Cyber Security
Analytics, Technology and Automation
Price | $66.10 - $159.45
|
Rating | |
Authors | Martti Lehto, Pekka Neittaanmaki |
Publisher | Springer |
Published | 2015 |
Pages | 269 |
Language | English |
Format | Paper book / ebook (PDF) |
ISBN-10 | 331918301X |
ISBN-13 | 9783319183015 |
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.
The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.
- Martti Lehto
- Pekka Neittaanmaki
3 5 1
Similar Books
Cyber Security Policy Guidebook
by Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale - taking great care to educate readers on the history and current approaches to the security of cyberspace. It ...
Price: $74.66 | Publisher: Wiley | Release: 2012
by MacDonnell Ulsch
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book desc...
Price: $17.90 | Publisher: Wiley | Release: 2014
Cyber Warfare - Truth, Tactics, and Strategies
by Dr. Chase Cunningham
The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks a...
Price: $29.99 | Publisher: Packt Publishing | Release: 2020
by Peder Jungck, Ralph Duncan, Dwight Mulcahy
packetC speeds the development of applications that live within computer networks, the kind of programs that provide network functionality for connecting "clients" and "servers" and "clouds". The simplest examples provide packet switching and routing while more complex examples impleme...
Price: $59.99 | Publisher: Apress | Release: 2011
by Peter Yaworski
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, ethical hacker Peter Yaworski will show you how it's done.You'...
Price: $23.54 | Publisher: No Starch Press | Release: 2019
by Chris Snyder, Thomas Myer, Michael Southwell
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of J...
Price: $39.99 | Publisher: Apress | Release: 2010
Platform Embedded Security Technology Revealed
by Xiaoyu Ruan
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and pro...
Price: $39.99 | Free ebook | Publisher: Apress | Release: 2014
Demystifying Internet of Things Security
by Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.The IoT presents unique challenges in implement...
Price: $31.71 | Free ebook | Publisher: Apress | Release: 2020