Vi bøger
Levering: 1 - 2 hverdage

Netværkssikkerhed

Her finder du spændende bøger om Netværkssikkerhed. Nedenfor er et flot udvalg af over 523 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Andrea Saracino
    616,95 kr.

    This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 14 submissions. The workshop presents new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including smart home environment.

  • af Quentin E Hodgson
    260,95 kr.

    This report examines U.S. structures and processes for non-cyber emergency management and whether U.S. officials can learn from these other incidents to help public and private sector stakeholders improve preparations for response to cyber incidents.

  • af Eugene Spafford
    323,95 kr.

    175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Elected into the Cybersecurity Canon Hall of Fame! Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us , three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses. Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them. Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best? Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader. Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. "You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it." --From the Foreword by Vint Cerf , Internet Hall of Fame Pioneer Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

  • af Leading Cybersecurity Experts
    313,95 kr.

    There's a storm brewing, and your business is right in its path! Despite all of the time and money you invested in your business, this cyber storm threatens everything you've built. Your financial portfolio. Your employee productivity. Even your customer base. Years ago, these "cyber storms" were simply rain showers of inconvenience - worms and viruses that merely slowed down your computer. Today, striking without warning, they are virtual F-5 tornadoes that are destroying small businesses in their paths. It all starts with a data breach where hackers steal private data from customers and employees. Next, they lock you out of your files until you shell out tens of thousands of dollars in ransomware payments. Exorbitant fines, lawsuits, lost sales and a crippled reputation quickly follow. That's because today's cybercriminals know the secrets to gain illegal access to most any computer and network. To stay one step ahead of these cybercriminals and protect your network from a data breach and ransomware, you need the right team to safeguard your network and protect your data. The cyber security experts in this book are a great start. These 16 IT services firm owners have years of experience and firsthand knowledge to help protect you and your business from today's hackers. The information in Cyber Storm can save you a ton of time, energy and expense in protecting what you've worked so hard to build.

  • af Joseph MacMillan
    448,95 kr.

  • af Michael Watley
    223,95 kr.

  •  
    1.059,95 kr.

    ¿Handbook for CTFers: Zero to One¿ was written by the Nu1L team, one of Chinäs top CTF teams. As for Jeopardy-style CTFs, the content in the first 10 chapters of this book not only covers traditional categories of tasks like WEB, PWN and Crypto, but also includes some of the latest hot topics and techniques, such as blockchain. Case studies are provided for all of these types. Onsite Attack-Defend-style CTFs and penetration testing are introduced in Chapter 11 and Chapter 12. In order to help readers gain the most from the book, we have developed the N1Book platform, which addresses practical questions for different task categories. The book offers beginners a reliable, systematic tutorial on CTF competition. At the same time, it includes real case studies and a wealth of our competition experience, making it a valuable asset for experienced CTF players.

  • af Dirk Pawlaszczyk & Christian Hummert
    527,95 - 634,95 kr.

  • af Alexandr Lyapin
    1.987,95 kr.

    This book demonstrates the benefits and drawbacks of using digital technology in preparing online lessons and educational activities. The experience of the last year has shown that online education is becoming a priority. This gave impetus to the creation and development of a new generation of equipment for online education. The book presents latest innovative technologies and modern digital trends in the field of information and communication technology for online education, including personalized learning, neuro-information systems, mobile learning, development of software and hardware infrastructure, and the use of robotics technologies. Key technologies for managing risk and cybersecurity, such as cloud and data security, identity and trust convolution systems, computational intelligence and cryptography techniques, malware and attack analysis, are presented. The topic of cybersecurity is one of the most important issues in the modern digital world. The results of the research on recently developed software, decision support systems, and cloud technologies make a huge contribution to the development of information technology in the context of digitalization.This book is of interest for developers of applications and programs for online education, for software and hardware suppliers who want to keep up with the times and reorient existing IT systems for use in online education.

  • af Parikshit N. Mahalle
    1.985,95 kr.

    This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

  • af Wenliang Du
    498,95 - 598,95 kr.

  • af Marieke Rohde
    436,95 kr.

  • af Sudeep Tanwar
    1.778,95 kr.

    A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book on the topic, which includes coverage of privacy and security.

  • af Deepak P, Tanmoy Chakraborty, CHENG Long & mfl.
    1.697,95 kr.

  • af Seok-Won Lee
    1.300,95 kr.

    This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry IoT. The book provides an in-depth analysis of the step-by-step evolution of IoT to create a change by enhancing the productivity of industries. It introduces how connected things, data, and their communication (data sharing) environment build a transparent, reliable, secure environment for people, processes, systems, and services with the help of blockchain technology.

  • af Manuel Wurm
    771,95 kr.

  • - 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltru, Spain, June 15-17, 2011, Proceedings
    af Xavier Masip-Bruin
    587,95 kr.

    This book constitutes the proceedings of the 9th IFIP TC 6 International Conference on Wired/Wireless Internet Communications, WWIC 2011, held in Vilanova i la Geltru, Spain, in June 2011. The 26 contributions included were carefully reviewed and selected from 50 submissions. In addition the book contains 15 invited papers. The contributions are structured in topical sections on mobility and LTE networks; performance and simulation analysis; adaptive approaches to guarantee E2E network services; energy efficiency and cooperation in wireless networks; transmission and management; quality through routing, naming and control; wireless multi-hop communications challenges in the future internet; and emerging contributions.

  • - Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings
    af Daniel J. Bernstein
    590,95 kr.

  • - 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers
    af Pierpaolo Degano
    577,95 kr.

    The present volume contains the proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008), held in Malaga, Spain, October 9-10, 2008. FAST is an event a?liated with the 13th European Sym- sium on Research in Computer Security (ESORICS 2008). FAST 2008 was held under the auspices of the IFIP WG 1.7 on Foundations of Security Analysis and Design. The 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008) aimed at continuing the successful e?ort of the previous three FAST workshop editions for fostering the cooperation among researchers in the areas of security and trust. As computing and network infrastructures become increasingly pervasive, and as they carry increasing economic activity, society needs well-matched security and trust mechanisms. These interactions incre- ingly span several enterprises and involve loosely structured communities of - dividuals. Participants in these activities must control interactions with their partners based on trust policies and business logic. Trust-based decisions - fectively determine the security goals for shared information and for access to sensitive or valuable resources. FAST sought for original papers focusing on formal aspects in: security and trust policy models; security protocol design and analysis; formal models of trustand reputation;logicsfor security andtrust;distributed trust management systems;trust-basedreasoning;digitalassetsprotection;dataprotection;privacy and ID issues; information ?ow analysis; language-based security; security and trust aspects in ubiquitous computing; validation/analysis tools; Web service security/trust/privacy; GRID security; security risk assessment; case studies.

  • - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings
    af Pierangela Samarati
    586,95 kr.

  • - The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
    af Josef Pieprzyk
    587,95 kr.

  • af Jennifer Seberry & Rei Safavi-Naini
    581,95 - 1.132,95 kr.

  • af Hsinchun Chen, John Leavitt, Daniel D. Zeng & mfl.
    567,95 - 1.155,95 kr.

  • af Makoto Oya
    1.128,95 kr.

    International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.For more information about the 300 other books in the IFIP series, please visit www.springer.com.For more information about IFIP, please visit www.ifip.org.

  • af Michael Darnell
    582,95 kr.

  • - 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers
    af Sven Dietrich
    569,95 - 586,95 kr.

    The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http://www. ifca. ai/), was held in Tobago, February 12-15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography, payment systems, anonymity, privacy, - thentication, and commercial and ?nancial transactions. For the ?rst time, there was an adjacent workshop on Usable Security, held after FC 2007 in the same - cation. The papers are included in the last part of this volume. The conference goal was to bring together top cryptographers, data-security specialists, and c- puter scientists with economists, bankers, implementers, and policy makers. The goal was met this year: there were 85 submissions, out of which 17 research papers and 1 system presentation paper were accepted. In addition, the conference featured two distinguished speakers, Mike Bond and Dawn Jutla, and two panel sessions, one on RFID and one on virtual economies. As always, there was the rump session on Tuesday evening, colorful as usual.

  • af Carlisle Adams & Howard Heys
    573,95 - 588,95 kr.

  • - 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings
    af Eli Biham
    578,95 kr.

    This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.The 23 full papers presented were carefully selected from 44 submissions and revised for inclusion in the book. Also contained is a summary of a panel discussion. The papers are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption. Particular emphasis is placed on applicability and implementation issues of fast cryptography.

  • - 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers
    af Roberto Bruni
    582,95 - 719,95 kr.

    This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. The 14 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections on modeling formalisms for concurrent systems; model checking and quantitative extensions thereof; semantics and analysis of modern programming languages; probabilistic models for concurrency; and testing and run-time verification.

  • af Hein Venter
    1.136,95 kr.

    International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.