Filter
Datorsäkerhet
Filter
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its …
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …
The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity professionals. This guide delves deep into the ever-changing …
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a …
Global supply chains are becoming more customer-centric and sustainable thanks to next-generation logistics management technologies. Automating logistics procedures greatly …
Security for cloud-native applications is an overview of cloud-native application's characteristics from a security point of view, filled with best practices for securing services …
Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden Krisen. Dieses Buch hilft nicht …
Fortify your mobile world: Discover cutting-edge techniques for mobile security testingDESCRIPTION Mobile devices are vital in our lives, so securing the apps and systems on them …