Udsalget slutter om
Udvidet returret til d. 31. januar 2025

Datasikkerhed

Her finder du spændende bøger om Datasikkerhed. Nedenfor er et flot udvalg af over 1.000 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Wolfram Gieseke
    213,95 kr.

  • af Kaile Zhou & Lulu Wen
    1.212,95 kr.

  • af Nadhem AlFardan
    488,95 kr.

    Cyber Threat Hunting teaches you how to identify potential breaches of your security. You will learn by exploring real-life scenarios drawn from author Nadhem AlFardan's twenty years in information security. Beginning with the fundamentals, you will build a practical hunting framework and discover good practices for optimising and improving expeditions. You will learn to employ advanced techniques that draw on machine learning and statistical analysis to help spot anomalies. Best of all, this practical book comes with downloadable datasets and scenario templates to practice and hone your threat-hunting techniques. About the reader For security, network, and systems professionals familiar with security tools and Python.

  • af Zeitgeist
    108,95 kr.

    This large-format, alphabetized password book is organized by tabs per letter, making it easy, fast, and safe to store and locate important login information of all kinds!Individual tabs for each letter—no more tabs cramming multiple letters into the same space! Perfect for faster lookups and better organization.Removable sticker to go incognito! Don't want text on the cover sharing that it’s a password book? Peel it off!Bonus security tips to encourage maximized online safety. What to do (and what not to do) to stay ahead of scammers. Large trim size for extra space to record over 400 accounts, including important notes, password changes, and non-traditional records such as crypto logins.

  • af Zhengchun Zhou
    874,95 kr.

    This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August ¿ September 2022.The 19 revised full papers and 3 invited talks presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections: structures in finite fields; efficient finite field arithmetic; coding theory; cryptography; sequences.

  • af Jun Cai, Yuan Xu, Jin Li, mfl.
    1.142,95 - 1.147,95 kr.

  • af KC Santosh
    1.026,95 - 1.027,95 kr.

  • af Sridaran Rajagopal, Kalpesh Popat & Parvez Faruki
    871,95 - 1.031,95 kr.

  • af Jordi Guijarro Olivares
    1.423,95 kr.

    The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors' firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians.Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles.CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.

  • af Sujeet Shenoi & Jason Staggs
    1.012,95 kr.

  • af Jiageng Chen
    864,95 kr.

    This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.

  • af Wei Dai, Kristin Lauter & Kim Laine
    1.201,95 kr.

  • af Marcel Kyas
    878,95 kr.

  • af Karim Zkik
    709,95 kr.

  • af Bedir Tekinerdogan
    613,95 kr.

  • af Riccardo Bassoli
    1.313,95 kr.

    Dieses Buch bietet ein Tutorial über Quantenkommunikationsnetze. Die Autoren erörtern aktuelle Paradigmenwechsel in Kommunikationsnetzen, die erforderlich sind, um die einfachen Transportkonzepte der vorherrschenden Netze um Rechen- und Speicherfunktionen zu ergänzen. Sie zeigen, wie diese "softwarisierten" Lösungen neue Wege beschreiten, um Latenzzeiten zu reduzieren und die Ausfallsicherheit zu erhöhen. Die Autoren erörtern, wie diese Lösungen trotz der ihnen innewohnenden Probleme aufgrund der eingeführten Rechenlatenz und des Energieverbrauchs durch hybride klassisch-quantische Kommunikationsnetze gelöst werden können. Das Buch bringt Quantennetzwerke, Quanteninformationstheorie, Quantencomputer und Quantensimulation zusammen.

  • af Santanu Sarkar
    1.247,95 kr.

  • af Michael Kofler
    568,95 kr.

    Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, with step-by-step instructions. With information on mobile, cloud, and IoT security you can fortify your system against any threat!

  • af John Paul Mueller
    488,95 kr.

  • af Shiping Chen
    614,95 kr.

  • af Yong Chen, Mohammad Faisal, Meng Li & mfl.
    1.691,95 kr.

  • af Gunasekaran Manogaran, Bharat S. Rawal & M. Poongodi
    1.300,95 kr.

  • af Vinod Vaikuntanathan & Eike Kiltz
    720,95 - 2.033,95 kr.

  • af Liang-Jie Zhang
    613,95 kr.

  • af Dwayne Natwick
    433,95 kr.

    Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challengesKey Features:Gain a deep understanding of all topics covered in the SC-100 examBenefit from practical examples that will help you put your new knowledge to workDesign a zero-trust architecture and strategies for data, applications, access management, identity, and infrastructureBook Description:Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you'll have everything you need to pass the SC-100 exam.This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you'll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions.By the end of this book, you'll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors.What You Will Learn:Design a zero-trust strategy and architectureEvaluate GRC technical strategies and security operations strategiesDesign security for infrastructureDevelop a strategy for data and applicationsUnderstand everything you need to pass the SC-100 exam with easeUse mock exams and sample questions to prepare for the structure of the examWho this book is for:This book is for a wide variety of cybersecurity professionals - from security engineers and cybersecurity architects to Microsoft 365 administrators, user and identity administrators, infrastructure administrators, cloud security engineers, and other IT professionals preparing to take the SC-100 exam. It's also a good resource for those designing cybersecurity architecture without preparing for the exam. To get started, you'll need a solid understanding of the fundamental services within Microsoft 365, and Azure, along with knowledge of security, compliance, and identity capabilities in Microsoft and hybrid architectures.

  • af Khurana
    1.135,95 kr.

    Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is a comprehensive look at state-of-the-art theory and practical guidelines pertaining to the subject, showcasing recent innovations, emerging trends, and concerns as well as applied challenges encountered, and solutions adopted in the fields of cybersecurity using analytics and machine learning. The text clearly explains theoretical aspects, framework, system architecture, analysis and design, implementation, validation, and tools and techniques of data science and machine learning to detect and prevent cyber threats. Using AI and ML approaches, the book offers strategic defense mechanisms for addressing malware, cybercrime, and system vulnerabilities. It also provides tools and techniques that can be applied by professional analysts to safely analyze, debug, and disassemble any malicious software they encounter. With contributions from qualified authors with significant experience in the field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection explores topics such as: Cybersecurity tools originating from computational statistics literature and pure mathematics, such as nonparametric probability density estimation, graph-based manifold learning, and topological data analysisApplications of AI to penetration testing, malware, data privacy, intrusion detection system (IDS), and social engineeringHow AI automation addresses various security challenges in daily workflows and how to perform automated analyses to proactively mitigate threatsOffensive technologies grouped together and analyzed at a higher level from both an offensive and defensive standpoint Providing detailed coverage of a rapidly expanding field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is an essential resource for a wide variety of researchers, scientists, and professionals involved in fields that intersect with cybersecurity, artificial intelligence, and machine learning.

  • af Deepak Gupta
    2.229,95 - 2.816,95 kr.

    This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2021), held at Jan Wyzykowski University, Poland, during June 2021. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.

  • af Angeline Vagabulle
    328,95 kr.

    A l'heure de l'hyperconnection digitale, que se passerait-il si, en l'espace d'un éclair, quelqu'un détruisait tous nos systèmes informatiques ?27 Juin 2017 : une cyberattaque mondiale frappe de plein fouet plusieurs multi-nationales.Angeline, collaboratrice engagée dans une course effrénée aux résultats, tout comme Martin, son PDG, se trouvent brutalement plongés au milieu du chaos. En l'espace d'une seconde, la sur-activité laisse place au silence du grand vide. Sans information. Et surtout, sans aucun moyen de communication. Après le choc des premières heures et les jours qui s'égrènent, comment faire pour relancer la machine ? Comment le comité de direction va-t-il réagir et faire face à des événements aussi inattendus que terribles ? Cette grande entreprise globale n'est-elle finalement qu'un colosse aux pieds d'argile ? Comment continuer à travailler alors que la totalité des outils de travail ont été détruits ? Laissez-vous emporter dans cette histoire vécue et profondément humaine qui vous plongera dans les affres de la grande déconnection.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.