Télécharger le livre :  Radio-Frequency Human Exposure Assessment
Ajouter à ma liste d'envies
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...

Editeur : Wiley-ISTE
Parution : 2016-03-03

PDF, ePub

Offre spéciale   -10%  154,95€  
139,99
Télécharger le livre :  Physical and Data-Link Security Techniques for Future Communication Systems
Ajouter à ma liste d'envies
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...

Editeur : Springer
Parution : 2015-09-24

PDF, ePub

147,69
Télécharger le livre :  The Antivirus Hacker's Handbook
Ajouter à ma liste d'envies
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...

Editeur : Wiley
Parution : 2015-08-19

PDF, ePub

Offre spéciale   -9%  42,80€  
38,99
Télécharger le livre :  Introduction to Network Security
Ajouter à ma liste d'envies
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...

Editeur : Wiley
Parution : 2015-07-10

PDF, ePub

Offre spéciale   -10%  123,95€  
111,99
Télécharger le livre :  The Mobile Application Hacker's Handbook
Ajouter à ma liste d'envies
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...

Editeur : Wiley
Parution : 2015-06-11

PDF, ePub

Offre spéciale   -9%  54,00€  
48,99
Télécharger le livre :  Vehicular Ad Hoc Network Security and Privacy
Ajouter à ma liste d'envies
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary...

Editeur : Wiley-IEEE Press
Parution : 2015-06-02
Collection : IEEE Press Series on Information and Communication Networks Security
PDF, ePub

Offre spéciale   -10%  121,95€  
109,99
Télécharger le livre :  Cyber Security: Analytics, Technology and Automation
Ajouter à ma liste d'envies
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time....

Editeur : Springer
Parution : 2015-05-30

PDF, ePub

105,49
Télécharger le livre :  Security Intelligence
Ajouter à ma liste d'envies
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable...

Editeur : Wiley
Parution : 2015-03-26

PDF, ePub

Offre spéciale   -8%  51,30€  
46,99
Télécharger le livre :  Phishing Dark Waters
Ajouter à ma liste d'envies
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...

Editeur : Wiley
Parution : 2015-03-18

PDF, ePub

Offre spéciale   -23%  30,00€  
22,99
Télécharger le livre :  Cyber Security and Resiliency Policy Framework
Ajouter à ma liste d'envies
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most...

Editeur : SAGE Publications Ltd
Parution : 2014-09-15

PDF

93,91
Télécharger le livre :  Socio-technical Design of Ubiquitous Computing Systems
Ajouter à ma liste d'envies
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such...

Editeur : Springer
Parution : 2014-07-28

ePub

52,74
Télécharger le livre :  Future Business Software
Ajouter à ma liste d'envies
?What will business software look like in the future? And how will it be developed?This book covers the proceedings of the first international conference on Future Business Software – a new think tank discussing the trends in enterprise software with speakers from...

Editeur : Springer
Parution : 2014-07-08

ePub

147,69
Télécharger le livre :  Continued Rise of the Cloud
Ajouter à ma liste d'envies
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of...

Editeur : Springer
Parution : 2014-07-07

ePub

52,74
Télécharger le livre :  Cybercrime and Cyber Warfare
Ajouter à ma liste d'envies
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...

Editeur : Wiley-ISTE
Parution : 2014-02-19

PDF, ePub

Offre spéciale   -10%  154,95€  
139,99
Télécharger le livre :  Threat Modeling
Ajouter à ma liste d'envies
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...

Editeur : Wiley
Parution : 2014-02-04

PDF, ePub

Offre spéciale   -9%  56,00€  
50,99
Télécharger le livre :  Hacking Point of Sale
Ajouter à ma liste d'envies
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...

Editeur : Wiley
Parution : 2014-02-03

PDF, ePub

Offre spéciale   -8%  51,30€  
46,99
Télécharger le livre :  Unmasking the Social Engineer
Ajouter à ma liste d'envies
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...

Editeur : Wiley
Parution : 2014-01-27

PDF, ePub

Offre spéciale   -22%  32,00€  
24,99
Télécharger le livre :  Data-Driven Security
Ajouter à ma liste d'envies
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data...

Editeur : Wiley
Parution : 2014-01-17

PDF, ePub

Offre spéciale   -9%  42,80€  
38,99
Télécharger le livre :  Carry On
Ajouter à ma liste d'envies
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...

Editeur : Wiley
Parution : 2013-11-20

PDF, ePub

Offre spéciale   -7%  25,70€  
23,99
Télécharger le livre :  Cybersecurity
Ajouter à ma liste d'envies
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as...

Editeur : Wiley
Parution : 2013-10-18

PDF, ePub

Offre spéciale   -8%  51,30€  
46,99
<< < 89101112 >