Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the refereed proceedings of the 17th International Conference on Critical Information Infrastructures Security, CRITIS 2022, which took place in Munich, Germany, during September 14¿16, 2022.The 16 full papers and 4 short papers included in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services.
Optimize your warehousing by integrating EWM in SAP S/4HANA! Walk through step-by-step instructions to configure integration points between EWM and production planning, transportation, and quality management. Connect to and exchange data with different logistics processes, from yard management to plant maintenance. This complete integration guide has everything you need to set up cross-functional warehouse management!Highlights include:1) Outbound and inbound processes2) Master data3) Production planning4) Quality management5) Transportation management6) Advanced shipping and receiving7) Warehouse automation systems8) Plant maintenance 9) SAP Dock Appointment Scheduling10) SAP Yard Logistics11) SAP Environment, Health, and Safety Management12) SAP Advanced Track and Trace for Pharmaceuticals
Preparing for your extended warehouse management (EWM) exam? Make the grade with this C_S4EWM certification study guide! From inbound and outbound processing to shipping and receiving, this guide will review the key technical and functional knowledge you need to pass the test. Explore test methodology, key concepts for each topic area, and practice questions and answers. Your path to C_S4EWM certification begins here! In this book, you'll learn about:a. The TestTo pass your certification exam, you need the right study materials. This guide provides comprehensive preparation for the exam, so deepen your knowledge of EWM and walk through topics new to C_S4EWM. b. Core ContentReview major subject areas like warehouse master data, labor management, and exception handling. Then master important terminology and key takeaways for each subject. c. Q&AAfter reviewing each chapter, solidify your knowledge with questions and answers for each section to improve your test-taking skills.Highlights include: 1) Exam C_S4EWM2) Master data3) Inbound and outbound processing4) Production integration5) Kitting6) Labor management7) Exception handling8) Batch management9) Storage control10) Physical inventory11) Replenishment12) Shipping and receiving
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
"Biometric Framework Security using Finger Knuckle" is a comprehensive and cutting-edge guide that explores the application of finger knuckle biometrics in building secure and robust biometric authentication systems. Authored by experts in the field of biometrics and security, this book serves as a valuable resource for researchers, practitioners, and security professionals interested in leveraging the unique characteristics of finger knuckle biometrics to enhance the security of authentication systems.In this book, the authors delve into the innovative field of finger knuckle biometrics, which involves capturing and analyzing the unique features present in the finger knuckle region to establish the identity of individuals. They present a detailed analysis of the biometric framework security that can be achieved using finger knuckle traits, offering practical insights into its advantages, challenges, and applications.Introduction to biometric authentication: The authors provide an overview of biometric authentication systems, their significance in enhancing security, and the limitations of traditional biometric modalities. They discuss the need for more robust and secure biometric solutions and introduce finger knuckle biometrics as a promising approach.Finger knuckle biometric framework: The book explores the underlying principles of finger knuckle biometrics, discussing the unique anatomical features of the finger knuckle region and their suitability for biometric identification. It covers image acquisition techniques, feature extraction methods, and matching algorithms specific to finger knuckle biometrics.Security aspects of finger knuckle biometrics: The authors analyze the security aspects of finger knuckle biometrics, including its resistance against spoofing attacks, usability, and privacy considerations. They discuss the advantages of using finger knuckle traits as a biometric identifier and the challenges associated with its implementation.Feature extraction and matching algorithms: The book provides insights into the feature extraction algorithms employed in finger knuckle biometrics, including texture analysis, shape analysis, and ridge-based methods. It also discusses the matching algorithms used to compare and authenticate finger knuckle biometric templates.Performance evaluation and benchmarking: The authors present methodologies for evaluating the performance of finger knuckle biometric systems, including accuracy, robustness, and efficiency metrics. They discuss benchmarking frameworks and datasets to enable fair and comparative assessments of different finger knuckle biometric solutions.Applications of finger knuckle biometrics: The book showcases the diverse applications of finger knuckle biometrics across various domains, such as access control systems, border security, mobile device authentication, and forensic investigations. It highlights the potential of finger knuckle biometrics in enhancing security and convenience in these contexts.Emerging trends and future directions: The authors discuss emerging trends in finger knuckle biometrics, including multimodal fusion, deep learning-based approaches, and fusion with other biometric modalities. They explore the future directions and potential advancements in this field, offering insights into the evolving landscape of biometric security.Throughout the book, the authors provide theoretical explanations, practical guidelines, and case studies to facilitate the understanding and implementation of finger knuckle biometric frameworks. By harnessing the power of finger knuckle biometrics, "Biometric Framework Security using Finger Knuckle" empowers readers to build robust, secure, and efficient biometric authentication systems that leverage the unique characteristics of the finger knuckle region for reliable identity verification and access control.
"Crime in Cyberspace: An Analytical Study" is a comprehensive and insightful book that delves into the world of cybercrime, providing an in-depth analysis of its various dimensions and implications. Authored by experts in the field of cybersecurity and criminology, this book serves as an essential resource for researchers, law enforcement professionals, policymakers, and anyone interested in understanding and combating cybercrime.In this book, the authors explore the evolving landscape of crime in cyberspace, examining the motivations, methods, and impact of cybercriminal activities. They employ an analytical approach to dissect the complex nature of cybercrime, shedding light on its underlying factors, patterns, and trends. The book covers a wide range of cybercrimes, including hacking, identity theft, fraud, cyberbullying, online harassment, data breaches, and more.Key topics covered in this book include:Introduction to cybercrime: The authors provide an overview of cybercrime, its definitions, and its significance in the digital age. They discuss the unique challenges posed by cybercrime, such as anonymity, global reach, and the rapidly evolving nature of technology.Types of cybercrime: The book explores different categories of cybercrime, offering detailed insights into the various techniques employed by cybercriminals. It covers computer intrusion, phishing, ransomware attacks, social engineering, intellectual property theft, and other prevalent forms of cybercrime.Cybercriminal motivations and profiles: The authors delve into the motivations and characteristics of cybercriminals. They examine factors such as financial gain, ideology, revenge, and thrill-seeking, providing a nuanced understanding of the individuals or groups behind cybercriminal activities.The impact of cybercrime: The book addresses the far-reaching impact of cybercrime on individuals, organizations, and society as a whole. It discusses financial losses, reputational damage, privacy breaches, psychological effects, and the erosion of trust in online environments.Cybercrime investigation and prevention: The authors explore investigative techniques, tools, and strategies employed in cybercrime detection and prevention. They discuss digital forensics, incident response, threat intelligence, and the role of collaboration between law enforcement agencies, private organizations, and international bodies.Legal and policy considerations: The book examines the legal and policy frameworks surrounding cybercrime. It analyzes existing laws, regulations, and international treaties aimed at combating cybercrime, highlighting the challenges and opportunities for effective law enforcement and international cooperation.Emerging trends and future challenges: The authors discuss emerging trends in cybercrime, such as the rise of cryptocurrencies, the Internet of Things (IoT), and artificial intelligence (AI)-based attacks. They also explore the future challenges that law enforcement and cybersecurity professionals may face as technology continues to evolve.Throughout the book, the authors provide real-world examples, case studies, and practical insights to illustrate the complexities of cybercrime and the strategies employed to combat it. By presenting a comprehensive analytical study of crime in cyberspace, this book equips readers with the knowledge and tools necessary to understand, investigate, and mitigate the ever-growing threat of cybercrime in our interconnected digital world.
RAND researchers generated four plausible near-term great power war scenarios and assessed how they could shape the postwar strategic environment.
Explore industrial automation and control-related concepts like the wiring and programming of VFDs and PLCs, as well as smart factory (Industry 4.0) with this easy-to-follow guidePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn the ins and outs of industrial automation and control by taking a pragmatic approachGain practical insights into automating a manufacturing process using PLCsDiscover how to monitor and control an industrial process using HMIs and SCADABook DescriptionIndustrial automation has become a popular solution for various industries looking to reduce manual labor inputs and costs by automating processes. This book helps you discover the abilities necessary for excelling in this field.The book starts with the basics of industrial automation before progressing to the application of switches, sensors, actuators, and motors, and a direct on-line (DOL) starter and its components, such as circuit breakers, contactors, and overload relay. Next, you'll explore VFDs, their parameter settings, and how they can be wired and programmed for induction motor control. As you advance, you'll learn the wiring and programming of major industrial automation tools - PLCs, HMIs, and SCADA. You'll also get to grips with process control and measurements (temperature, pressure, level, and flow), along with analog signal processing with hands-on experience in connecting a 4-20 mA transmitter to a PLC. The concluding chapters will help you grasp various industrial network protocols such as FOUNDATION Fieldbus, Modbus, PROFIBUS, PROFINET, and HART, as well as emerging trends in manufacturing (Industry 4.0) and its empowering technologies (such as IoT, AI, and robotics).By the end of this book, you'll have gained a practical understanding of industrial automation concepts for machine automation and control.What you will learnGet to grips with the essentials of industrial automation and controlFind out how to use industry-based sensors and actuatorsKnow about the AC, DC, servo, and stepper motorsGet a solid understanding of VFDs, PLCs, HMIs, and SCADA and their applicationsExplore hands-on process control systems including analog signal processing with PLCsGet familiarized with industrial network and communication protocols, wired and wireless networks, and 5GExplore current trends in manufacturing such as smart factory, IoT, AI, and roboticsWho this book is forThis book is for both graduates and undergraduates of electrical, electronics, mechanical, mechatronics, chemical or computer engineering, engineers making a career switch, or anyone looking to pursue their career in the field of industrial automation. The book covers topics ranging from basic to advanced levels, and is a valuable reference for beginner-level electrical, IIoT, automation, process, instrumentation and control, production, and maintenance engineers working in manufacturing and oil and gas industries, among others.Table of ContentsIntroduction to Industrial AutomationSwitches and Sensors - Working Principles, Applications, and WiringActuators and Their Applications in Industrial AutomationOverview of AC and DC MotorsIntroduction to Variable Frequency Drive (VFD)Drawing Schematic/Wiring Diagrams Using CAD SoftwareUnderstanding PLC Hardware and WiringUnderstanding PLC Software and Programming with TIA PortalDeep Dive into PLC Programming with TIA PortalUnderstanding Human Machine Interfaces (HMIs)(N.B. Please use the Look Inside option to see further chapters)
With increasing availability of computation power, digital signal analysis algorithms have the potential of evolving from the common framewise operational method to samplewise operations which offer more precision in time. This thesis discusses a set of methods with samplewise operations: local signal approximation via Recursive Least Squares (RLS) where a mathematical model is fit to the signal within a sliding window at each sample. Thereby both the signal models and cost windows are generated by Autonomous Linear State Space Models (ALSSMs). The modeling capability of ALSSMs is vast, as they can model exponentials, polynomials and sinusoidal functions as well as any linear and multiplicative combination thereof. The fitting method offers efficient recursions, subsample precision by way of the signal model and additional goodness of fit measures based on the recursively computed fitting cost. Classical methods such as standard Savitzky-Golay (SG) smoothing filters and the Short-Time Fourier Transform (STFT) are united under a common framework.First, we complete the existing framework. The ALSSM parameterization and RLS recursions are provided for a general function. The solution of the fit parameters for different constraint problems are reviewed. Moreover, feature extraction from both the fit parameters and the cost is detailed as well as examples of their use. In particular, we introduce terminology to analyze the fitting problem from the perspective of projection to a local Hilbert space and as a linear filter. Analytical rules are given for computation of the equivalent filter response and the steady-state precision matrix of the cost.After establishing the local approximation framework, we further discuss two classes of signal models in particular, namely polynomial and sinusoidal functions. The signal models are complementary, as by nature, polynomials are suited for time-domain description of signals while sinusoids are suited for the frequency-domain.For local approximation of polynomials, we derive analytical expressions for the steady-state covariance matrix and the linear filter of the coefficients based on the theory of orthogonal polynomial bases. We then discuss the fundamental application of smoothing filters based on local polynomial approximation. We generalize standard SG filters to any ALSSM window and introduce a novel class of smoothing filters based on polynomial fitting to running sums.
This book gathers key advances in various areas related to using wireless Internet and wireless connectivity to achieve a more connected world.The world is now highly dependent on Internet connectivity. Even though some parts of the globe remain isolated, the smoothly running world all around us relies on Internet services for countless businesses and activities. During the COVID-19 pandemic, we have seen that exclusively relying on wired Internet would leave out a large part of our tech-savvy world. Hence, wireless connectivity is essential to anywhere, anytime connectivity. Further, in the event of a new pandemic or other disaster of global scale, wireless Internet offers a reliable way to keep us all connected. The contributors to this book, hailing from academia, industrial and research laboratories, report on the latest solutions, trends and technologies with the potential to make wireless Internet more reliable and secure for the years to come.
Für die IT- oder Cybersecurity von IT-Dienstleistungen (IT-Services) zu sorgen, kann ein komplexes Unterfangen sein. Als Anwender das erreichte Maß an IT-Sicherheit adäquat einzuschätzen nicht minder.Dieses Buch bringt Ordnung in das Dickicht von Prozessen, Aktivitäten und Informationen, indem neue Begriffe eingeführt sowie existierende geschärft und in den Zusammenhang gesetzt werden. Es liefert konkrete Anleitungen und ein Gesamtkonzept für das Management der IT-Service-Sicherheit im Sinne von Organisieren, Orchestrieren und Optimieren. Es zeigt, wie man die vielen Themen gleichzeitig bearbeiten und erfolgreich am internen oder externen Markt bestehen kann. Die Methoden und Konzeptionen sind die Essenz aus mehr als fünfzehn Jahren Forschung und Lehre und aus mehr als zwölf Jahren in zentraler Verantwortlichkeit in einem der großen international tätigen IT-Dienstleister. Die Aufteilung der an sich komplexen Materie in einzelne Begriffe ermöglicht es dem Leser, sich jeweils auf eine Fragestellung zu konzentrieren. Das Buch richtet sich an Anwender (Anwenderorganisationen) und an IT-Dienstleister (IT-Abteilungen und Firmen in der IT-Industrie) und ist hilfreich für Hersteller, die beide Parteien zufriedenstellen müssen.
"e;Smart City"e; programs and strategies have become one of the most dominant urban agendas for local governments worldwide in the past two decades. The rapid urbanization rate and unprecedented growth of megacities in the 21st century triggered drastic changes in traditional ways of urban policy and planning, leading to an influx of digital technology applications for fast and efficient urban management. With the rising popularity in making our cities "e;smart"e;, several domains of urban management, urban infrastructure, and urban quality-of-life have seen increasing dependence on advanced information and communication technologies (ICTs) that optimize and control the day-to-day functioning of urban systems. Smart Cities, essentially, act as digital networks that obtain large-scale real-time data on urban systems, process them, and make decisions on how to manage them efficiently. The book presents 26 chapters, which are organized around five topics: (1) Conceptual framework for smart cities and communities; (2) Technical concepts and models for smart city and communities; (3) Civic engagement and citizen participation; (4) Case studies from the Global North; and (5) Case studies from the Global South.
The book Intelligent Healthcare: Infrastructure, Algorithms, and Management(R) cover a wide range of research topics on innovative intelligent healthcare solutions and advancements with the latest research developments. Data analytics are relevant for healthcare to meet many technical challenges and issues that need to be addressed to realize this potential. The advanced healthcare systems have to be upgraded with new capabilities such as data analytics, machine learning, intelligent decision making, and more professional services. The Internet of Things helps to design and develop intelligent healthcare solutions assisted by security, data analytics, and machine learning.This book will provide federated learning, Data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart healthcare. This book aims to attract works on multidisciplinary research spanning across computer science and engineering, environmental studies, services, urban planning and development, Healthcare, social sciences, and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative learning and computing solutions and big medical data-powered applications to cope with the real-world challenges for building smart healthcare sectors.Main Features:o Immersive technologies in healthcareo Internet of medical thingso Federated learning algorithmso Explainable AI in Pervasive Healthcareo New management principles using biomedical datao Secured healthcare management systemsThis book aims to set up a better understanding of data scientists, researchers, and technologists under innovative digital health. The reader can find out existing research challenges, current market trends, and low-cost technologies to smoothly address the digital health issue.
Master Infrastructure as Code (IaC) and streamline your DevOps workflows using Terraform and AnsiblePurchase of the print or Kindle book includes a free eBook in the PDF formatKey Features:Employ effective strategies and approach IaC projects efficiently by diving deep into its fundamentalsUnderstand the working of Terraform and Ansible and integrate them into your CI/CD workflowsWork with real-world examples of IaC across multiple cloud providers (Azure & AWS)Book Description:The Infrastructure as Code (IaC) approach ensures consistent and repeatable deployment of cloud-based IaaS/PaaS services, saving you time while delivering impeccable results. Infrastructure as Code for Beginners is a practical implementation guide that helps you gain a clear understanding of the foundations of Infrastructure as Code and make informed decisions when implementing it.With this book, you'll uncover essential IaC concepts, including planning, selecting, and implementing the right tools for your project. With step-by-step explanations and real-world examples, you'll gain a solid understanding of the benefits of IaC and the scope of application in your projects. You'll learn about the pros, cons, and best practices of different IaC tools such as Terraform and Ansible, and their use at different stages of the deployment process along with GitHub Actions. Using these tools, you'll be able to design, deploy, and secure your infrastructure on two major cloud platforms, Microsoft Azure and Amazon Web Services. In addition, you'll explore other IaC tools such as Pulumi, AWS CloudFormation, and Azure Bicep.By the end of this book, you'll be well equipped to approach your IaC projects confidently.What You Will Learn:Determine the right time to implement Infrastructure as Code for your workloadSelect the appropriate approach for Infrastructure-as-Code deploymentGet hands-on experience with Ansible and Terraform and understand their use casesPlan and deploy a workload to Azure and AWS clouds using Infrastructure as CodeLeverage CI/CD in the cloud to deploy your infrastructure using your codeDiscover troubleshooting tips and tricks to avoid pitfalls during deploymentWho this book is for:This book is for cloud engineers, software developers, or system administrators responsible for deploying resources to host applications. Ideal for both beginners and experienced professionals seeking to deepen their knowledge. Experience in manually deploying resources for applications in public clouds such as AWS or Microsoft Azure is a must. A basic understanding of programming or scripting languages, such as Python, Bash, PowerShell, etc. as well as familiarity with version control systems like Git, is a prerequisite.
This book is devoted to strengthening the theoretical and methodological basis, systematization of international experience, and scientific elaboration of prospects for developing a climate-smart economy and business as a vector of the sustainable development of Industry 4.0 in the Decade of Action.The first part of the book focuses on climate-responsible entrepreneurship in support of the sustainable development of Industry 4.0. The part systematizes best practices for climate-smart green innovations across sectors of the digital economy. The third part reveals the experience of climate risk management based on smart green innovations in regions and countries. Particular attention is paid to the best practices of the European Union (EU) and the Eurasian Economic Union (EAEU). The book ends with part four, which explores ESG climate risk management and green finance in support of combating climate change.The book¿s novelty is that it rethinks the environmental footprints of Industry 4.0 from the perspective of climate risks and their management. The theoretical significance of the book lies in the formation of an innovative concept of climate change risk management, in which the economy, society, nature, and technology are presented and interact effectively. The book is intended for scientists. In this book, they will find an innovative and systemic vision of smart green innovations in Industry 4.0 for climate change risk management.
This is the fourth edition of a generalized hardware exercise and study manual for servers and data centers. It is designed to accompany a lecture based component that consists of twenty-eight modules covering material based on principles of a basic understanding of computer hardware and operating system interactions. This manual is designed to be used in a variety of teaching environments and has utilized generic server equipment for adaption to various academic programs.
This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8¿9, 2022.The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.
This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6¿8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.
This book presents high-quality research papers presented at the Second International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2021) held during June 16-17, 2021, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.
Align your SOC with the ATT&CK framework and follow practical examples for successful implementationPurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand Cloud, Windows, and Network ATT&CK Framework using different techniquesAssess the attack potential and implement frameworks aligned with Mitre ATT&CKAddress security gaps to detect and respond to all security threatsBook Description:The Mitre ATT&CK framework is an extraordinary resource for all SOC environments, however, determining the appropriate implementation techniques for different use cases can be a daunting task. This book will help you gain an understanding of the current state of your SOC, identify areas for improvement, and then fill the security gaps with appropriate parts of the ATT&CK framework. You'll learn new techniques to tackle modern security threats and gain tools and knowledge to advance in your career.In this book, you'll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you'll explore how to implement the framework and use it to fill any security gaps you've identified, expediting the process without the need for any external or extra resources. Finally, you'll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve.By the end of this book, you'll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.What You Will Learn:Get a deeper understanding of the Mitre ATT&CK FrameworkAvoid common implementation mistakes and provide maximum valueCreate efficient detections to align with the frameworkImplement continuous improvements on detections and review ATT&CK mappingDiscover how to optimize SOC environments with automationReview different threat models and their use casesWho this book is for:This book is for SOC managers, security analysts, CISOs, security engineers, or security consultants looking to improve their organization's security posture. Basic knowledge of Mitre ATT&CK, as well as a deep understanding of triage and detections is a must.
The contemporary IT landscape is littered with various technologies that vendors claim will ¿solve¿ an organization¿s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization¿s mission.This book introduces major technologies that are employed in today¿s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.What You Will LearnAuthentication technologies, including secure password storage and how hackers ¿crack¿ password listsAccess control technology, such as BLP, BIBA, and more recent models such as RBAC and ABACCore cryptography technology, including AES encryption and public key signaturesClassical host security technologies that protect against malware (viruses, trojans, ransomware)Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systemsWeb security technologies, including cookies, state, and session defenses, and threats that try to subvert themEmail and social media security threats such as spam, phishing, social media, and other email threatsWho This Book Is ForProfessionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.