Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks.
Cisco Routers for the Small Business provides, in plain English, a no-nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies.
THIS BOOK IS ABOUT FINDING, understanding, fixing, and preferably preventing bugs when creating desktop, network, and Web applications with Visual Basic (VB) .
Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems.
This book features high-quality research papers presented at the 6th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2024), held at Maharaja Sriram Chandra Bhanja Deo University (MSCB University), Baripada, Odisha, India, during March 15-16, 2024.
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic.
This book features high-quality research papers presented at the 6th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2024), held at Maharaja Sriram Chandra Bhanja Deo University (MSCB University), Baripada, Odisha, India, during March 15-16, 2024.
This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ examWith hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+ Certification Study Guide, Fourth Edition covers what you need to know and shows you how to prepare for this challenging exam.
This book contains original, peer-reviewed research articles from the 5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, held in Hyderabad, India on 28-29 March 2024.
The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions.
A report offering a review of existing intellectual property protection for computer softwear, protection of copyright, patents and trade secrets, a statement of current problems and the extent to which US legislature might solve them, and the view of industry and others in the computer community.
Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described.
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success.
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches.
This book contains original, peer-reviewed research articles from the 5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, held in Hyderabad, India on 28-29 March 2024.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Provides the fundamental principles and practical tools needed to design next-generation wireless networks that are both energy- and spectrum-efficient.
Provides the fundamental principles and practical tools needed to design next-generation wireless networks that are both energy- and spectrum-efficient.
Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever.