Showing 1 to 9 of 14 (2 Pages)

Card List Article

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. 
The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control;..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. 
The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security;..

USD0
  • User Rating Count:

Card List Article

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector..

USD0
  • User Rating Count:

Card List Article

Written in an easy to understand style, this book provides a comprehensive overview of the physical-cyber security of Industrial Control Systems benefitting the computer science and automation engineers, students and industrial cyber security agencies in obtaining essential understanding of the ICS cyber security from concepts to realization.

USD3.99
  • User Rating Count:

Card List Article

Organizations and security companies face tremendous obstacles to keep information safe yet available, regrettably the complexity of security impairs this goal.

Almost every day, we read headlines about breaches that devastate organizations, causing damage and continually reinforcing how arduous it is to create and maintain a solid defense.

USD9.99
  • User Rating Count:

Card List Article

Cybersecurity is a concern for anyone who uses the internet to communicate, conduct research, shop, or find entertainment. 
This interactive handbook is designed to introduce the basic concepts of cybersecurity, to anyone who uses the internet. The content provides the reader with a broad overview of the threats and pitfalls, found in the..

USD0
  • User Rating Count:

Card List Article

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist..

USD44.99
  • User Rating Count:

Card List Article

The February 2015 cyber-attack on Anthem, in which cyber-terrorists accessed 80 million member and employee records, exposed the vulnerability of the US healthcare system in a way no other attack—whether retail or healthcare—has.  In this ground breaking work, John Gomez, CEO of Sensato and Colin Konschak, CEO of Divurgent, explore the challenges..

USD0
  • User Rating Count:

Card List Article

No data is completely safe.

Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT..

USD22.99
  • User Rating Count:

Card List Article

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems,..

USD13.99
  • User Rating Count:

Card List Article

This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.


Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.

Table of Contents

What is Cloud Computing?
Types..

USD0
  • User Rating Count: 45

Card List Article

This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security,..

USD139.99
  • User Rating Count:

Card List Article

Finance: Cloud Computing, Cyber Security and Cyber Heist - Beginners Guide to Help Protect Against Online Theft in the Cyber World 

***Please Note: This is a Guide to Help Protect against Online Theft in the Cyber World - For Beginners*** 

With so many different cyber-crime activities to watch for, protecting your security..

USD0
  • User Rating Count: 11

Card List Article

Before the multi-million, runaway bestseller The Da Vinci Code, Dan Brown set his razor-sharp research and storytelling skills on the most powerful intelligence organization on earth--the National Security Agency (NSA)--in this thrilling novel, Digital Fortress.

When the NSA's invincible code-breaking machine encounters..

USD9.99
  • User Rating Count: 2094

Card List Article

Welcome to the connected world. So you’re all set up on Facebook and Instagram? Great, but what should you do when you’re contemplating a divorce? Anyone on your Facebook feed might learn where you are and when you went to see your new attorney and that might not be what you want. Is there a way to manage your online security and presence so that..

USD0
  • User Rating Count:

Card List Article

In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity.  But should we believe the prophets of cyber war or worry about online government surveillance?  Are such security concerns real, exaggerated or just poorly understood?

In this comprehensive..

USD20.99
  • User Rating Count:

Card List Article

"A true-crime masterpiece." —Don Winslow

From the FBI’s former assistant director, a shocking journey to the dark side of America’s highways, revealing the FBI Highway Serial Killings Initiative’s hunt for the long-haul truckers behind an astonishing 850 murders–and counting.

In 2004, the FBI was tipped off to a gruesome..

USD13.99
  • User Rating Count:

Card List Article

A beautiful computer hacker and a bad-boy FBI agent must collaborate—in more ways than one—in this sexy, suspenseful novel from #1 New York Times bestselling author Julie Garwood.

Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous..

USD7.99
  • User Rating Count: 1470

Card List Article

NEW YORK TIMES BESTSELLER. The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom—and almost got away with it
 
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark..

USD13.99
  • User Rating Count: 1200

Card List Article

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. 
The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security;..

USD0
  • User Rating Count:

Card List Article

This book examines the legal and policy aspects of cyber-security.

It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and regulatory bodies and management of..

USD57.99
  • User Rating Count:

Card List Article

National Bestseller 

NPR Best Book of the Year

“Not all superheroes wear capes, and Elizebeth Smith Friedman should be the subject of a future Wonder Woman movie.” —The New York Times

Joining the ranks of Hidden Figures and In the Garden of Beasts, the incredible true story of the greatest codebreaking duo..

USD16.99
  • User Rating Count: 353

Card List Article

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians..

USD10.99
  • User Rating Count:

Card List Article

NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.

“Fascinating, frightening, and beyond timely.”—Anderson Cooper


Imagine a blackout lasting not..

USD12.99
  • User Rating Count: 130