Nätverkssäkerhet
Filter
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the …
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the …
Things you’ve done online: ordered a pizza, checked the weather, booked a hotel, and reconnected with long-lost friends. Now it’s time to find out how these things work. Vinay …
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central …
In today's fast-paced digital landscape, organizations face an ever-increasing volume of data that holds immense potential for driving business success. However, many businesses …
Link the use of technology with long-term business goals to optimize the core elements in your organization: people, strategy, and operations. This book will show you how effective …
Web3 is the next evolution for the World Wide Web based on Blockchain technology. ?This book will equip entrepreneurs with the best preparation for the megatrend of Web3 by …
Use this practical, step-by-step guide for developers and entrepreneurs to create and run your own cryptocurrency. Author Slava Gomzin has created two cryptocurrencies and …
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the …
Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You'll review the architecture's central …