Are you ready to move beyond theory and start building real-world cybersecurity skills? Initial Access with Metasploit and Meterpreter is your hands-on guide to understanding how attackers gain their first foothold-and how defenders can stop them. De...Loe edasi...
Are you ready to move beyond theory and start building real-world cybersecurity skills? Initial Access with Metasploit and Meterpreter is your hands-on guide to understanding how attackers gain their first foothold-and how defenders can stop them. De...Loe edasi...
(Ilmumisaeg: 07-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040533925)
Handbook of Security, Quantum Computing and Internet of Things (IoT) explores the critical intersection of IoT, security, and quantum technologies. As IoT devices multiply, ensuring robust protection has become urgent. The book begins with IoT securi...Loe edasi...
(Ilmumisaeg: 07-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040666852)
Handbook of Security, Quantum Computing and Internet of Things (IoT) explores the critical intersection of IoT, security, and quantum technologies. As IoT devices multiply, ensuring robust protection has become urgent. The book begins with IoT securi...Loe edasi...
This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2025, held in Shanghai, China, during November 15&nd...Loe edasi...
This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2025, held in Shanghai, China, during November 15&nd...Loe edasi...
This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2025, held in Shanghai, China, during November 15&nd...Loe edasi...
This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2025, held in Shanghai, China, during November 15&nd...Loe edasi...
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.The 29 full papers included in this book were carefully reviewed and select...Loe edasi...
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.The 29 full papers included in this book were carefully reviewed and select...Loe edasi...
Artificial Intelligence is no longer a future concern—it’s a present-day disruptor. As vendors and partners increasingly adopt AI-enabled products and services, third-party and supply-chain risk professionals face a new challenge: managin...Loe edasi...
Artificial Intelligence is no longer a future concern—it’s a present-day disruptor. As vendors and partners increasingly adopt AI-enabled products and services, third-party and supply-chain risk professionals face a new challenge: managin...Loe edasi...
SSE, SASE, and Zero Trust: Mastering Security Beyond Borders with Next-Gen Edge Technologies is the essential guide for securing the modern, cloud-connected enterprise. Covering the three most influential network security architectures of our time--S...Loe edasi...
SSE, SASE, and Zero Trust: Mastering Security Beyond Borders with Next-Gen Edge Technologies is the essential guide for securing the modern, cloud-connected enterprise. Covering the three most influential network security architectures of our time--S...Loe edasi...
(Ilmumisaeg: 19-Mar-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798233562365)
The first comprehensive study guide for the industrys first AI cybersecurity certification.CompTIA SecAI+ (CY0-001) is the only vendor-neutral certification that validates your ability to secure AI systems, leverage AI for defensive operations, and...Loe edasi...
Cyber risk quantification (CRQ) is the practice of measuring cybersecurity risk using numbers —not colors or guesswork. Instead of labeling risks “high,” “medium,” or “low,” CRQ uses probabilities, ranges, an...Loe edasi...
Cyber risk quantification (CRQ) is the practice of measuring cybersecurity risk using numbers —not colors or guesswork. Instead of labeling risks “high,” “medium,” or “low,” CRQ uses probabilities, ranges, an...Loe edasi...
This Festschrift is dedicated to Professor Sjouke Mauw on the occasion of his 65th birthday. Prof. Mauw obtained his PhD from the University of Amsterdam and subsequently held faculty and research positions at Eindhoven University of Technology and a...Loe edasi...
This Festschrift is dedicated to Professor Sjouke Mauw on the occasion of his 65th birthday. Prof. Mauw obtained his PhD from the University of Amsterdam and subsequently held faculty and research positions at Eindhoven University of Technology and a...Loe edasi...
(Ilmumisaeg: 10-Mar-2026, EPUB+DRM, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284317862)
Wireless and Mobile Device Security, Third Edition, equips students and instructors with a current, practical framework for securing todays wireless and mobile environments. The text reflects the latest industry standards and technologies, including...Loe edasi...