Add Wish List Add to Cart The item has been added Cyberkriminalität. Bedeutung, Auswirkungen auf digitalisierte Produktions- und Logistikprozesse und Abwehrmaßnahmen Studienarbeit aus dem Jahr 2019 im Fachbereich BWL - Beschaffung, Produktion, Logistik, Note: 1,0, Hochschule Albstadt-Sigmaringen; Sigmaringen, Sprache: Deutsch, Abstract: „Iran im Krieg 2.0 - sehen so die Schlachten der Zukunft aus?"; so betitelte „Die... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity - Data Protection and Strategies The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics related to data protection strategies. Information Technology (IT) students, practitioners, scholars, management and readers who are seeking deeper insight... RRP: $152.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Evolving Roles of Chief Information Security Officers and Chief Risk Officers In "Evolving Roles of Chief Information Security Officers (CISO) and Chief Risk Officers (CRO)," readers will embark on an insightful journey into the heart of organizational security and risk management. With over three years of in-depth research,... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Microsoft System Center 2012 Endpoint Protection Cookbook RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyberwar, Cyberterror, Cybercrime Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same - but the outcomes can be equally devastating. Each... RRP: $88.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Debugging Playbook RRP: $83.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added OSINT Hacker's Arsenal Introducing the "OSINT Hacker's Arsenal" Book Bundle!Unlock the Power of Open Source Intelligence (OSINT) with our comprehensive book bundle, carefully crafted to take you from a novice to a seasoned OSINT professional. With a combined wealth of... RRP: $91.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Defense In Depth Introducing the "Defense in Depth" Book BundleAre you concerned about the ever-growing threats to your digital world? Do you want to fortify your network security and bolster your cyber resilience? Look no further - the "Defense in Depth" book bundle is... RRP: $80.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added SQL Injection Strategies Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey FeaturesUnderstand SQL injection and its effects on websites and other systemsGet hands-on with SQL... RRP: $81.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Cloud Security Posture Management (CSPM) Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environmentKey FeaturesChoose the... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Microsoft Defender for Office 365 Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategiesKey Features:- Integrate Microsoft Defender for Office 365 fits into your... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IT Audit Field Manual Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manualKey Features:- Secure and audit endpoints in Windows environments for robust defense- Gain practical skills in... RRP: $89.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Microsoft Unified XDR and SIEM Solution Handbook A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solutionKey Features- Learn how to leverage Microsoft's XDR and SIEM for long-term resilience- Explore ways to elevate your security posture using... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Coding Practices Secure Coding Practices: Fortifying Applications Against Cyber Threats is a comprehensive guide that explores the importance of secure coding, the fundamentals of cyber threats, common vulnerabilities, best practices in code development, authentication... RRP: $70.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity for Everyone "Cybersecurity for Everyone" is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks... RRP: $140.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Personal Security Data in an Increasingly Digital World This collection of essays has been curated with the goal of providing a framework for understanding personal security data in the modern age. A wide range of relevant topics are discussed and analyzed including anonymity, privacy breaches, and biometric... RRP: $36.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber-Physical Threat Intelligence for Critical Infrastructures Security Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical... RRP: $210.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Measuring Itsm How do you measure and report your IT services and processes? Which metrics matter the most to senior executives?Finally, here is a book that shows you how! Not theory, but a practical guide that shows you the operational metrics to use and how these can... RRP: $44.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added PCI Compliance Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous... RRP: $321.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity for Industrial Control Systems As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of... RRP: $214.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Bitcoin Memoir ...understanding the blockchain revolution...Learn the story from Bitcoin's perspective!"If you are a Bitcoin beginner or just want to hear my story, this book is a must-read for anyone interested in understanding 'the Internet of Money', providing a... RRP: $15.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Complete Guide to Building an Information Security Program Many organizations today are required to have a formal IT Security Program in place in order to do business with their clients. An Information Security Program is not intended to be cumbersome or sit and collect dust on the shelf. With the proper... RRP: $23.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Artificial Intelligence Solutions for Cyber-Physical Systems This book focuses on the design, implementation, and management of secure Human Cyber-Physical Systems (HCPS s) in smart manufacturing environments. It covers a wide range of topics, including risk assessment, security architecture, data privacy, and... RRP: $449.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Leveraging the Potential of Artificial Intelligence in the Real World This book is a combination between the smart healthcare system and the intelligent transportation system based on the AI. Each chapter presents cutting-edge research and practical applications. RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Surviving Security Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and... RRP: $321.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A Hacker I Am Vol 2 This book is the second book in the "A Hacker, I Am" series, it is not your normal cybersecurity book, it's not meant to be read from front to back chapter by chapter, you open it up and pick which chapter piques your interest the most and read that one... RRP: $66.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Birth of Bitcoin Introducing "The Birth of Bitcoin" a fascinating and insightful exploration of the birth of the world's most revolutionary digital currency. From its humble beginnings in 2008, Bitcoin has exploded onto the global stage, challenging traditional financial... RRP: $24.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Legacy of Satoshi Nakamoto Are you curious about the mysterious figure behind the creation of Bitcoin? Do you want to learn about the impact of cryptocurrency on the world, and the future of this revolutionary technology? Look no further than "The Legacy of Satoshi Nakamoto."In... RRP: $24.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Shadow Codes Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Digital Age." Tailored for tech enthusiasts, cybersecurity students, or simply the curious, this book unravels the mysteries of digital spying, making it an... RRP: $29.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises Master's Thesis from the year 2012 in the subject Computer Science - IT-Security, grade: Merit, The Open University, course: MSc Advanced Networking, language: English, abstract: This research report investigated the potential risks from DoS (Denial of... RRP: $105.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Kryptologie Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft", gewinnt für den Informatiker zusehends praktische Bedeutung in Verbindung mit Datenbanken und Telekommunikation. Neben ihre Nutzung in rechnergestützten öffentlichen... RRP: $107.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz Menschen und Maschinen kommunizieren immer mehr über öffentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Geschäftsdaten können dabei sowohl aus den eigentlichen Nutzdaten als auch aus den... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Computer Networks and Cyber Security This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various... RRP: $444.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Multimedia Information Security This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral... RRP: $411.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Re-Thinking the Human Factor Confidential data and our personal privacy are under threat as never before. With breaches and cyber attacks on the rise, political and legal pressure is growing on business and government to step up and meet this challenge.Unfortunately, organisations... RRP: $22.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added MyData and Data Sovereignty in the Age of AI The era of data sovereignty has arrived and the world is transforming into a data-driven society. This book begins its discussion with ownership of data from a big data and personal data perspective. Innovative services that combine technologies such as... RRP: $61.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Happily Ever Cyber! Are your family, your business, and your data safe from cyber threats?Our world has dramatically changed, and we rely on technology for everything we do, but according to recent studies, there is a new victim of identity theft every two seconds. Identity... RRP: $30.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Bulletproof TLS and PKI, Second Edition Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristić, author of the popular SSL Labs web site, this book will teach you everything you need to know to protect... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Psychology of Information Security In today's corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company's assets and mitigate risks to the furthest... RRP: $39.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Microsoft Forefront Identity Manager 2010 R2 Handbook RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added NIST Cloud Security Introducing the NIST Cloud Security Book Bundle!Are you ready to take your cloud security knowledge to the next level? Look no further than our comprehensive book bundle, NIST Cloud Security: Cyber Threats, Policies, and Best Practices. This bundle... RRP: $94.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Python Ethical Hacking from Scratch Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey Features:Get hands-on with ethical hacking and learn to think like a... RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Building Full Stack DeFi Applications Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications with Solidity and JavaScriptKey FeaturesGain the knowledge you need to start implementing DeFi principles in practiceLearn how to build... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hands-On IoT Solutions with Blockchain RRP: $66.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Securing Cloud Services Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. The... RRP: $117.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Mobile Forensics - Second Edition A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platformsKey FeaturesGet to grips with the basics of mobile forensics and the various forensic approachesRetrieve and analyze the data stored on mobile devices and... RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Mobile Forensics RRP: $103.00 Add to Cart The item has been added