Seguridad informática

/ Seguridad informática (900)

  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Critical Research on Scalability and Security Issues in Virtual Cloud Environments
    Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a cri...
    Disponible

    295,18 €

  • Information Security and Ethics
    Quigley
    ...
    Disponible

    93,27 €

  • How to Keep Your Stuff Safe Online
    Raef Meeuwisse
    Any everyday person can protect themselves from the majority of online cybercrime.  All you have to do is follow some basic security steps, most of which are completely FREE to implement.This short guide is designed to be an easy and quick read that helps you identify and implement basic but highly effective security in a matter of hours.  The main security guidance is covered ...
    Disponible

    6,66 €

  • Security Breaches and Threat Prevention in the Internet of Things
    As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategie...
    Disponible

    236,13 €

  • Decentralized Computing Using Blockchain Technologies and Smart Contracts
    S. Adarsh / S. Asharaf / SAdarsh / SAsharaf
    Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other applications. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities is a concise and informative source of academic research on the latest developments in bl...
    Disponible

    157,24 €

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Information Security in Diverse Computing Environments
    Anne Kayem
    Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical fram...
    Disponible

    321,34 €

  • Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
    Rawat
    While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile a...
    Disponible

    256,74 €

  • Security Engineering for Cloud Computing
    Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing. Security Engineer...
    Disponible

    255,61 €

  • Cyber Warfare and Cyber Terrorism
    ...
    Disponible

    154,06 €

  • Securing the Information Infrastructure
    Florence M. Kizza / Florence MKizza / Joseph M. Kizza / Joseph MKizza
    ...
    Disponible

    93,46 €

  • Computer Synthesized Speech Technologies
    While the use of technology to compensate for individual shortcomings is nothing new, there has been tremendous progress in the application of technology toward assisting individuals with disabilities, particularly with the use of computer synthesized speech (CSS) to help speech impaired people communicate using voice. Computer Synthesized Speech Technologies: Tools for Aiding ...
    Disponible

    321,20 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
    Disponible

    22,04 €

  • Integrating Security and Software Engineering
    ...
    Disponible

    88,57 €

  • Cryptographic Solutions for Secure Online Banking and Commerce
    Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking an...
    Disponible

    262,60 €

  • National Security and Counterintelligence in the Era of Cyber Espionage
    Eugenie de Silva
    As technology continues to advance, the threats imposed on these innovations also continue to grow and evolve. As such, law enforcement specialists diligently work to counteract these threats, promote national safety, and defend the individual rights of citizens. National Security and Counterintelligence in the Era of Cyber Espionage highlights technological advancements in int...
    Disponible

    262,41 €

  • Handbook of Research on Information Security and Assurance
    Jatinder NDGupta
    While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to ...
    Disponible

    348,16 €

  • Learn Social Engineering
    Dr. Erdal Ozkaya / DrErdal Ozkaya
    ...
    Disponible

    61,18 €

  • Managerial Guide for Handling Cyber-Terrorism and Information Warfare
    Janczewski
    ...
    Disponible

    85,70 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Trust and Technology in a Ubiquitous Modern Environment
    In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-main...
    Disponible

    236,44 €

  • Cybersecurity Fundamentals Explained
    Brian Mackay
    The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrac...
    Disponible

    28,22 €

  • Forecasting Cyber Crimes in the Age of the Metaverse
    Hossam Nabil Elshenraki
    As the metaverse rapidly evolves, a comprehensive examination of the emerging threats and challenges is imperative. In the groundbreaking exploration within Forecasting Cyber Crimes in the Age of the Metaverse , the intersection of technology, crime, and law enforcement is investigated, and it provides valuable insights into the potential risks and strategies for combating cybe...
    Disponible

    248,73 €

  • Implementing DevSecOps Practices
    Vandana Verma Sehgal
    Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipelineKey FeaturesUnderstand security posture management to maintain a resilient operational environmentMaster DevOps security and blend it with software engineering to create robust security protocolsAdopt the left-shift approach to integrate early-stage security i...
    Disponible

    48,64 €

  • Malware Science
    Shane Molinari
    Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscapeKey FeaturesGet introduced to three primary AI tactics used in malware and detectionLeverage data science tools to combat critical cyber threatsUnderstand regulatory requirements for using AI...
    Disponible

    69,35 €

  • CHFI Computer Hacking Forensic Investigator The Ultimate Study Guide to Ace the Exam
    Jake T Mills
    Unlock the world of digital investigation and fortify your expertise in Computer Hacking Forensic Investigation (CHFI) with this comprehensive guide. Tailored specifically for aspirants aiming to ace the CHFI certification, this book is a roadmap to success, blending theory with hands-on practice test questions and detailed answers. Explore the intricate landscape of digital fo...
    Disponible

    34,54 €

  • Incredible Mysteries
    Julian Hawthorne
    Step into the enigmatic world of cyberspace with 'Incredible Mysteries: Internet Mysteries,' a captivating exploration of the internet’s most baffling enigmas. This book takes readers on a journey through the digital realm’s darkest corners, unveiling mysteries that have perplexed the online community and beyond.Embark on a quest to unravel the secrets of Cicada 3301, a complex...
    Disponible

    11,00 €

  • Biz Sorduk ChatGPT Yanıtladı
    Erdal Turna
    Yapay zeka hakkında ne kadar bilgi sahibisiniz? Hadi kendinizi test edin! - Shakespeare’in eserlerini yapay zeka yeniden yazsa, nasıl bir sonuç ortaya çıkar?- Sokrates’in bakış açısına göre bir yapay zeka çağı analizi nasıl olurdu?- Yapay zeka, hukuk sistemimizin çelişkilerini ortaya çıkarabilir mi?- İnsanlığın düşünsel altyapısını yapay zeka ile tamamen değiştirmek mümkün mü?-...
    Disponible

    11,65 €

  • OSCP Offensive Security Certified Professional Practice Tests With Answers To Pass the OSCP Ethical Hacking Certification Exam
    Jake T Mills
    Embark on a transformative journey into the world of cybersecurity mastery with mastering offensive security. This comprehensive guide is meticulously crafted to propel aspiring professionals through the intricate realm of offensive security, serving as an indispensable roadmap to conquering the challenges of the coveted Offensive Security Certified Professional (OSCP) certific...
    Disponible

    40,44 €