Wir konnten keine exakten Treffer zu Ihrer Suche nach "Computer Security" finden. Könnten diese Produkte zu Ihrer Suche passen?

Ansicht:
Daniel Reilly: Applied Math for Security: An Introduction for Programmers, Buch

Daniel Reilly
Applied Math for Security: An Introduction for Programmers

"A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and impl…

sofort lieferbar
Buch
EUR 39,08*
Artikel ist im Warenkorb
Jason Edwards: The Cybersecurity Guide to Governance, Risk, and Compliance, Buch

Jason Edwards, Griffin Weaver
The Cybersecurity Guide to Governance, Risk, and Compliance

Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as p…

lieferbar in mind. 4 Wochen
Buch
EUR 134,51*
Artikel ist im Warenkorb
Ev Kontsevoy: Identity-Native Infrastructure Access Management, Buch

Ev Kontsevoy, Sakshyam Shah, Peter Conrad
Identity-Native Infrastructure Access Management

"Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation f…

sofort lieferbar
Buch
EUR 42,94*
Artikel ist im Warenkorb
Xiaojuan Liao: Applied Satisfiability, Buch

Xiaojuan Liao, Miyuki Koshimura
Applied Satisfiability

Apply satisfiability to a range of difficult problems The Boolean Satisfiability Problem (SAT) is one of the most famous and widely-studied problems in Boolean logic. Optimization versions of this problem…

lieferbar ab 5.2.2025.
Buch
EUR 181,22*
Artikel ist im Warenkorb
David Senecal: The Reign of Botnets, Buch

David Senecal
The Reign of Botnets

A start-to-finish presentation of how to defend against bot attacks on the web for security newbies and veterans In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, veteran …

lieferbar innerhalb 1-2 Wochen
Buch
EUR 40,38*
Artikel ist im Warenkorb
Ethan Cowan: Hands-On Differential Privacy, Buch

Ethan Cowan, Michael Shoemate, Mayana Pereira
Hands-On Differential Privacy

Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for o…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 77,76*
Artikel ist im Warenkorb
Ryan Chaney: Securing Enterprise Networks with Cisco Meraki, Buch

Ryan Chaney, Simerjit Singh
Securing Enterprise Networks with Cisco Meraki

Securing Enterprise Networks with Cisco Meraki Discover the Power of Cisco Meraki Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-…

lieferbar ab 19.10.2024.
Buch
EUR 73,87*
Artikel ist im Warenkorb
Michael Spreitzenbarth: Mobile Hacking, Buch

Michael Spreitzenbarth
Mobile Hacking

Mobile Endgeräte, vor allem Smartphones und Tablets der Hersteller Apple und Google, sind inzwischen in fast jedem Haushalt vertreten. Auch in der Firmenwelt nehmen diese Geräte einen immer größeren Stell…

sofort lieferbar
Buch
EUR 29,90*
Artikel ist im Warenkorb
Razi Rais: Zero Trust Networks, Buch

Razi Rais, Christina Morillo, Evan Gilman, Doug Barth
Zero Trust Networks

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requir…

sofort lieferbar
Buch
EUR 61,02*
Artikel ist im Warenkorb
Michael Anderson: Securing Cloud Native Apps, Buch

Michael Anderson, Nick Reva, Shrikant Pandhare
Securing Cloud Native Apps

A no-fluff guide to implementing best practices for securing cloud native services. What are the best practices to secure microservices, the latest popular wave of innovation in software engineering? Thi…

lieferbar ab 5.8.2025.
Buch
EUR 58,32*
Artikel ist im Warenkorb
Chris Jay Hoofnagle: Cybersecurity in Context, Buch

Chris Jay Hoofnagle, Golden G Richard
Cybersecurity in Context

"A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our…

lieferbar ab 8.10.2024.
Buch
EUR 143,34*
Artikel ist im Warenkorb
Helen Wong Mbe: Cyber Security: Law and Guidance, Buch

Helen Wong Mbe
Cyber Security: Law and Guidance

Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies a…

lieferbar ab 23.1.2025.
Buch
EUR 328,37*
Artikel ist im Warenkorb
Lewis Heuermann: Comptia Security+ Sy0-701 Cert Guide, Buch

Lewis Heuermann
Comptia Security+ Sy0-701 Cert Guide

CompTIA Security+ SY0-701 Cert Guide from Pearson IT Certification helps you prepare to succeed on the CompTIA Security+ SY0-701 exam by directly addressing the exams objectives as stated by CompTIA. Lead…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 73,87*
Artikel ist im Warenkorb
Paul J Maurer: The Code of Honor, Buch

Paul J Maurer, Ed Skoudis
The Code of Honor

Many professions--including medicine, law, and engineering--have long required their practitioners to embrace and abide by an overarching code of ethics and conduct. Cybersecurity, possibly due to its mor…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 39,38*
Artikel ist im Warenkorb
Jennifer L Bayuk: Stepping Through Cybersecurity Risk Management, Buch

Jennifer L Bayuk
Stepping Through Cybersecurity Risk Management

Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the pr…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 116,83*
Artikel ist im Warenkorb
Omar Santos: The AI Revolution in Networking, Cybersecurity, and Emerging Technologies, Buch

Omar Santos, Samer Salam, Hazim Dahir
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.   AI is having a profound impact on nearly every sector of the workforce. Huge professional and finan…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 34,39*
Artikel ist im Warenkorb
David Kennedy: Metasploit 2nd /E, Buch

David Kennedy, Mati Aharoni, Devon Kearns
Metasploit 2nd /E

The new and improved guide to penetration testing using the legendary Metasploit Framework. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless…

lieferbar ab 19.11.2024.
Buch
EUR 58,32*
Artikel ist im Warenkorb
Matthew Butler: Exploiting Modern C++, Buch

Matthew Butler
Exploiting Modern C++

Exploiting Modern C++ will help C++ students understand how hackers seek to exploit their code, how they craft their exploits, what they look for in penetrating a system, and how to design and write code …

Erscheint bald
Buch
: Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection, Buch

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial I…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 153,44*
Artikel ist im Warenkorb
Mark Morowczynski: The Definitive Guide to KQL, Buch

Mark Morowczynski, Rod Trent, Matthew Zorich
The Definitive Guide to KQL

Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in info…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 61,88*
Artikel ist im Warenkorb
Informationen zur Lieferbarkeit bzw. zu Veröffentlichungsterminen von Artikeln beruhen auf Vorabinformationen unserer Lieferanten. Diese Termine sind ohne Gewähr und können sich jederzeit ändern.