measures alone are no longer sufficient to counter the dynamic landscape of cyber-attacks, data breaches, and digital fraud. The emergence of Artificial Intelligence (...
    Disponible

    262,44 €

  • Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance
    In an era defined by rapid technological advancement and a pressing need for effective governance, the intersection of machine learning and cybersecurity has emerged as a pivotal area of exploration and innovation. E-governance serves as a vital framework for enhancing the delivery of public services, increasing governmental transparency, and fostering citizen engagement. Howev...
    Disponible

    282,07 €

  • Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance
    In an era defined by rapid technological advancement and a pressing need for effective governance, the intersection of machine learning and cybersecurity has emerged as a pivotal area of exploration and innovation. E-governance serves as a vital framework for enhancing the delivery of public services, increasing governmental transparency, and fostering citizen engagement. Howev...
    Disponible

    216,22 €