Vi bøger
Levering: 1 - 2 hverdage

Datasikkerhed

Her finder du spændende bøger om Datasikkerhed. Nedenfor er et flot udvalg af over 1.989 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af D. Lakshmi
    2.441,95 - 3.188,95 kr.

  • af Noor Zaman Jhanjhi
    1.936,95 - 2.537,95 kr.

  • af Panos Louridas
    158,95 kr.

    A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics.We all keep secrets—from our gym locker codes to our email passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In this fascinating book Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets. Louridas explains just how cryptography works to keep our communications confidential, tracing it back all the way to its ancient roots. Then he follows its long and winding path to where we are today and reads the signs that point to where it may go tomorrow.A few years back, interest in cryptography was restricted to specialists. Today, as we all live our lives attuned to our digital footprint and the privacy issues it entails, it becomes more and more essential to have a basic understanding of cryptography and its applications to everyday life. Starting with classical cryptography, Cryptography takes the reader all the way up to the twenty-first century cryptographic applications that underpin our lives in the digital realm. Along the way, Louridas also explains concepts such as symmetric cryptography, asymmetric cryptography, cryptographic protocols and applications, and finally, quantum and post-Quantum cryptography as well as the links between cryptography and computer security.

  • af Amin Shokri Gazafroudi
    1.245,95 - 1.716,95 kr.

  • af Edward Franklin
    962,95 kr.

    "Cybersecurity for Everyone" is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks to preventing malware infections and ransomware attacks, this book equips readers with the knowledge and skills needed to protect themselves and their data in the digital world. Whether you're a tech novice or an experienced user, this book is a must-read for anyone who wants to stay safe online.

  • af Andreas Schäffler
    879,95 kr.

    Dieses Buch bietet Sicherheit: Effiziente Diagnostik, verwertbare Ergebnisse, zuverlässige Bewertung. Fehlinterpretationen können zu aufwändiger Zusatzdiagnostik und Therapie führen und belasten unnötig den Patienten.Für alle, die endokrinologische Funktionstests durchführen und bewerten: Endokrinologen, Diabetologen, Gynäkologen, Urologen, Andrologen, Pädiater, Internisten ¿Alles, was wichtig istDie 200 wichtigsten Funktionstests und HormonparameterRadiologisches/nuklearmedizinisches Basiswissen für die DiagnostikGenotyp-Phänotyp-Beziehung für genetisch bedingte EndokrinopathienValidierte Scoring- und Grading-Systeme für die EndokrinologieAusführliche Tabellen zu Normbereichen und verlässlichen Cut-off-Werten unter besonderer Berücksichtigung von Geschlecht, Alter, BMI, Pubertätsphasen, Zyklusphasen, akuten Erkrankungen, Medikamenten ¿Detailiert und praxisrelevantIndikationen, Kontraindikationen, NebenwirkungenTestvorbereitung, RahmenbedingungenKonkrete Handlungsanleitungen zur TestdurchführungSichere Bewertung der ErgebnissePraxistipps und potentielle FallstrickeNEU u.a24-h-Blutdruckmessung, Analyse der PulswellengeschwindigkeitDurchführung und Auswertung der SchilddrüsenpunktionOsteodensitometrie mit BefundungsbeispielenScoring/Grading-Systeme in der Endokrinologie incl. Fibrose ScoresTestverfahren für periphere und autonome Neuropathie-DiagnostikOrientierend an Empfehlungen nationaler und internationaler Fachgesellschaften

  • af Sandeep Kumar Panda
    1.714,95 - 1.723,95 kr.

  • af Ian Wild
    387,95 kr.

    Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey FeaturesDemonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionOnline learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What you will learnMeasure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is forIf you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.Table of ContentsMoodle Security - First StepsMoodle Threat ModelingSecurity Industry StandardsBuilding a Secure Linux ServerEndpoint ProtectionDenial of Service ProtectionBackup And Disaster RecoveryMeeting Data Protection RequirementsMoodle Security AuditUnderstanding VulnerabilitiesInfrastructure Monitoring

  • af Hussain Ben-azza
    2.527,95 kr.

    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain Ben-Azza, this book presents a curated collection of scientific articles encompassing multidisciplinary themes like computer science, artificial intelligence, electrical engineering, and control systems. By consolidating cutting-edge research and methodologies, this book empowers scholars and professionals to improve the design, modeling, and control of complex systems. It provides practical solutions, showcases new ideas, and explores innovative technologies to enhance performance, efficiency, and safety. With a meticulous selection process involving internationally recognized scientific committees, this book ensures the highest quality standards, making it a reliable reference for researchers, PhD students, and academics. Delve into the wide range of topics covered, from artificial intelligence to smart systems, and unlock the potential of complex systems control to advance your research endeavors.

  • af Abu Bakar Abdul Hamid
    2.362,95 kr.

    In today's rapidly advancing digital world, governments face the dual challenge of harnessing technology to enhance security systems while safeguarding sensitive data from cyber threats and privacy breaches. Futuristic e-Governance Security With Deep Learning Applications provides a timely and indispensable solution to these pressing concerns. This comprehensive book takes a global perspective, exploring the integration of intelligent systems with cybersecurity applications to protect deep learning models and ensure the secure functioning of e-governance systems. By delving into cutting-edge techniques and methodologies, this book equips scholars, researchers, and industry experts with the knowledge and tools needed to address the complex security challenges of the digital era. The authors shed light on the current state-of-the-art methods while also addressing future trends and challenges. Topics covered range from skill development and intelligence system tools to deep learning, machine learning, blockchain, IoT, and cloud computing. With its interdisciplinary approach and practical insights, this book serves as an invaluable resource for those seeking to navigate the intricate landscape of e-governance security, leveraging the power of deep learning applications to protect data and ensure the smooth operation of government systems.

  • af Lars aka Ghandy Sobiraj
    377,95 kr.

  • af Anand Nayyar
    1.343,95 - 2.092,95 kr.

  • af Xuemin (Sherman) Shen
    1.526,95 kr.

    This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions.

  • af Hassan Haes Alhelou
    1.477,95 kr.

  • af Bharat Nishad
    177,95 kr.

    At the beginning of this Book, you will get a breakdown of the world of ethical hacking. If you ever wondered what ethical hacking is or what an ethical hacker does, this is for you. This section will be covered by a certified ethical hacker (CEH) and trainer who has 20 years of experience in the world of information security.Next, we will go into Kali Linux which is the ethical hacker's OS for all things hacking. We will show you how to install Kali using VMWare. We will show you some important configuration settings that you should be aware of and go over some of the top tools in Kali. We will end with a demo on how to crack Wi-Fi passwords on a WEP network.The last section will dive into penetration testing and specifically the methodologies professional penetration testing teams take to protect businesses.

  • af Patrick Gorsky
    242,95 kr.

    Embark on a transformative journey through the digital landscape with "Social Sector - Check What Awaits You," a compelling guide that unveils the hidden threats lurking in the vast realms of the internet. Authored with expertise and insight, this book is an essential companion for anyone navigating the online world. Explore the intricacies of cybersecurity, social engineering, and digital privacy, gaining a deeper understanding of the challenges that await you. With real-world examples and practical advice, "Social Sector" empowers readers to safeguard themselves against cyber threats, ensuring a more confident and secure online presence. The narrative is engaging, providing a riveting exploration of the evolving social sector and the potential dangers it holds. Whether you're a tech enthusiast, a concerned parent, or a digital novice, this book offers invaluable insights and tools to navigate the digital landscape with resilience and awareness. Don't miss the opportunity to equip yourself with the knowledge needed to thrive in the online realm - "Social Sector" is your indispensable guide to a safer and more informed digital future.

  • af Ioannis K. Hatzilygeroudis
    1.307,95 - 1.610,95 kr.

  • af Edward Franklin
    957,95 kr.

    "Cybersecurity for Everyone" is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks to preventing malware infections and ransomware attacks, this book equips readers with the knowledge and skills needed to protect themselves and their data in the digital world. Whether you're a tech novice or an experienced user, this book is a must-read for anyone who wants to stay safe online.

  • af Black Hat Kathy
    797,95 kr.

    "Red Team, Blue Team: A White Hacking Reference" is a comprehensive guide that takes readers on a journey through the world of ethical hacking. Written in an engaging and informative style, the book covers a wide range of topics including network and operating system security, essential hacking tools, basic and advanced hacking techniques, red teaming and blue teaming strategies, legal and ethical considerations, and emerging trends in cybersecurity. With practical examples, step-by-step instructions, and real-world case studies, this book is a must-read for anyone interested in the world of white hacking.

  • af Alwi M. Bamhdi
    782,95 - 1.832,95 kr.

    The book covers the prime requirements for a secure Internet of Things (IoT) setup. The book discusses security concerns of an IoT setup by uncovering the present challenges in standardization of data routing, data integrity, device supervision, IoT integration, information storage, IoT performance, and security solutions.

  • af Chunpeng Ge
    750,95 - 800,95 kr.

  • af Xiao-Zhi Gao, Durgesh Mishra, Samiksha Shukla & mfl.
    2.392,95 kr.

  • af Amit Joshi
    1.897,95 kr.

    This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies. The conference will be held in Jaipur, India during 8 ¿ 9 December 2023. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security. The work is presented in three volumes.

  • af Rachid Guerraoui
    1.527,95 kr.

    Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and more data. However, the use of a distributed framework entails a variety of security threats. In particular, some of the machines may misbehave and jeopardize the learning procedure. This could, for example, result from hardware and software bugs, data poisoning or a malicious player controlling a subset of the machines. This book explains in simple terms what it means for a distributed machine learning scheme to be robust to these threats, and how to build provably robust machine learning algorithms.Studying the robustness of machine learning algorithms is a necessity given the ubiquity of these algorithms in both the private and public sectors. Accordingly, over the past few years, we have witnessed a rapid growth in the number of articles published on the robustness of distributed machine learning algorithms. We believe it is time to provide a clear foundation to this emerging and dynamic field. By gathering the existing knowledge and democratizing the concept of robustness, the book provides the basis for a new generation of reliable and safe machine learning schemes. In addition to introducing the problem of robustness in modern machine learning algorithms, the book will equip readers with essential skills for designing distributed learning algorithms with enhanced robustness. Moreover, the book provides a foundation for future research in this area.

  • af Atul Chaturvedi
    2.392,95 kr.

    The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27¿29 October 2023. This conference proceeding provides the understanding of core concepts of Cryptology and Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post-quantum cryptography, lattice based cryptography, non-commutative ring-based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial-based cryptography, code-based cryptography, NTRU cryptosystems, security and privacy in machine learning, blockchain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.

  • af Dmitry Vostokov
    1.057,95 kr.

    Analyze system crashes and freezes, navigate kernel and complete memory spaces, and diagnose patterns of abnormal software behavior using the WinDbg debugger.

  • af Dmitry Vostokov
    1.057,95 kr.

    Analyze crashes and freezes, navigate through user space and diagnose heap corruption, memory and handle leaks, CPU spikes, blocked threads, deadlocks, wait chains, and more using WinDbg debugger.

  • af Sam O. A
    197,95 kr.

    In a world where our digital lives are under constant threat, your security matters more than ever before. Are you ready to take control of your online presence and protect what matters most? Introducing the ultimate guide to safeguarding your digital fortress: "Cybersecurity Study Guide."Picture this: You wake up one day to find your personal information compromised, your bank account emptied, and your life turned upside down. It's a nightmare scenario, but it's happening all too frequently in our interconnected world. Identity theft, data breaches, and malicious hackers are lurking in the shadows, waiting for the perfect moment to strike. But you don't have to be their next victim."Cybersecurity Study Guide" is your beacon of hope in the digital darkness. Written by industry experts who've battled cyber threats on the frontlines, this comprehensive guide will empower you with the knowledge and skills needed to defend yourself, your family, and your business against cyberattacks.Imagine the peace of mind that comes with knowing your sensitive information is locked down, impenetrable to even the most cunning hackers. Visualize the sense of control as you browse the web without fear, knowing you've mastered the art of online security. Envision your confidence soaring as you shield your loved ones from the devastating consequences of cybercrimes.With "Cybersecurity Study Guide," you'll: Build Fortified Defenses: Learn the latest strategies to secure your devices, networks, and online accounts.Outsmart Hackers: Discover the secrets of hacker psychology and stay one step ahead of cybercriminals. Safeguard Data: Master encryption, password management, and data protection to keep your information safe. Learn from Real-Life Cases: Dive into compelling case studies of cyberattacks and the lessons they teach. Navigate the Digital World: Get insider tips for safe online shopping, social media, and remote work. Secure Your Future: Arm yourself with the knowledge to pursue a career in cybersecurity.Don't wait until it's too late. Take action now, and join the ranks of those who have taken control of their digital destiny. "Cybersecurity Study Guide" isn't just a book; it's your shield against the evolving threats of the modern age.Order your copy today, and embark on a journey to become a cybersecurity champion. Together, we'll lock the gates to the digital realm and ensure that your online life remains secure, your data remains private, and your peace of mind remains intact.Invest in your security. Protect your future. Get "Cybersecurity Study Guide" now!

  • af Serap Kurbano¿lu
    781,95 - 835,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.