Showing 1 to 9 of 14 (2 Pages)

Card List Article

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. 
The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control;..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. 
The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security;..

USD0
  • User Rating Count:

Card List Article

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT..

USD0
  • User Rating Count:

Card List Article

Organizations and security companies face tremendous obstacles to keep information safe yet available, regrettably the complexity of security impairs this goal.

Almost every day, we read headlines about breaches that devastate organizations, causing damage and continually reinforcing how arduous it is to create and maintain a solid defense.

USD9.99
  • User Rating Count:

Card List Article

No data is completely safe.

Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT..

USD22.99
  • User Rating Count:

Card List Article

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems,..

USD13.99
  • User Rating Count:

Card List Article

This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.


Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.

Table of Contents

What is Cloud Computing?
Types..

USD0
  • User Rating Count: 39

Card List Article

Cybersecurity is a concern for anyone who uses the internet to communicate, conduct research, shop, or find entertainment. 
This interactive handbook is designed to introduce the basic concepts of cybersecurity, to anyone who uses the internet. The content provides the reader with a broad overview of the threats and pitfalls, found in the..

USD0
  • User Rating Count:

Card List Article

Welcome to the connected world. So you’re all set up on Facebook and Instagram? Great, but what should you do when you’re contemplating a divorce? Anyone on your Facebook feed might learn where you are and when you went to see your new attorney and that might not be what you want. Is there a way to manage your online security and presence so that..

USD0
  • User Rating Count:

Card List Article

Finance: Cloud Computing, Cyber Security and Cyber Heist - Beginners Guide to Help Protect Against Online Theft in the Cyber World 

***Please Note: This is a Guide to Help Protect against Online Theft in the Cyber World - For Beginners*** 

With so many different cyber-crime activities to watch for, protecting your security..

USD0
  • User Rating Count: 9

Card List Article

Before the multi-million, runaway bestseller The Da Vinci Code, Dan Brown set his razor-sharp research and storytelling skills on the most powerful intelligence organization on earth--the National Security Agency (NSA)--in this thrilling novel, Digital Fortress.

When the NSA's invincible code-breaking machine encounters..

USD9.99
  • User Rating Count: 2073

Card List Article

An essential, eye-opening book about cyberterrorism, cyber war, and the next great threat to our national security.  

“Cyber War may be the most important book about national security policy in the last several years.” –Slate

Former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and..

USD13.99
  • User Rating Count: 107

Card List Article

In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity.  But should we believe the prophets of cyber war or worry about online government surveillance?  Are such security concerns real, exaggerated or just poorly understood?

In this comprehensive..

USD20.99
  • User Rating Count:

Card List Article

NEW YORK TIMES BESTSELLER. The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom—and almost got away with it
 
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark..

USD13.99
  • User Rating Count: 1172

Card List Article

This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security,..

USD129.99
  • User Rating Count:

Card List Article

National Bestseller 

NPR Best Book of the Year

“Not all superheroes wear capes, and Elizebeth Smith Friedman should be the subject of a future Wonder Woman movie.” —The New York Times

Joining the ranks of Hidden Figures and In the Garden of Beasts, the incredible true story of the greatest codebreaking duo..

USD14.99
  • User Rating Count: 348

Card List Article

Reality just became a virtual nightmare in book two of the bestselling Mortality Doctrine series, the next phenomenon from the author of the Maze Runner series, James Dashner.

Includes a sneak peek of The Fever Code, the highly-anticipated conclusion to the Maze Runner series—the novel that finally reveals how the..

USD8.99
  • User Rating Count: 319

Card List Article

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians..

USD10.99
  • User Rating Count:

Card List Article

NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.

“Fascinating, frightening, and beyond timely.”—Anderson Cooper


Imagine a blackout lasting not..

USD12.99
  • User Rating Count: 130

Card List Article

“Conventional analysis suffers from a profound failure of imagination. It imagines passing clouds to be permanent and is blind to powerful, long-term shifts taking place in full view of the world.” —George Friedman

In his long-awaited and provocative new book, George Friedman turns his eye on the future—offering a lucid, highly..

USD14.99
  • User Rating Count: 124

Card List Article

Ali Reynolds returns in this suspenseful thriller featuring New York Times bestselling author J.A. Jance’s signature “fast pacing, surprising plot twists, and a strong, principled heroine” (Booklist).

Cybersecurity expert Roger McGeary finally has his life back on track after years of struggling with depression...

USD9.99
  • User Rating Count: 183

Card List Article

The #1 New York Times-bestselling master of international intrigue takes readers into the bleeding-edge world of technological espionage in a propulsive thriller that feels chillingly real.

Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime..

USD9.99
  • User Rating Count: 442

Card List Article

Acclaimed journalist Jeffrey Toobin takes us into the chambers of the most important—and secret—legal body in our country, the Supreme Court, revealing the complex dynamic among the nine people who decide the law of the land. An institution at a moment of transition, the Court now stands at a crucial point, with major changes in store on such..

USD13.99
  • User Rating Count: 82

Card List Article

The New York Times bestselling author J.A. Jance returns with the thirteenth pulse-pounding thriller in the “engaging and entertaining” (Los Angeles Times) Ali Reynolds series.

After taking down the man responsible for his best friend’s death, Stuart Ramey believes the case is finally closed. That is, until Stu..

USD9.99
  • User Rating Count: 192