71.659 results (0,39121 seconds)

Brand

Colour

Size

Gender

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Statistical Methods in Computer Security

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security Cybersecurity Laws Internet of Things (IoT) and Mobile Devices is an introductory text addressing current technology trends and security issues. While many books on the market cover investigations forensic recovery and presentation of evidence and others explain computer and network security this book explores both explaining the essential principles governing computers wireless and mobile devices the Internet of Things cloud systems and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered investigated and adjudicated unless they are understood. The legal portion of the book is an overview of the legal system in the United States including cyberlaw standards and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances. Key Features: Provides a strong foundation of cybercrime knowledge along with the core concepts of networking computer security Internet of Things (IoTs) and mobile devices. Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation. Identifies the new security challenges of emerging technologies including mobile devices cloud computing Software-as-a-Service (SaaS) VMware and the Internet of Things. Strengthens student understanding of the fundamentals of computer and network security concepts that are often glossed over in many textbooks and includes the study of cybercrime as critical forward-looking cybersecurity challenges. Cybercrime and Information Technology is a welcome addition to the literature particularly for those professors seeking a more hands-on forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum and is relevant to those studying Security Administration Public Administrations Police Studies Business Administration Computer Science and Information Systems. A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction. | Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

GBP 62.99
1

Cyber Security Essentials

Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats tactics and procedures. To accomplish this the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security the book: Covers attacker methods and motivations exploitation trends malicious code techniques and the latest threat vectors Addresses more than 75 key security concepts in a series of concise well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

GBP 160.00
1

Network Security

Network Security

First Published in 2002. Network Security: a practical guide provides a comprehensive review of network security issues with relevance to corporate networks fromboth an administrative and user perspective. It is particularly suited to IS executives administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization. The book covers a broad range of issues starting with an assessment of network security including the financial implications of security breaches and moving on to discuss the different types of security threats facing computer networks. Particular attention is also given to the legal framework for network security. Attention is then turned to increasing security awareness and readiness including system configuration acceptable use business continuity and explaining technical solutions available such as firewalls and content control. Introduction of a security policy is widely accepted as best practise in informing and educating users and the final chapter is devoted to policy writing. By the end of the book readers should be ready to create and implement a network security policy for their organization and start reducing overheads and downtime immediately!*Discusses all the relevant issues with a concise straightforward and readily accessible approach. *Important emphasis placed on the people management aspects of network security. *Practical business oriented approach includes reference to legal and financial aspects of network security. *Companion web site at www. networksecurity. org. uk includes updates additional material downloads and links to resources and further information.

GBP 175.00
1

Cryptography and Network Security

Phoenix SS0721E Size 1 Computer Security Safe Electric Lock Black

Software Security Concepts & Practices

Network Forensics Privacy and Security

Network Forensics Privacy and Security

This book primarily focuses on providing deep insight into the concepts of network security network forensics botnet forensics ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know – how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security all kind of network attacks intention of an attacker identification of attack detection its analysis incident response ethical issues botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security tools Digital forensics. Differentiation among network security computer forensics network forensics and botnet forensics. Discussion on various cybercrimes attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication Computer Science and Computer Engineering. | Network Forensics Privacy and Security

GBP 130.00
1

Slingsby Double Depth Computer Workstation Door Dark Blue

Security for Software Engineers

Human-Computer Interaction and Cybersecurity Handbook

Slingsby Double Depth Computer Workstation Door Colour Light Grey

Computer Ethics

Advancing Computational Intelligence Techniques for Security Systems Design

Computer Desk

Computer Desk

Privacy and Security for Mobile Crowdsourcing

Mobilis Slim Rotating Wedge Slot Security Lock