Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages.
Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.
This book is a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Cyber-Security, Privacy in Communication Networks (ICCS 2023) held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, UK, during 11-12 December 2023.
This book is a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Cyber-Security, Privacy in Communication Networks (ICCS 2023) held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, UK, during 11-12 December 2023.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024.
Master network security and cryptography with this in-depth guide covering essential concepts, techniques, and advanced topics for protecting data and networks.