Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cyber Defense Mechanisms: Security, Privacy, and Challenges, Kumar Gautam, Saini Dinesh Kumar, Cuong Nguyen Ha Huy


Варианты приобретения
Цена: 7042.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Kumar Gautam, Saini Dinesh Kumar, Cuong Nguyen Ha Huy
Название:  Cyber Defense Mechanisms: Security, Privacy, and Challenges
ISBN: 9780367540968
Издательство: Taylor&Francis
Классификация:


ISBN-10: 0367540967
Обложка/Формат: Paperback
Страницы: 232
Вес: 0.33 кг.
Дата издания: 20.09.2021
Серия: Artificial intelligence ai: elementary to advanced practices
Язык: English
Иллюстрации: 24 tables, black and white; 68 illustrations, black and white
Размер: 23.39 x 15.60 x 1.24 cm
Подзаголовок: Security, privacy, and challenges
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Европейский союз
Описание:

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.    

The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.    

Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.


Дополнительное описание: Chapter 1 Security Threat Analysis and Prevention towards Attack StrategiesChapter 2 Defense against the Survivability to Network StrategiesChapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security SystemsChapter 4 Secure Channel Allocation in



Emerging Challenges for Security, Privacy and Trust

Автор: Dimitris Gritzalis; Javier Lopez
Название: Emerging Challenges for Security, Privacy and Trust
ISBN: 3642101763 ISBN-13(EAN): 9783642101762
Издательство: Springer
Рейтинг:
Цена: 20956.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009, held in Pafos, Cyprus, in May 2009. In this title, the papers are organized in topical sections on identification and authentication, threats and attacks, applications of cryptography and information hiding, and trusted computing.

Cyber defense mechanisms

Название: Cyber defense mechanisms
ISBN: 036740883X ISBN-13(EAN): 9780367408831
Издательство: Taylor&Francis
Рейтинг:
Цена: 28327.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.

Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies

Автор: Codings Zach
Название: Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
ISBN: 1801091463 ISBN-13(EAN): 9781801091466
Издательство: Неизвестно
Рейтинг:
Цена: 3717.00 р.
Наличие на складе: Нет в наличии.

Описание:

How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks via email? What if my personal email account, bank account, or other accounts were compromised? Sounds familiar? Keep reading...


Cybersecurity has changed significantly in the past decade, we've moved away from the days when basic virus protection and security controls were sufficient to deter threats, to the need for advanced security analytics tools to prevent advanced persistent threats (APTs) and tackle malicious insiders.

This book includes:

Hacking with Kali Linux A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security

Here's a sneak peek of what you'll learn with this book:

- What is hacking

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- How to scan networks

- VPNs & Firewalls

- An introduction to Digital Signatures and Cryptography

- and much more...

Ethical Hacking A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment

Throughout these pages, you will learn:

- Roles and responsibilities of an Ethical Hacker

- Hacking as a career

- Making money freelance

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

- and much more...


Even if you aren't a security expert, there are a few basic steps you can take to secure your computer.

Arm yourself with all this knowledge

Scroll up and click the BUY NOW BUTTON

Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058100 ISBN-13(EAN): 9781914058103
Издательство: Неизвестно
Рейтинг:
Цена: 3309.00 р.
Наличие на складе: Нет в наличии.

Описание: ★★ Do you want to protect yourself from Cyber Security attacks? If so then keep reading. ★★


Imagine if someone placed a key-logging tool in your personal computer and became privy to your passwords to social media, finances, school, or your organization. It would not take a lot of effort for this individual to ruin your life. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations.


The next step is placing advanced authentication when it comes to internal collaborators. After all, the goal is to minimize the risk of passwords being hacked - so it would be a good idea to use two-factor authentications. Google presents the perfect example in their security protocols by the way they use two-step verification, where the password has to be backed by a code sent to the user's mobile device.


You also need to authenticate the external collaborators. There are inevitable risks that come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled.


The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks.


This guide will focus on the following:


- Introduction

- What is Ethical Hacking?

- Preventing Cyber Attacks

- Surveillance System

- Social Engineering and Hacking

- Cybersecurity Types of Roles

- Key Concepts & Methodologies

- Key Technologies to Be Aware

- Which Security Certification fits you best

- The Value of Security Certifications

- Cyber Security Career Potentials... AND MORE


Get this book Now and feel like a master of Cyber Security within a few days


Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies

Автор: Codings Zach
Название: Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
ISBN: 1801091471 ISBN-13(EAN): 9781801091473
Издательство: Неизвестно
Рейтинг:
Цена: 4959.00 р.
Наличие на складе: Нет в наличии.

Описание:

How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks via email? What if my personal email account, bank account, or other accounts were compromised? Sounds familiar? Keep reading...


Cybersecurity has changed significantly in the past decade, we've moved away from the days when basic virus protection and security controls were sufficient to deter threats, to the need for advanced security analytics tools to prevent advanced persistent threats (APTs) and tackle malicious insiders.

This book includes:

Hacking with Kali Linux A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security

Here's a sneak peek of what you'll learn with this book:

- What is hacking

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- How to scan networks

- VPNs & Firewalls

- An introduction to Digital Signatures and Cryptography

- and much more...

Ethical Hacking A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment

Throughout these pages, you will learn:

- Roles and responsibilities of an Ethical Hacker

- Hacking as a career

- Making money freelance

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

- and much more...


Even if you aren't a security expert, there are a few basic steps you can take to secure your computer.

Arm yourself with all this knowledge

Scroll up and click the BUY NOW BUTTON

Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058119 ISBN-13(EAN): 9781914058110
Издательство: Неизвестно
Рейтинг:
Цена: 4827.00 р.
Наличие на складе: Нет в наличии.

Описание: ★★ Do you want to protect yourself from Cyber Security attacks? If so then keep reading. ★★


Imagine if someone placed a key-logging tool in your personal computer and became privy to your passwords to social media, finances, school, or your organization. It would not take a lot of effort for this individual to ruin your life. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations.


The next step is placing advanced authentication when it comes to internal collaborators. After all, the goal is to minimize the risk of passwords being hacked - so it would be a good idea to use two-factor authentications. Google presents the perfect example in their security protocols by the way they use two-step verification, where the password has to be backed by a code sent to the user's mobile device.


You also need to authenticate the external collaborators. There are inevitable risks that come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled.


The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks.


This guide will focus on the following:


- Introduction

- What is Ethical Hacking?

- Preventing Cyber Attacks

- Surveillance System

- Social Engineering and Hacking

- Cybersecurity Types of Roles

- Key Concepts & Methodologies

- Key Technologies to Be Aware

- Which Security Certification fits you best

- The Value of Security Certifications

- Cyber Security Career Potentials... AND MORE


Get this book Now and feel like a master of Cyber Security within a few days


Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058429 ISBN-13(EAN): 9781914058424
Издательство: Неизвестно
Рейтинг:
Цена: 3861.00 р.
Наличие на складе: Нет в наличии.

Описание:

★ 55% OFF for Bookstores! Now at $ 27.99 instead of $ 33.99 ★


Do you want to protect yourself from Cyber Security attacks?

Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058437 ISBN-13(EAN): 9781914058431
Издательство: Неизвестно
Рейтинг:
Цена: 5102.00 р.
Наличие на складе: Нет в наличии.

Описание:

★ 55% OFF for Bookstores! Now at $ 36.99 instead of $ 44.99 ★


Do you want to protect yourself from Cyber Security attacks?

Quantum Cryptography and the Future of Cyber Security

Автор: Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
Название: Quantum Cryptography and the Future of Cyber Security
ISBN: 1799822532 ISBN-13(EAN): 9781799822530
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 31601.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals.

Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

Information Security Management: Global Challenges in the New Millennium

Автор: Dhillon Gurpreet S., Dhillon Gurpreet
Название: Information Security Management: Global Challenges in the New Millennium
ISBN: 1878289780 ISBN-13(EAN): 9781878289780
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 8772.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents contributions by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Security and its challenges in the 21st century /

Автор: Guerrier, Claudine,
Название: Security and its challenges in the 21st century /
ISBN: 1786306212 ISBN-13(EAN): 9781786306210
Издательство: Wiley
Рейтинг:
Цена: 21851.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society.

This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020's California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.

Machine Learning Approaches in Cyber Security Analytics

Автор: Tony Thomas
Название: Machine Learning Approaches in Cyber Security Analytics
ISBN: 9811517053 ISBN-13(EAN): 9789811517051
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия