Filter
Datakryptering
Filter
The rapidly growing Internet of Things presents a looming security concern for not only consumers, but businesses, critical infrastructure, and even national security. Through …
One of the most compelling problems of the Internet is the lack of a comprehensive and unifying approach to dealing with service security and resilience. Although many such …
A year of HBR's essential thinking on tech—all in one place.From 5G networks to biometric marketing and from augmented reality to AI wearables, new technologies are reshaping …
Cyber Secure Development Lifecycle offers an innovative approach to security that addresses both the reactive and proactive aspects of security. It engages all roles involved in …
Advanced Persistent Threat Modeling is an in-depth guide to targeting and compromising high-security environments. With it, you'll learn how to discover and create attack vectors, …
This book discusses how to design and review the security of blockchains enterprise-based applications in roughly three parts. The first part is about blockchain and bitcoin …
In 1939, Alan Turing’s bombe machine—the most advanced method used to crack the Nazis’ Enigma code—was born at Bletchley Park. But at the turn of the 21st century, the only cracks …