Cybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse.
Start making the most of the latest collaboration tools in Microsoft 365-including Teams, SharePoint, Power Apps, Power BI, Power Automate, Microsoft Groups, Office ProPlus, Yammer, Planner, Stream, Forms, and OneDrive.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
The CompTIA Linux+ Certification"e; book - the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification.
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.
This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India, during March 6-8, 2024.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting.
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam domainsThoroughly revised for the April 2015 exam update, SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition enables you to take the exam with complete confidence.
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implement citywide heterogeneous computer networks and solve distributed problems on them well before the internet.
This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications.
This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester examThis effective self-study guide fully prepares you for the Global Information Assurance Certification s challenging Penetration Tester exam, which validates advanced IT security skills.
This effective self-study guide serves as an accelerated review of all exam objectives for the CompTIA PenTest+ certification examThis concise, quick-review test preparation guide offers 100% coverage of all exam objectives for the new CompTIA PenTest+ exam.
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.
This quick review study guide offers 100% coverage of every topic on the latest version of the CISSP examGet on the fast track to becoming CISSP certified with this affordable, portable study tool.
This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is being taken for China's growth and development.
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their integration into securing Internet of Things (IoT) applications.
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as the Internet of Things (IoT), artificial intelligence (AI), and robotics, to achieve higher levels of efficiency, productivity, and safety.
A new edition of Shon Harris' bestselling exam prep guide-fully updated for the new CISSP 2018 Common Body of KnowledgeThis effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains.
Become the Cyber Guardian Your Organization Needs: Mastering the Art of Protecting the Digital RealmIn todays rapidly evolving digital landscape, the role of a Chief Information Security Officer (CISO) has never been more critical.
This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma.
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries.
Develop and implement an effective end-to-end security programToday s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments.
The second of two volumes, this book about the criminology of Carlo Morselli includes a diversity of contributions that study the social inter-dependence of criminal phenomena.
Dieses kompakte eBook liefert Ihnen eine Einführung in die Welt der Tablets, Smarthpones und PCs und bietet zudem Hilfestellung bei Problemen wie Trojaner, Viren oder Systemproblemen.