Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security ... in Intelligent Systems and Computing, 842)
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security ... in Intelligent Systems and Computing, 842)
The 2018 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Ningbo, China (2017), Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the sixth consecutive conference year in Shanghai....
Social Practices of Rule-Making in World Politics
Social Practices of Rule-Making in World Politics
Rule-based global order remains a central object of study in International Relations. Constructivists have identified a number of mechanisms by which actors accomplish both the continuous reproduction and transformation of the rules, institutions, and regimes that constitute their worlds. However, it is less clear how these mechanisms...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
This book presents new findings on cyber-physical systems design and modelling approaches based on AI and data-driven techniques, identifying the key industrial challenges and the main features of design and modelling processes. To enhance the efficiency of the design process, it proposes new approaches based on the concept of digital twins....
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social
...
Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
I have spent almost ten years doing the research for, thinking about, and finally writing this book. In the pages that follow, I emphasize the importance of understanding standpoint when critically evaluating information on the Internet, so it seems only fitting that I should say something about my own relation to the text.

This book
...
Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy