Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Understanding cybersecurity technologies, Moallem, Abbas (adjunct Faculty, San Jose State University, Ca)


Варианты приобретения
Цена: 13014.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Moallem, Abbas (adjunct Faculty, San Jose State University, Ca)
Название:  Understanding cybersecurity technologies
ISBN: 9780367457457
Издательство: Taylor&Francis
Классификация:



ISBN-10: 0367457458
Обложка/Формат: Hardcover
Страницы: 202
Вес: 0.48 кг.
Дата издания: 15.12.2021
Серия: The human element in smart and intelligent systems
Язык: English
Иллюстрации: 33 halftones, black and white; 33 illustrations, black and white
Размер: 23.39 x 15.60 x 1.42 cm
Подзаголовок: A guide to selecting the right cybersecurity tools
Рейтинг:
Поставляется из: Европейский союз
Описание: Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field.FEATURESPresents descriptions for each type of cybersecurity technology and their specificationsExplains applications, usages, and offers case studies to enhance comprehensionOffers an easy-to-understand classification of existing cybersecurity technologiesProvides an understanding of the technologies without getting lost in technical detailsFocuses on existing technologies used in different solutions, without focusing on the companies that offer these technologiesThis book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.
Дополнительное описание: 1. Cybersecurity Technologies Classification 2. Encryption 3. Authentication 4. Biometrics 5. Firewall Technologies 6. Virus Detection 7. Phishing Detection 8. Endpoint Protection 9. Malware Protection Technology 10. The Internet of Things (IoT) 11. Netwo



The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies

Автор: Brynjolfsson Erik, McAfee Andrew
Название: The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies
ISBN: 0393350649 ISBN-13(EAN): 9780393350647
Издательство: Wiley
Рейтинг:
Цена: 2374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: A New York Times Bestseller. A "fascinating" (Thomas L. Friedman, New York Times) look at how digital technology is transforming our work and our lives.

Challenges in Cybersecurity and Privacy - the European Research Landscape

Автор: Jorge Bernal Bernabe, Antonio Skarmeta
Название: Challenges in Cybersecurity and Privacy - the European Research Landscape
ISBN: 8770220883 ISBN-13(EAN): 9788770220880
Издательство: Taylor&Francis
Рейтинг:
Цена: 14086.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

Behavioral Cybersecurity

Автор: Patterson, Wayne , Winston-Proctor, Cynthia E.
Название: Behavioral Cybersecurity
ISBN: 0367509792 ISBN-13(EAN): 9780367509798
Издательство: Taylor&Francis
Рейтинг:
Цена: 8726.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.

Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications

Автор: Kumar Gautam, Singh Om Prakash, Saini Hemraj
Название: Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications
ISBN: 0367702169 ISBN-13(EAN): 9780367702168
Издательство: Taylor&Francis
Рейтинг:
Цена: 22202.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics.

Cybersecurity issues in emerging technologies

Автор: Maglaras, Leandros Kantzavelou, Ioanna
Название: Cybersecurity issues in emerging technologies
ISBN: 0367626179 ISBN-13(EAN): 9780367626174
Издательство: Taylor&Francis
Рейтинг:
Цена: 11942.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed.

Advanced cybersecurity technologies

Автор: Moseley, Ralph
Название: Advanced cybersecurity technologies
ISBN: 0367562324 ISBN-13(EAN): 9780367562328
Издательство: Taylor&Francis
Рейтинг:
Цена: 7501.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book looks at the technical fields of Cybersecurity progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research.

Advanced Cybersecurity Technologies

Автор: Moseley Ralph
Название: Advanced Cybersecurity Technologies
ISBN: 0367562278 ISBN-13(EAN): 9780367562274
Издательство: Taylor&Francis
Рейтинг:
Цена: 21437.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book looks at the technical fields of Cybersecurity progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research.

Advanced smart computing technologies in cybersecurity and forensics

Название: Advanced smart computing technologies in cybersecurity and forensics
ISBN: 0367686503 ISBN-13(EAN): 9780367686505
Издательство: Taylor&Francis
Рейтинг:
Цена: 15004.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book addresses the topics related to artificial intelligence, internet of things, blockchain technology, and machine learning and bring together researchers, developers, practitioners, and users who are interested in cybersecurity and forensics.

Routledge Handbook of International Cybersecurity

Название: Routledge Handbook of International Cybersecurity
ISBN: 1138489018 ISBN-13(EAN): 9781138489011
Издательство: Taylor&Francis
Рейтинг:
Цена: 33686.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security.

Hacking with Kali Linux: A Beginner`s Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Sec

Автор: Fletcher Stephen
Название: Hacking with Kali Linux: A Beginner`s Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Sec
ISBN: 191392274X ISBN-13(EAN): 9781913922740
Издательство: Неизвестно
Рейтинг:
Цена: 2479.00 р.
Наличие на складе: Нет в наличии.

Описание: By the time you come to the end of this book, you will have mastered the basics of computer hacking alongside many advanced concepts in social engineering attack mechanisms.

Cybersecurity lessons from covid-19

Автор: Slade, Robert
Название: Cybersecurity lessons from covid-19
ISBN: 0367682699 ISBN-13(EAN): 9780367682699
Издательство: Taylor&Francis
Рейтинг:
Цена: 7501.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and structured by the domains of information security, this book looks at what the crisis teaches us about security.

Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui

Автор: Evans Lester
Название: Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui
ISBN: 1647481740 ISBN-13(EAN): 9781647481742
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then keep reading...

Two manuscripts in one book:

  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner's Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Do you create tons of accounts you will never again visit?

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?

Does your password contain a sequence of numbers, such as "123456"?

Do you automatically click all links and download all email attachments coming from your friends?

This book will show you just how incredibly lucky you are that nobody's hacked you before.

With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.

With plenty of examples, this book will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.

From the crudest forums to the most sophisticated online services, there is a war going on and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.

In part 1 of this book, you will learn about:

  • How the internet is held together with a pinky swear
  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • Equally preposterous defense from those attacks
  • How people in charge don't even realize what hacking means
  • How there's only one surefire way to protect against hacking
  • Research on past, present, and future hacking methods
  • Difference between good and bad hackers
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon
  • And much, much more

Some of the topics covered in part 2 of this book include:

  • Fighting against companies
  • Ethical Hacking Defined
  • War on the internet
  • Engineer's mind
  • The Almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi
  • And much, much more

So if you want to learn more about Cybersecurity and Ethical Hacking, scroll up and click "add to cart"


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия