Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls.
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure.
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure.
Una guía de ciberseguridad, seguridad en Internet y protección para niños, adolescentes, padres y profesionales Para evitar ser hackeado, prevenir riesgos en línea o pérdidas financieras y mantenerse informado, este manual, "Guía de ciberseguridad, seguridad en Internet y protección para niños, adolescentes, padres y profesionales", responderá a sus preguntas sobre cómo proteger su vida digital, evitar el robo de identidad, prevenir los ciberataques y asegurar su privacidad social.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.
Cybersecurity threats are not isolated occurrences and must be recognized as global operations requiring collaborative measures to prepare cyber graduates and organizations personnel on the high impact of cybercrimes and the awareness, understanding, and obligation to secure, control, and protect the organizations vital data and information and sharing them on social media sites.
Writing in their famous Harvard Law Review article of 1890, Louis Brandeis and Samuel Warren asserted what many have considered one of the most cherished American values: the right to be let alone.
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.
The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions.
This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.
A mediados de febrero del 2025 el presidente de Argentina, Javier Milei, quedó involucrado, en circunstancias que están siendo investigadas por parte de la justicia de los Estados Unidos, de España y de la Argentina, en una posible estafa perpetrada con la "memecoin" $LIBRA, que habría provocado una defraudación superior a los 200 millones de dólares.
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs.
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.