Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)
Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)

The book showcases examples of university engagement in community initiatives and reports on the results from research and from a variety of institutional projects and programmes. As a whole, the book illustrates how actors at the community (microlevel) and other levels (meso and macro) can make valuable and concrete contributions to...

American Breakdown: The Trump Years and How They Befell Us
American Breakdown: The Trump Years and How They Befell Us
How Trump got to the Oval Office—and how both parties and the mainstream media are keeping him there

Donald Trump’s residency in the White House is not an accident of American history, and it can’t be blamed on a single cause. In American Breakdown, David Bromwich provides an essential analysis of...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Afghanistan: A History from 1260 to the Present
Afghanistan: A History from 1260 to the Present
Located at the intersection of Asia and the Middle East, Afghanistan has been strategically important for thousands of years. Its ancient routes and strategic position between India, Inner Asia, China, Persia, and beyond has meant the region has been subject to frequent invasions, both peaceful and military. As a result, modern...
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
From Pulitzer Prize finalist Annie Jacobsen, the untold USA Today bestselling story of the CIA's secret paramilitary units.


Surprise . . . your target. Kill . . . your enemy. Vanish . . . without a trace.


When
...
Accounting Best Practices (Wiley Best Practices)
Accounting Best Practices (Wiley Best Practices)

A revised and updated Second Edition of the guide that lets you turn your adequate practices into Best Practices

Accounting Best Practices provides you with the most advanced techniques and strategies available today to help your business cut costs and improve accounting operations–regardless of your company’s size or...

Essentials of Payroll: Management and Accounting
Essentials of Payroll: Management and Accounting

ESSENTIALS OF PAYROLL

Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this handy and concise paperback will help you stay up to date on the newest thinking, strategies, developments, and technologies in payroll.

"Steven has done it again. Payroll...

Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Auditing Information Systems
Auditing Information Systems

Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly...

Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy