Add Wish List Add to Cart The item has been added Access Control Systems Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptographic Security Architecture Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Informatics Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism,... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Situational Awareness Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Encryption for Digital Content Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Trust Management for Service-Oriented Environments Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Skill Development for Industry 4.0 This book details the skills needed to face the Volatile, Uncertain, Complex and Ambiguous (VUCA) world of Industry 4.0. It covers the professional skills, cognitive learning, critical thinking skills among modern learners, motivation and student... RRP: $424.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added 搭建自己的 VPN 伺服器分步指南 了解如何在雲端或 Raspberry Pi 上搭建自己的 VPN 伺服器本書是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器的分步指南(繁體版)。基於 10 年和擁有數百萬用戶的開源工作,本書將幫助你在幾分鐘內搭建自己的 VPN,即使你之前沒有設置過伺服器或使用過 VPN。通過閱讀本書,你將了解如何:✔ 在 DigitalOcean, Vultr, Linode 和 OVH 上創建雲端伺服器✔ 使用 SSH 連接並安裝 WireGuard, OpenVPN 和帶... RRP: $22.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added 搭建自己的 VPN 服务器分步指南 了解如何在云端或 Raspberry Pi 上搭建自己的 VPN 服务器本书是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 服务器的分步指南(简体版)。基于 10 年和拥有数百万用户的开源工作,本书将帮助你在几分钟内搭建自己的 VPN,即使你之前没有设置过服务器或使用过 VPN。通过阅读本书,你将了解如何:✔ 在 DigitalOcean, Vultr, Linode 和 OVH 上创建云服务器✔ 使用 SSH 连接并安装 WireGuard, OpenVPN 和带... RRP: $22.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Seven Elements of Highly Successful Zero Trust Architecture Maybe you've considered adopting zero trust as a guiding principle for architecting a secure network but aren't sure where to start. Maybe it all seems a little overwhelming. Maybe you're just looking for a practical guide to getting it done. In any of... RRP: $71.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Strategic Innovations of AI and ML for E-Commerce Data Security As e-commerce continues to increase in usage and popularity, safeguarding consumers private data becomes critical. Strategic innovations in artificial intelligence and machine learning revolutionize data security by offering advanced tools for threat... RRP: $895.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advancing Cyber Security Through Quantum Cryptography With the increasing power of computing, cybersecurity faces mounting threats, making digital systems more vulnerable to attacks. While modern cryptography used to be compelling, it now shows vulnerabilities against rapidly growing computational... RRP: $480.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Reshaping CyberSecurity With Generative AI Techniques The constantly changing digital environment of today makes cybersecurity an ever-increasing concern. With every technological advancement, cyber threats become more sophisticated and easily exploit system vulnerabilities. This unending attack barrage... RRP: $725.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Innovations in Modern Cryptography In today's interconnected digital landscape, cybersecurity threats pose significant challenges to individuals, organizations, and governments worldwide. Cyberattacks, data breaches, and malicious activities continue to escalate in sophistication and... RRP: $948.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Navigating the World of Deepfake Technology The digital age has ushered in an era of incredible innovation, but it's also opened the door to new threats. Deepfakes, hyper-realistic manipulated videos and images, are blurring the lines between truth and fiction. Malicious actors can use deepfakes... RRP: $1,015.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Smart and Agile Cybersecurity for IoT and IIoT Environments The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity... RRP: $532.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Corporate Cybersecurity in the Aviation, Tourism, and Hospitality Sector The rapid advancement of Industry 4.0 technologies is revolutionizing the travel, tourism, and hospitality industries, offering unparalleled opportunities for innovation and growth. However, with these advancements comes a significant challenge:... RRP: $499.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Issues and Solutions in 6G Communications and Beyond The advent of 6G has brought forth unprecedented advancements, intertwining artificial intelligence, virtual reality, and blockchain. However, with this transformative progress comes a myriad of security and privacy challenges that could potentially... RRP: $499.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Scalable Modeling and Efficient Management of IoT Applications Experts continue to struggle with developing methods to effectively navigate the intricate landscape of the Internet of Things (IoT). As the IoT landscape continues to expand and influence various industries, from healthcare to smart cities and beyond,... RRP: $469.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Risk Assessment and Countermeasures for Cybersecurity The relentless growth of cyber threats poses an escalating challenge to our global community. The current landscape of cyber threats demands a proactive approach to cybersecurity, as the consequences of lapses in digital defense reverberate across... RRP: $509.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the... RRP: $486.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Innovative Machine Learning Applications for Cryptography Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a... RRP: $509.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Improving Security, Privacy, and Trust in Cloud Computing Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as... RRP: $452.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Emerging Technologies for Securing the Cloud and IoT In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while... RRP: $475.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Emerging Technologies and Security in Cloud Computing In today's digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the... RRP: $543.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Issues and Challenges in the Drone Industry Cybersecurity Issues and Challenges in the Drone Industry is a comprehensive exploration of the critical cybersecurity problems faced by the rapidly expanding drone industry. With the widespread adoption of drones in military, commercial, and... RRP: $475.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain and IoT Approaches for Secure Electronic Health Records (EHR) In the realm of healthcare, the persistent challenges of data breaches, centralized systems, and fraudulent claims have posed significant hurdles in ensuring the integrity and security of patient information. The traditional approaches to managing... RRP: $554.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Analyzing and Mitigating Security Risks in Cloud Computing In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises - the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a... RRP: $497.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added 5G and Fiber Optics Security Technologies for Smart Grid Cyber Defense In the digital age, smart grids stand as the backbone of modern energy systems, facilitating efficient energy distribution and management. However, this sophistication comes at the cost of heightened vulnerability to cyber threats. Standing on the... RRP: $709.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Enterprise Technology Risk Assessment As technology continues to evolve at an unprecedented pace, the field of auditing is also undergoing a significant transformation. Traditional practices are being challenged by the complexities of modern business environments and the integration of... RRP: $747.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Machine Learning and Cryptographic Solutions for Data Protection and Network Security In the relentless battle against escalating cyber threats, data security faces a critical challenge - the need for innovative solutions to fortify encryption and decryption processes. The increasing frequency and complexity of cyber-attacks demand a... RRP: $802.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Metaverse Security Paradigms As the metaverse rapidly evolves into a virtual realm where digital interactions mirror and sometimes surpass physical reality, ensuring robust security paradigms becomes critical. The complex and interconnected nature of the metaverse begs better... RRP: $747.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Navigating Cyber Threats and Cybersecurity in the Logistics Industry Supply chains are experiencing a seismic shift towards customer-centricity and sustainability and the challenges that are bound to arise will require innovative solutions. The escalating complexities of logistics, exacerbated by the profound impacts of... RRP: $667.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Safeguarding Financial Data in the Digital Age Despite advancements in cybersecurity measures, the financial sector continues to grapple with data breaches, fraud, and privacy concerns. Traditional security measures are often insufficient to combat sophisticated cyber threats, leading to financial... RRP: $565.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs) As the demand for data security intensifies, the vulnerabilities become glaring, exposing sensitive information to potential threats. In this tumultuous landscape, Generative Adversarial Networks (GANs) emerge as a groundbreaking solution, transcending... RRP: $735.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Social Media Security "Social Media Security: Protecting Your Digital Life" is a comprehensive guidebook that aims to educate readers on the risks and threats associated with social media platforms. The book starts with an introduction to the Wild West of social... RRP: $22.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Encryption Demystified The Key to Securing Your Digital Life "Encryption Demystified The Key to Securing Your Digital Life" is a comprehensive coursebook that discusses the fundamental principles of encryption, its applications in various contexts, and emerging technologies that rely on encryption to... RRP: $43.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Kosten der IT-Sicherheit Laut einer Umfrage des Digitalverbands Bitkom e.V., deren Ergebnisse im November 2019 veröffentlicht wurden, verursachen Angriffe auf deutsche Unternehmen jährlich einen Gesamtschaden von knapp 103 Milliarden Euro. Im Gegenzug haben deutsche Unternehmen... RRP: $67.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Windows 11 Datenschutzfibel Datenschutz ist für immer mehr Menschen ein wichtiges Thema, gerade auch bei Windows 11. Das beliebte Betriebssystem ist durch Onlinekonten, Cloud-Diensten und Telemetrie-Funktionen eng mit den Datensammeldiensten von Microsoft verknüpft. Zwar lassen... RRP: $34.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Konzeption einer Blockchain-Schnittstelle. Organisationsübergreifende Workflows in Workflow Management Systemen Masterarbeit aus dem Jahr 2020 im Fachbereich Informatik - Industrie 4.0, Note: 1,5, FOM Hochschule für Oekonomie & Management gemeinnützige GmbH Mannheim , Sprache: Deutsch, Abstract: In der Arbeit soll a priori durch eine Konzeption Klarheit... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,0, Friedrich-Alexander-Universität Erlangen-Nürnberg, Sprache: Deutsch, Abstract: In dieser Arbeit werden die wichtigsten digitalen Signatur-Verfahren in ihren Grundzügen... RRP: $66.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? Master's Thesis from the year 2019 in the subject Computer Sciences - Cryptocurrency, grade: 2.7, , course: INNOVATION AND TECHNOLOGY MANAGEMENT, language: English, abstract: Is the consumer willing to adopt the innovative, blockchain based... RRP: $123.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IT-Sicherheit Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen. Im Vordergrund steht dabei, die Ursachen für Probleme... RRP: $158.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CISSP Exam Study Guide For Security Professionals If you want to become a Cybersecurity Professional, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:Baseline Configuration, Diagrams & IP ManagementData Sovereignty & Data Loss... RRP: $89.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Design Principles If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will... RRP: $59.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CISSP Exam Study Guide If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Enforcement and Monitoring Solutions If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as... RRP: $42.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Identity Management with Biometrics Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systemsKey Features:Explore the next iteration of identity... RRP: $93.00 Add to Cart The item has been added