Seguridad informática

/ Seguridad informática (912)

  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Critical Research on Scalability and Security Issues in Virtual Cloud Environments
    Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a cri...
    Disponible

    295,18 €

  • Information Security and Ethics
    Quigley
    ...
    Disponible

    93,27 €

  • How to Keep Your Stuff Safe Online
    Raef Meeuwisse
    Any everyday person can protect themselves from the majority of online cybercrime.  All you have to do is follow some basic security steps, most of which are completely FREE to implement.This short guide is designed to be an easy and quick read that helps you identify and implement basic but highly effective security in a matter of hours.  The main security guidance is covered ...
    Disponible

    6,66 €

  • Security Breaches and Threat Prevention in the Internet of Things
    As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategie...
    Disponible

    236,13 €

  • Decentralized Computing Using Blockchain Technologies and Smart Contracts
    S. Adarsh / S. Asharaf / SAdarsh / SAsharaf
    Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other applications. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities is a concise and informative source of academic research on the latest developments in bl...
    Disponible

    157,24 €

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Information Security in Diverse Computing Environments
    Anne Kayem
    Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical fram...
    Disponible

    321,34 €

  • Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
    Rawat
    While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile a...
    Disponible

    256,74 €

  • Security Engineering for Cloud Computing
    Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing. Security Engineer...
    Disponible

    255,61 €

  • Cyber Warfare and Cyber Terrorism
    ...
    Disponible

    154,06 €

  • Securing the Information Infrastructure
    Florence M. Kizza / Florence MKizza / Joseph M. Kizza / Joseph MKizza
    ...
    Disponible

    93,46 €

  • Computer Synthesized Speech Technologies
    While the use of technology to compensate for individual shortcomings is nothing new, there has been tremendous progress in the application of technology toward assisting individuals with disabilities, particularly with the use of computer synthesized speech (CSS) to help speech impaired people communicate using voice. Computer Synthesized Speech Technologies: Tools for Aiding ...
    Disponible

    321,20 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
    Disponible

    22,04 €

  • Integrating Security and Software Engineering
    ...
    Disponible

    88,57 €

  • Cryptographic Solutions for Secure Online Banking and Commerce
    Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking an...
    Disponible

    262,60 €

  • National Security and Counterintelligence in the Era of Cyber Espionage
    Eugenie de Silva
    As technology continues to advance, the threats imposed on these innovations also continue to grow and evolve. As such, law enforcement specialists diligently work to counteract these threats, promote national safety, and defend the individual rights of citizens. National Security and Counterintelligence in the Era of Cyber Espionage highlights technological advancements in int...
    Disponible

    262,41 €

  • Handbook of Research on Information Security and Assurance
    Jatinder NDGupta
    While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to ...
    Disponible

    348,16 €

  • Learn Social Engineering
    Dr. Erdal Ozkaya / DrErdal Ozkaya
    ...
    Disponible

    61,18 €

  • Managerial Guide for Handling Cyber-Terrorism and Information Warfare
    Janczewski
    ...
    Disponible

    85,70 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Trust and Technology in a Ubiquitous Modern Environment
    In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-main...
    Disponible

    236,44 €

  • From Exposed to Secure
    Cybersecurity And Compliance / Featuring Cybersecurity And Compliance E
    From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your resources to eliminate exposure and minimize risk. Top cybersecurity and compliance professionals from around the world share their decades of experience in utilizing data protection regulations and complete security measures to protect your company from fines, la...
    Disponible

    15,12 €

  • Emerging Technologies and Security in Cloud Computing
    In today’s digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the paramount issues being data privacy and security. The goal of protecting sensitive information from cyber threats and ensuring confid...
    Disponible

    413,42 €

  • Emerging Technologies and Security in Cloud Computing
    In today’s digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the paramount issues being data privacy and security. The goal of protecting sensitive information from cyber threats and ensuring confid...
    Disponible

    314,90 €

  • Cybersecurity Fundamentals Explained
    Brian Mackay
    The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrac...
    Disponible

    28,22 €

  • Futuristic e-Governance Security With Deep Learning Applications
    In today’s rapidly advancing digital world, governments face the dual challenge of harnessing technology to enhance security systems while safeguarding sensitive data from cyber threats and privacy breaches. Futuristic e-Governance Security With Deep Learning Applications provides a timely and indispensable solution to these pressing concerns. This comprehensive book takes a gl...
    Disponible

    274,82 €

  • Futuristic e-Governance Security With Deep Learning Applications
    In today’s rapidly advancing digital world, governments face the dual challenge of harnessing technology to enhance security systems while safeguarding sensitive data from cyber threats and privacy breaches. Futuristic e-Governance Security With Deep Learning Applications provides a timely and indispensable solution to these pressing concerns. This comprehensive book takes a gl...
    Disponible

    360,27 €

  • Microsoft Intune Cookbook
    Andrew Taylor
    Get started with Microsoft Intune and explore its many facets, including task automation with Microsoft GraphKey FeaturesCreate and configure your new mobile device management (MDM) environmentBecome an Intune pro by mastering compliance policies, monitoring techniques, reporting practices, and application deployment proceduresLearn how to manage Windows, Android, iOS, and macO...
    Disponible

    65,20 €

  • Forecasting Cyber Crimes in the Age of the Metaverse
    Hossam Nabil Elshenraki
    As the metaverse rapidly evolves, a comprehensive examination of the emerging threats and challenges is imperative. In the groundbreaking exploration within Forecasting Cyber Crimes in the Age of the Metaverse , the intersection of technology, crime, and law enforcement is investigated, and it provides valuable insights into the potential risks and strategies for combating cybe...
    Disponible

    248,73 €