Cyber Security

Analytics, Technology and Automation



Bookstore > Books > Cyber Security

Price$66.10 - $159.45
Rating
AuthorsMartti Lehto, Pekka Neittaanmaki
PublisherSpringer
Published2015
Pages269
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-10331918301X
ISBN-139783319183015
EBook Hardcover Paperback

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.

The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.




3 5 1

Similar Books


Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

by Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale - taking great care to educate readers on the history and current approaches to the security of cyberspace. It ...

Price:  $74.66  |  Publisher:  Wiley  |  Release:  2012

Cyber Threat!

Cyber Threat!

by MacDonnell Ulsch

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book desc...

Price:  $17.90  |  Publisher:  Wiley  |  Release:  2014

Cyber Warfare - Truth, Tactics, and Strategies

Cyber Warfare - Truth, Tactics, and Strategies

by Dr. Chase Cunningham

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks a...

Price:  $29.99  |  Publisher:  Packt Publishing  |  Release:  2020

packetC Programming

packetC Programming

by Peder Jungck, Ralph Duncan, Dwight Mulcahy

packetC speeds the development of applications that live within computer networks, the kind of programs that provide network functionality for connecting "clients" and "servers" and "clouds". The simplest examples provide packet switching and routing while more complex examples impleme...

Price:  $59.99  |  Publisher:  Apress  |  Release:  2011

Real-World Bug Hunting

Real-World Bug Hunting

by Peter Yaworski

Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, ethical hacker Peter Yaworski will show you how it's done.You'...

Price:  $23.54  |  Publisher:  No Starch Press  |  Release:  2019

Pro PHP Security, 2nd Edition

Pro PHP Security, 2nd Edition

by Chris Snyder, Thomas Myer, Michael Southwell

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of J...

Price:  $39.99  |  Publisher:  Apress  |  Release:  2010

Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed

by Xiaoyu Ruan

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and pro...

Price:  $39.99  |  Free ebook  |  Publisher:  Apress  |  Release:  2014

Demystifying Internet of Things Security

Demystifying Internet of Things Security

by Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.The IoT presents unique challenges in implement...

Price:  $37.10  |  Free ebook  |  Publisher:  Apress  |  Release:  2020