The international activities of regions have attracted considerable political
and scholarly attention in recent years. This has perhaps been most notable
in Europe, where the protagonism of regions within the EU and the alliances
among regions have generated a substantial literature, but the phenomenon
has also marked federal...
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
?This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different...
An authoritative and immersive history of the far-reaching events in England that led to the sailing of the Mayflower.
2020 brings readers the 400th anniversary of the sailing of the Mayflower—the ship that took the Pilgrim Fathers to the New World. It is a foundational event in American history,...
The only official study guide for the new CCSP exam
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...
This book gives up-to-date information and broad views on e-waste recycling and management using the latest techniques for industrialist and academicians. It describes the problems of e-waste generated by all global living communities and its impact on our ecosystems and discusses recycling techniques in detail to reduce its effect...
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...
Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...