Computer security Books

Sidebar Sidebar Sidebar
  • Access Control Systems Access Control Systems
    Add to Cart The item has been added

    Access Control Systems

    Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection...
    $227.00

    Add to Cart The item has been added
  • Cryptographic Security Architecture Cryptographic Security Architecture
    Add to Cart The item has been added

    Cryptographic Security Architecture

    Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the...
    $227.00

    Add to Cart The item has been added
  • Security Informatics Security Informatics
    Add to Cart The item has been added

    Security Informatics

    Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism,...
    $184.00

    Add to Cart The item has been added
  • Cyber Situational Awareness Cyber Situational Awareness
    Add to Cart The item has been added

    Cyber Situational Awareness

    Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and...
    $184.00

    Add to Cart The item has been added
  • Encryption for Digital Content Encryption for Digital Content
    Add to Cart The item has been added

    Encryption for Digital Content

    Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised...
    $227.00

    Add to Cart The item has been added
  • Trust Management for Service-Oriented Environments Trust Management for Service-Oriented Environments
    Add to Cart The item has been added

    Trust Management for Service-Oriented Environments

    Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very...
    $220.00

    Add to Cart The item has been added
  • Digital Skill Development for Industry 4.0 Digital Skill Development for Industry 4.0
    Add to Cart The item has been added

    Digital Skill Development for Industry 4.0

    This book details the skills needed to face the Volatile, Uncertain, Complex and Ambiguous (VUCA) world of Industry 4.0. It covers the professional skills, cognitive learning, critical thinking skills among modern learners, motivation and student...
    $424.00

    Add to Cart The item has been added
  • 搭建自己的 VPN 伺服器分步指南 搭建自己的 VPN 伺服器分步指南
    Add to Cart The item has been added

    搭建自己的 VPN 伺服器分步指南

    了解如何在雲端或 Raspberry Pi 上搭建自己的 VPN 伺服器本書是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器的分步指南(繁體版)。基於 10 年和擁有數百萬用戶的開源工作,本書將幫助你在幾分鐘內搭建自己的 VPN,即使你之前沒有設置過伺服器或使用過 VPN。通過閱讀本書,你將了解如何:✔ 在 DigitalOcean, Vultr, Linode 和 OVH 上創建雲端伺服器✔ 使用 SSH 連接並安裝 WireGuard, OpenVPN 和帶...
    $22.00

    Add to Cart The item has been added
  • 搭建自己的 VPN 服务器分步指南 搭建自己的 VPN 服务器分步指南
    Add to Cart The item has been added

    搭建自己的 VPN 服务器分步指南

    了解如何在云端或 Raspberry Pi 上搭建自己的 VPN 服务器本书是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 服务器的分步指南(简体版)。基于 10 年和拥有数百万用户的开源工作,本书将帮助你在几分钟内搭建自己的 VPN,即使你之前没有设置过服务器或使用过 VPN。通过阅读本书,你将了解如何:✔ 在 DigitalOcean, Vultr, Linode 和 OVH 上创建云服务器✔ 使用 SSH 连接并安装 WireGuard, OpenVPN 和带...
    $22.00

    Add to Cart The item has been added
  • Advancing Cyber Security Through Quantum Cryptography Advancing Cyber Security Through Quantum Cryptography
    Add to Cart The item has been added

    Advancing Cyber Security Through Quantum Cryptography

    With the increasing power of computing, cybersecurity faces mounting threats, making digital systems more vulnerable to attacks. While modern cryptography used to be compelling, it now shows vulnerabilities against rapidly growing computational...
    $480.00

    Add to Cart The item has been added
  • Reshaping CyberSecurity With Generative AI Techniques Reshaping CyberSecurity With Generative AI Techniques
    Add to Cart The item has been added

    Reshaping CyberSecurity With Generative AI Techniques

    The constantly changing digital environment of today makes cybersecurity an ever-increasing concern. With every technological advancement, cyber threats become more sophisticated and easily exploit system vulnerabilities. This unending attack barrage...
    $725.00

    Add to Cart The item has been added
  • Innovations in Modern Cryptography Innovations in Modern Cryptography
    Add to Cart The item has been added

    Innovations in Modern Cryptography

    In today's interconnected digital landscape, cybersecurity threats pose significant challenges to individuals, organizations, and governments worldwide. Cyberattacks, data breaches, and malicious activities continue to escalate in sophistication and...
    $948.00

    Add to Cart The item has been added
  • Navigating the World of Deepfake Technology Navigating the World of Deepfake Technology
    Add to Cart The item has been added

    Navigating the World of Deepfake Technology

    The digital age has ushered in an era of incredible innovation, but it's also opened the door to new threats. Deepfakes, hyper-realistic manipulated videos and images, are blurring the lines between truth and fiction. Malicious actors can use deepfakes...
    $1,015.00

    Add to Cart The item has been added
  • Risk Assessment and Countermeasures for Cybersecurity Risk Assessment and Countermeasures for Cybersecurity
    Add to Cart The item has been added

    Risk Assessment and Countermeasures for Cybersecurity

    The relentless growth of cyber threats poses an escalating challenge to our global community. The current landscape of cyber threats demands a proactive approach to cybersecurity, as the consequences of lapses in digital defense reverberate across...
    $509.00

    Add to Cart The item has been added
  • Emerging Technologies for Securing the Cloud and IoT Emerging Technologies for Securing the Cloud and IoT
    Add to Cart The item has been added

    Emerging Technologies for Securing the Cloud and IoT

    In an age defined by the transformative ascent of cloud computing and the Internet of Things (IoT), our technological landscape has undergone a revolutionary evolution, enhancing convenience and connectivity in unprecedented ways. This convergence, while...
    $475.00

    Add to Cart The item has been added
  • Emerging Technologies and Security in Cloud Computing Emerging Technologies and Security in Cloud Computing
    Add to Cart The item has been added

    Emerging Technologies and Security in Cloud Computing

    In today's digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the...
    $543.00

    Add to Cart The item has been added
  • Advances in Enterprise Technology Risk Assessment Advances in Enterprise Technology Risk Assessment
    Add to Cart The item has been added

    Advances in Enterprise Technology Risk Assessment

    As technology continues to evolve at an unprecedented pace, the field of auditing is also undergoing a significant transformation. Traditional practices are being challenged by the complexities of modern business environments and the integration of...
    $747.00

    Add to Cart The item has been added
  • Metaverse Security Paradigms Metaverse Security Paradigms
    Add to Cart The item has been added

    Metaverse Security Paradigms

    As the metaverse rapidly evolves into a virtual realm where digital interactions mirror and sometimes surpass physical reality, ensuring robust security paradigms becomes critical. The complex and interconnected nature of the metaverse begs better...
    $747.00

    Add to Cart The item has been added
  • Safeguarding Financial Data in the Digital Age Safeguarding Financial Data in the Digital Age
    Add to Cart The item has been added

    Safeguarding Financial Data in the Digital Age

    Despite advancements in cybersecurity measures, the financial sector continues to grapple with data breaches, fraud, and privacy concerns. Traditional security measures are often insufficient to combat sophisticated cyber threats, leading to financial...
    $565.00

    Add to Cart The item has been added
  • Social Media Security Social Media Security
    Add to Cart The item has been added

    Social Media Security

    "Social Media Security: Protecting Your Digital Life" is a comprehensive guidebook that aims to educate readers on the risks and threats associated with social media platforms. The book starts with an introduction to the Wild West of social...
    $22.00

    Add to Cart The item has been added
  • Kosten der IT-Sicherheit Kosten der IT-Sicherheit
    Add to Cart The item has been added

    Kosten der IT-Sicherheit

    Laut einer Umfrage des Digitalverbands Bitkom e.V., deren Ergebnisse im November 2019 veröffentlicht wurden, verursachen Angriffe auf deutsche Unternehmen jährlich einen Gesamtschaden von knapp 103 Milliarden Euro. Im Gegenzug haben deutsche Unternehmen...
    $67.00

    Add to Cart The item has been added
  • Windows 11 Datenschutzfibel Windows 11 Datenschutzfibel
    Add to Cart The item has been added

    Windows 11 Datenschutzfibel

    Datenschutz ist für immer mehr Menschen ein wichtiges Thema, gerade auch bei Windows 11. Das beliebte Betriebssystem ist durch Onlinekonten, Cloud-Diensten und Telemetrie-Funktionen eng mit den Datensammeldiensten von Microsoft verknüpft. Zwar lassen...
    $34.00

    Add to Cart The item has been added
  • Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm
    Add to Cart The item has been added

    Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm

    Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,0, Friedrich-Alexander-Universität Erlangen-Nürnberg, Sprache: Deutsch, Abstract: In dieser Arbeit werden die wichtigsten digitalen Signatur-Verfahren in ihren Grundzügen...
    $66.00

    Add to Cart The item has been added
  • IT-Sicherheit IT-Sicherheit
    Add to Cart The item has been added

    IT-Sicherheit

    Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen. Im Vordergrund steht dabei, die Ursachen für Probleme...
    $158.00

    Add to Cart The item has been added
  • CISSP Exam Study Guide For Security Professionals CISSP Exam Study Guide For Security Professionals
    Add to Cart The item has been added

    CISSP Exam Study Guide For Security Professionals

    If you want to become a Cybersecurity Professional, this book is for you!  BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:Baseline Configuration, Diagrams & IP ManagementData Sovereignty & Data Loss...
    $89.00

    Add to Cart The item has been added
  • Cybersecurity Design Principles Cybersecurity Design Principles
    Add to Cart The item has been added

    Cybersecurity Design Principles

    If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will...
    $59.00

    Add to Cart The item has been added
  • CISSP Exam Study Guide CISSP Exam Study Guide
    Add to Cart The item has been added

    CISSP Exam Study Guide

    If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other...
    $73.00

    Add to Cart The item has been added
  • Cybersecurity Enforcement and Monitoring Solutions Cybersecurity Enforcement and Monitoring Solutions
    Add to Cart The item has been added

    Cybersecurity Enforcement and Monitoring Solutions

    If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as...
    $42.00

    Add to Cart The item has been added
  • Identity Management with Biometrics Identity Management with Biometrics
    Add to Cart The item has been added

    Identity Management with Biometrics

    Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systemsKey Features:Explore the next iteration of identity...
    $93.00

    Add to Cart The item has been added
Computer security