Filter
Sikkerhetstjenester
Filter
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity …
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and …
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and …
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and …
Choice Outstanding TitleWhether youre purchasing groceries with your Safeway club card or casting a vote on American Idol, that data is being collected. From Amazon to iTunes, cell …
In spite of Edward Snowden’s disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. Many people …
Optimal Spending on Cybersecurity Measures: DevOps aims to discuss the integration of risk management methodologies within the DevOps process.This book introduces the cyber risk …
Personal Identification: Modern Development and Security Implications, Second Edition explains how personal identification - and REAL ID - became part of the American fabric along …
Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and …
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and …