0404~0405_CUPPY滿額贈
0404~0405_mamayo迷你磁力片

英文書 > 全部商品

Zero Trust Journey Across the Digital Estate

Ingram 出版
2022/08/01 出版

The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements and Implementation Approach that could significantly benefit large, small and medium enterprises.

9 特價7308
立即代訂
下次再買

Information Security Technologies for Controlling Pandemics

Springer 出版
2022/08/01 出版

The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.

9 特價6263
立即代訂
下次再買

Building Python Web APIs with FastAPI

Packt 出版
2022/08/01 出版

Discover FastAPI features and best practices for building and deploying high-quality web APIs from scratchKey Features: A practical guide to developing production-ready web APIs rapidly in PythonLearn how to put FastAPI into practice by implementing it in real-world scenariosExplore FastAPI, its syntax, and configurations for deploying applicationsBook Description: RESTful web services are commonly used to create APIs for web-based applications owing to their light weight and high scalability. This book will show you how FastAPI, a high-performance web framework for building RESTful APIs in Python, allows you to build robust web APIs that are simple and intuitive and makes it easy to build quickly with very little boilerplate code.This book will help you set up a FastAPI application in no time and show you how to use FastAPI to build a REST API that receives and responds to user requests. You'll go on to learn how to handle routing and authentication while working with databases in a FastAPI application. The book walks you through the four key areas: building and using routes for create, read, update, and delete (CRUD) operations; connecting the application to SQL and NoSQL databases; securing the application built; and deploying your application locally or to a cloud environment.By the end of this book, you'll have developed a solid understanding of the FastAPI framework and be able to build and deploy robust REST APIs.What You Will Learn: Set up a FastAPI application that is fully functional and secureUnderstand how to handle errors from requests and send proper responses in FastAPIIntegrate and connect your application to a SQL and NoSQL (MongoDB) databasePerform CRUD operations using SQL and FastAPIManage concurrency in FastAPI applicationsImplement authentication in a FastAPI applicationDeploy a FastAPI application to any platformWho this book is for: This book is for Python developers who want to learn FastAPI in a pragmatic way to create robust web APIs with ease. If you are a Django or Flask developer looking to try something new that's faster, more efficient, and produces fewer bugs, this FastAPI Python book is for you. The book assumes intermediate-level knowledge of Python programming.

9 特價1926
立即代訂
下次再買

Building SPAs with Django and HTML Over the Wire

Packt 出版
2022/08/01 出版

Discover how to construct real-time applications with Python and Django without the hassle of learning JavaScriptKey Features: Learn to put together an SPA using Python and very little JavaScriptCreate WebSocket communication between the backend and frontendBuild a real-world project with Django using the techniques provided in this bookBook Description: The HTML over WebSockets approach simplifies single-page application (SPA) development and lets you bypass learning a JavaScript rendering framework such as React, Vue, or Angular, moving the logic to Python. This web application development book provides you with all the Django tools you need to simplify your developments with real-time results.You'll learn state-of-the-art WebSocket techniques to realize real-time applications with minimal reliance on JavaScript. This book will also show you how to create a project with Docker from the ground up, test it, and deploy it on a server. You'll learn how to create a project, add Docker, and discover development libraries, Django channels, and bidirectional communication, and from then, on you'll create real projects of all kinds using HTML over WebSockets as a chat app or a blog with real-time comments. In addition, you'll modernize your development techniques by moving from using an SSR model to creating web pages using WebSockets over HTML. With Django, you'll be able to create SPAs with professional real-time projects where the logic is in Python.By the end of this Django book, you'll be able to build real-time applications, as well as gaining a solid understanding of WebSockets with Django.What You Will Learn: Explore real-time site realizationUnderstand the proper use of Django channelsFind out how to set up Docker with DjangoDiscover how to use a JavaScript framework such as StimulusManage a database asynchronously in DjangoBring dynamic rendering logic to the backendWho this book is for: This book is for developers looking to build applications where they want to bring logic to the backend, learn WebSockets, and not depend on JavaScript heavily to create a single-page application. Basic knowledge of HTML and Python and familiarity with basic web development concepts is expected.

9 特價1422
立即代訂
下次再買

The United States Government Internet Directory 2022

Ingram 出版
2022/07/29 出版

Discover the depth of government information and services available online. The United States Government Internet Directory serves as a guide to the changing landscape of government information online. The Directory is an indispensable guidebook for anyone who is looking for official U.S. government resources on the Web. The U.S. government's online information is massive and can be difficult to locate. Many government sites are part of the "Deep Web" with content that does not surface or surface easily even with the most popular search engines. It is more important than ever to have a source that serves as an authoritative guide to the federal Web. The United States Government Internet Directory navigates the maze of data and locates the materials that you seek. The subject-based approach of this book allows you to browse for relevant sites in your field of interest rather than sift through hundreds of search results or try to guess which federal agency to consult. Researchers, business people, teachers, students, and citizens in the United States and around the world can navigate the labyrinthine federal Web with The United States Government Internet Directory. The Directory: contains more than 1,800 Web site records, organized into 21 subject themed chaptersincludes topics on a wide-range of subjects including employment, energy, defense and intelligence, culture and recreation, and much moreprovides descriptions and URLs for each sitedescribes sites to help you choose the proper resourcenotes the useful or unique aspects of the sitelists some of the major government publications hosted on the siteprovides a roster of congressional members with member's Web siteslists House and Senate Committees with committee URLs contains useful, up-to-date organizational charts for the major federal government agenciesincludes a one-page Quick Guide to the major federal agencies and the leading online library, data source, and finding aid sitesidentifies the changes in online government information that have occurred place in the past year

9 特價5554
立即代訂
下次再買

Zero Trust Journey Across the Digital Estate

Ingram 出版
2022/07/29 出版

The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements and Implementation Approach that could significantly benefit large, small and medium enterprises.

9 特價3339
立即代訂
下次再買

Side-Channel Analysis of Embedded Systems

Springer 出版
2022/07/29 出版

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

9 特價2870
立即代訂
下次再買

Wtf Is My Password

Lulu.com  著
Lulu.com 出版
2022/07/28 出版

Password & Internet keeper / Log Book This Password book keeps all your passwords safe and organized alphabetically so you can find what you are looking for in a pinch! 86 pages Wifi, Websites, apps, gaming system and computer usernames and passwords all in one place. Alphabetized pages Premium glossy cover Sized at 6" x 9" so you can toss in your purse or put in your pocket! Flexible Paperback

9 特價363
立即代訂
下次再買

Natural Language Processing with TensorFlow - Second Edition

Packt 出版
2022/07/28 出版

From introductory NLP tasks to Transformer models, this new edition teaches you to utilize powerful TensorFlow APIs to implement end-to-end NLP solutions driven by performant ML (Machine Learning) modelsKey Features: Learn to solve common NLP problems effectively with TensorFlow 2.xImplement end-to-end data pipelines guided by the underlying ML model architectureUse advanced LSTM techniques for complex data transformations, custom models and metricsBook Description: Learning how to solve natural language processing (NLP) problems is an important skill to master due to the explosive growth of data combined with the demand for machine learning solutions in production. Natural Language Processing with TensorFlow, Second Edition, will teach you how to solve common real-world NLP problems with a variety of deep learning model architectures.The book starts by getting readers familiar with NLP and the basics of TensorFlow. Then, it gradually teaches you different facets of TensorFlow 2.x. In the following chapters, you then learn how to generate powerful word vectors, classify text, generate new text, and generate image captions, among other exciting use-cases of real-world NLP.TensorFlow has evolved to be an ecosystem that supports a machine learning workflow through ingesting and transforming data, building models, monitoring, and productionization. We will then read text directly from files and perform the required transformations through a TensorFlow data pipeline. We will also see how to use a versatile visualization tool known as TensorBoard to visualize our models.By the end of this NLP book, you will be comfortable with using TensorFlow to build deep learning models with many different architectures, and efficiently ingest data using TensorFlow Additionally, you'll be able to confidently use TensorFlow throughout your machine learning workflow.What You Will Learn: Learn core concepts of NLP and techniques with TensorFlowUse statee-of-the-art Transformers and how they are used to solve NLP tasksPerform sentence classification and text generation using CNNs and RNNSUtilize advanced models for machine translation and image caption generationBuild end-to-end data pipelines in TensorFlowLearn interesting facts and practices related to the task at handCreate word representations of large amounts of data for deep learningWho this book is for: This book is for Python developers and programmers with a strong interest in deep learning, who want to learn how to leverage TensorFlow to simplify NLP tasks.Fundamental Python skills are assumed, as well as basic knowledge of machine learning and undergraduate-level calculus and linear algebra. No previous natural language processing experience required.

9 特價1926
立即代訂
下次再買

Viral Marketing

Gary,Woodall  著
Ingram 出版
2022/07/26 出版

Viral marketing is word of mouth marketing taken to a whole new level. Viral marketing is so-called because it compares the spread of information to the spread of an illness like the flu, with people 'catching the fever' surrounding your content and passing it along in ever widening circles.If you think about dropping a stone in the pond and the ripples radiating outwards to infinity, you will have a good idea of how many people you can connect with if you manage to create viral content. You can expect to learn about: How to pick an idea for your vlogHow to use various vlog platformsWhy content goes viralWhat is required for success with viral marketingHow anyone can achieve success with online businessNecessary equipment and environment for productivityAnd much more!Building your email subscriber list is the single greatest asset you need to grow your online business. Take advantage of the tremendous opportunity you have available to you right now. Build that list, generate more revenue, and make a more profitable business for yourself with the help of these viral list building funnels.

9 特價682
立即代訂
下次再買

The Online World, What You Think You Know and What You Don't

Ingram 出版
2022/07/26 出版

Every Child Who Has Access to a Smartphone, Tablet, Computer, or Video Games is at Risk!But NOW You Can Help Keep Them Safe.Would you ever consider putting your child on a plane and sending them to a foreign country alone? Of course, you wouldn't. And while that seems like an extreme example...guess what, mom and dad-that's exactly what you do when you hand your child a device without preparation. There are hundreds of millions of users on any given platform on any given day. Suffice it to say, when you give your child access to the online world, you give the world access to your child."The most dangerous neighborhood for your child to be in is in your own house, online."--Eleanor Gaetan, Director of Public Policy at the National Center on Sexual ExploitationAside from the half-million predators targeting millions upon millions of kids each day, drug dealers, pornography, sextortion, cyberbullying, gaming addiction are all threats to our children. While most experts agree that you should just keep your kids off the internet, in today's world, that's almost impossible.Technology will find it's way into your child's life and so parents, we must prepare our children for this world so we can keep them healthy and safe.Finally--A Solution Parents Love That Kids Can Live With!This is the first book with a plan designed to keep kids safe anywhere they go online! In "The Online World: What You Think You Know and What You Don't" Rania Mankarious, Public Safety Expert and CEO of Crime Stoppers Houston, pulls back the curtain to the online world and helps parents take all the intangible gray space that can seem so overwhelming, and turn it into defined territories with boundaries to protect our tweens and teens. In this book, Rania shares her 4-Tool Strategy that will guide you and your child through real discussions about how to safely navigate the online world. Tool #1 Will: Define with clarity your child's purpose for being online and how they will portray themselves to the online community. Tool #2 Will: Pull back the curtain on who really is in your child's online community, and how to recognize the three red flags everyone should be aware of.Tool #3 Will: Make your child aware of the many internal and external dangers of the online world, and develop an exit strategy so they are prepared when a threat comes their way.Tool #4 Will: Teach your child what it means to post safely-and give them a framework they will be excited to follow!What Rania has discovered is that if we focus on these four areas, and empower our kids with knowledge and strategy, we can address ALL the possible areas of online concern for parents. Best of all, these solutions will stand over time, regardless of how the landscape of the online world changes. Order your copy today and protect the kids you love!

9 特價1603
立即代訂
下次再買

Flexible Application-Layer Multicast in Heterogeneous Networks

2022/07/26 出版

This work develops a set of peer-to-peer-based protocols and extensions in order to provide Internet-wide group communication. The focus is put to the question how different access technologies can be integrated in order to face the growing traffic load problem. Thereby, protocols are developed that allow autonomous adaptation to the current network situation on the one hand and the integration of WiFi domains where applicable on the other hand.

9 特價4610
立即代訂
下次再買

Inter-Vehicle Communication at Intersections

2022/07/26 出版

This book evaluates the ability of ad-hoc and cellular communication to enable cross-traffic assistance at intersections. Potential issues like Non-Line-Of-Sight (NLOS) reception with ad-hoc and limited capacity, higher latency and costs with cellular technology are investigated in two individual evaluations. A method for efficient information delivery via cellular systems and an inter-vehicle NLOS radio propagation model are proposed. Finally, the suitability of both technologies is compared.

9 特價4314
立即代訂
下次再買

Secure and Efficient IP Mobility Support for Aeronautical Communications

2022/07/26 出版

Motivated by the future Internet Protocol (IP) based aeronautical telecommunications network supporting air traffic control communications, this thesis specifies a route optimization protocol for Network Mobility (NEMO) that is both secure and efficient.Furthermore, a new certificate model is defined that is particularly suitable for the aeronautical environment.The improvements of the new concepts in terms of security and efficiency are demonstrated and compared to the state of the art.

9 特價3637
立即代訂
下次再買

Hybrid routing in delay tolerant networks

Ingram 出版
2022/07/26 出版

This work addresses the integration of today's infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented.

9 特價3214
立即代訂
下次再買

Ranking for Web Data Search Using On-The-Fly Data Integration

Ingram 出版
2022/07/26 出版

Ranking - the algorithmic decision on how relevant an information artifact is for a given information need and the sorting of artifacts by their concluded relevancy - is an integral part of every search engine. In this book we investigate how structured Web data can be leveraged for ranking with the goal to improve the effectiveness of search. We propose new solutions for ranking using on-the-fly data integration and experimentally analyze and evaluate them against the latest baselines.

9 特價3933
立即代訂
下次再買

Characterization, Avoidance and Repair of Packet Collisions in Inter-Vehicle Communication Networks

Jens,Mittag  著
Ingram 出版
2022/07/26 出版

This work proposes a combined and accurate simulation of wireless channel, physical layer and networking aspects in order to bridge the gaps between the corresponding research communities. The resulting high fidelity simulations enable performance optimizations across multiple layers, and are used in the second part of this thesis to evaluate the impact of fast-fading channel characteristics on Carrier-Sense Multiple Access, and to quantify the benefit of successive interference cancellation.

9 特價3807
立即代訂
下次再買

Organic Service-Level Management in Service-Oriented Environments

Lei,Liu  著
Ingram 出版
2022/07/26 出版

Dynamic service-oriented environments (SOEs) are characterised by a large number of heterogeneous service components that are expected to support the business as a whole. The present work provides a negotiation-based approach to facilitate automated and multi-level service-level management in an SOE, where each component autonomously arranges its contribution to the whole operational goals. Evaluation experiments have shown an increased responsiveness and stability of an SOE in case of changes.

9 特價3722
立即代訂
下次再買

The impact of inter-vehicle communication on vehicular traffic

Ingram 出版
2022/07/26 出版

The work addresses communication networks established over radio equipped vehicles in our everyday road traffic, so called Vehicular Ad Hoc Networks (VANETs), and discusses their impact on two major goals, namely traffic safety and traffic efficiency. For both objectives, the thesis proposes an appropriate modeling of the essential building blocks Traffic, Communication and Application and enables impact assessment studies by means of implemented simulation tools.

9 特價2876
立即代訂
下次再買

Information Security and Cryptology - Icisc 2021

Springer 出版
2022/07/26 出版

This book constitutes selected papers from the 24th International Conference on Information Security and Cryptology, ICISC 2021, held in Seoul, South Korea, in December 2021. The total of 23 papers presented in this volume were carefully reviewed and selected from 63 submissions. The papers are arranged by topic: Cryptographic Protocol in Quantum Computer Age; Security Analysis of Hash Algorithm; Security analysis of Symmetric Key Encryption Algorithm; Fault and Side-Channel Attack; Constructions and Designs; Quantum Circuit; Efficient Implementation. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.

9 特價5219
立即代訂
下次再買

Advancing Computational Intelligence Techniques for Security Systems Design

Uzzal,Sharma  著
Ingram 出版
2022/07/26 出版

Security systems have become an integral part of the building and large complex setups and intervention of Computational Intelligence (CI) paradigm plays an important role in security system architecture. The book covers both theoretical contributions and practical applications in security system design by applying Internet of Things and CI.

9 特價8613
立即代訂
下次再買

Advanced Signaling Support for IP-based Networks

Ingram 出版
2022/07/26 出版

This work develops a set of advanced signaling concepts for IP-based networks. It proposes a design for secure and authentic signaling and provides QoS signaling support for mobile users. Furthermore, this work develops methods which allow for scalable QoS signaling by realizing QoS-based group communication mechanisms and through aggregation of resource reservations.

9 特價6006
立即代訂
下次再買

Personalized Privacy Protection in Big Data

Youyang,Qu  著
Springer 出版
2022/07/25 出版

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets.The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

9 特價3653
立即代訂
下次再買

Security as Code

Bk,Das  著
Ingram 出版
2022/07/25 出版

DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code. In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code, you'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers. This practical book also provides common patterns and methods to securely develop infrastructure for resilient and highly available backups that you can restore with just minimal manual intervention. Learn the tools of the trade, using Kubernetes and the AWS Code Suite Set up infrastructure as code and run scans to detect misconfigured resources in your code Create secure logging patterns with CloudWatch and other tools Restrict system access to authorized users with role-based access control (RBAC) Inject faults to test the resiliency of your application with AWS Fault Injector or open source tooling Learn how to pull everything together into one deployment

9 特價1915
立即代訂
下次再買

Once More Unto the Breach

Ingram 出版
2022/07/22 出版

The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the Breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It's your duty to ensure that your organisation isn't next. In this revised edition of Once more unto the Breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and using the role of project manager on a programme of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. You'll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the Breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private and public sectors. She has made significant contributions to the development of standards and industry research, and is currently working on a PhD in information assurance. She writes articles and blogs, and presents at conferences, seminars and workshops. Andrea is a member of many professional bodies and has just been awarded Senior Member status of the ISSA.

9 特價2115
立即代訂
下次再買

Information Security a Practical Guide

Ingram 出版
2022/07/22 出版

How do you engage with your peers when they think you're there to stop them working? Corporate information security is often hindered by a lack of adequate communication between the security team and the rest of the organisation . Information security affects the whole company and is a responsibility shared by all staff, so failing to obtain wider acceptance can endanger the security of the entire organisation . Many consider information security a block, not a benefit, however, and view security professionals with suspicion if not outright hostility. As a security professional, how can you get broader buy-in from your colleagues? Information Security: A Practical Guide addresses that issue by providing an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole. Product overview Covering everything from your first day at work as an information security professional to developing and implementing enterprise-wide information security processes, Information Security: A Practical Guide explains the basics of information security, and how to explain them to management and others so that security risks can be appropriately addressed. Topics covered include: How to understand the security culture of the organisation Getting to know the organisation and building relationships with key personnel How to identify gaps in the organisation's security set-up The impact of compromise on the organisation Identifying, categorising and prioritising risks The five levels of risk appetite and how to apply risk treatments via security controls Understanding the threats facing your organisation and how to communicate them How to raise security awareness and engage with specific peer groups System mapping and documentation (including control boundaries and where risks exist) The importance of conducting regular penetration testing and what to do with the results Information security policies and processes A standards-based approach to information security If you're starting a new job as an information security professional, Information Security: A Practical Guide contains all you need to know. About the author Tom Mooney has over ten years' IT experience working with sensitive information. His current role is as a security risk advisor for the UK Government, where he works with project teams and the wider organisation to deliver key business systems securely. His key responsibility is to act as an intermediary between management and IT teams to ensure appropriate security controls are put in place. His extensive experience has led him to develop many skills and techniques to converse with people who are not technical or information security experts. Many of these skills and techniques are found in this book. He has a BSc (Hons) in information and computer security, and is also a CESG certified professional.

9 特價2115
立即代訂
下次再買

The Art of Cyber Security

Ingram 出版
2022/07/22 出版

This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.

9 特價2115
立即代訂
下次再買

Managing Information Security Breaches

Ingram 出版
2022/07/22 出版

The book provides a general discussion and education about information security breaches, how they can be treated and what ISO27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. These case studies enable an in-depth analysis of the situations companies face in real life, and contain valuable lessons your organisation can learn from when putting appropriate measures in place to prevent a breach. The author explains what your top priorities should be the moment you realise a breach has occured, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers. It will also be of use to personnel in non-IT roles, in an effort to make this unwieldy subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents.

9 特價1692
立即代訂
下次再買

Selling Information Security to the Board

Ingram 出版
2022/07/22 出版

Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams. Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills. This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives. How this book can help information security professionals: Understand basic sales techniques Find out what to do to capture the attention of management and win them over Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing. Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success. Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives. Improve your powers of persuasion with the board ... Buy this pocket guide today! About the author Alan Calder is the CEO and founder of IT Governance Ltd. He has written widely on IT governance and information security management. This pocket guide is the first in a suite of products to focus on the important subject of making sure you can convince management of information security's importance. A book, a podcast, and more will follow shortly.

9 特價803
立即代訂
下次再買

Lessons Learned: Critical Information Infrastructure Protection

Ingram 出版
2022/07/22 出版

Understand how to protect your critical information infrastructure (CII). Billions of people use the services of critical infrastructure providers, such as ambulances, hospitals, and electricity and transport networks. This number is increasing rapidly, yet there appears to be little protection for many of these services.IT solutions have allowed organisations to increase their efficiency in order to be competitive. However, do we even know or realise what happens when IT solutions are not working - when they simply don't function at all or not in the way we expect? This book aims to teach the IT framework from within, allowing you to reduce dependence on IT systems and put in place the necessary processes and procedures to help protect your CII.Lessons Learned: Critical Information Infrastructure Protection is aimed at people who organise the protection of critical infrastructure, such as chief executive officers, business managers, risk managers, IT managers, information security managers, business continuity managers and civil servants. Most of the principles and recommendations described are also valid in organisations that are not critical infrastructure service providers. The book covers the following: - Lesson 1: Define critical infrastructure services.- Lesson 2: Describe the critical infrastructure service and determine its service level.- Lesson 3: Define the providers of critical infrastructure services.- Lesson 4: Identify the critical activities, resources and responsible persons needed to provide the critical infrastructure service.- Lesson 5: Analyse and identify the interdependencies of services and their reliance upon power supplies.- Lesson 6: Visualise critical infrastructure data.- Lesson 7: Identify important information systems and assess their importance.- Lesson 8: Identify and analyse the interconnections and dependencies of information systems.- Lesson 9: Focus on more critical services and prioritise your activities.- Lesson 10: Identify threats and vulnerabilities.- Lesson 11: Assess the impact of service disruptions.- Lesson 12: Assess the risks associated with the service and information system.- Lesson 13: Implement the necessary security measures.- Lesson 14: Create a functioning organisation to protect CII.- Lesson 15: Follow regulations to improve the cyber resilience of critical infrastructure services.- Lesson 16: Assess the security level of your information systems yourself and ask external experts to assess them as well.- Lesson 17: Scan networks yourself and ask external experts to scan them as well to find the systems that shouldn't be connected to the Internet but still are.- Lesson 18: Prepare business continuity and disaster recovery plans and test them at reasonable intervals.- Lesson 19: Establish reliable relations and maintain them.- Lesson 20: Share information and be a part of networks where information is shared.- Lesson 21: Train people to make sure they are aware of cyber threats and know the correct behaviour.- Lesson 22: If the CII protection system does not work as planned or give the desired output, make improvements.- Lesson 23: Be prepared to provide critical infrastructure services without IT systems. If possible, reduce dependence on IT systems. If possible, during a crisis, provide critical services at reduced functionality and/or in reduced volumes.AuthorToomas Viira is a highly motivated, experienced and results-orientated cyber security risk manager and IT auditor. He has more than 20 years' experience in the IT and cyber security sectors.

9 特價1692
立即代訂
下次再買

Nine Steps to Success: An ISO 27001 Implementation Overview

Ingram 出版
2022/07/22 出版

Step-by-step guidance on a successful ISO 27001 implementation from an industry leaderResilience against cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard that sets out the requirements of an information security management system (ISMS) - a holistic approach to information security that encompasses people, processes, and technology. Accredited certification to the Standard is recognized worldwide as the hallmark of best-practice information security management.Achieving and maintaining accredited certification to ISO 27001 can be complicated, especially for those who are new to the Standard.Alan Calder knows ISO 27001 inside out: the founder and executive chairman of IT Governance, he led the implementation of the management system that achieved the world's first accredited certification to BS 7799 - the forerunner to ISO 27001 - and has been working with the Standard ever since. Hundreds of organizations around the world have achieved accredited certification to ISO 27001 with IT Governance's guidance, which is distilled in this book.In Nine Steps to Success - An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead an ISO 27001-compliant ISMS implementation in just nine steps.Product overviewAligned with the latest iteration of ISO 27001:2013, this third edition of the original, no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time. In nine critical steps, the guide covers each element of the ISO 27001 project in simple, non-technical language. There is a special focus on how US organizations can tackle this governance.Aligned with the latest iteration of ISO 27001:2013, this book is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language, including: Getting management support and keeping the board's attention Creating a management framework and performing a gap analysis so that you can clearly understand the controls you already have in place, and identify where you need to focus Structuring and resourcing your project, including advice on whether to use a consultant or do it yourself, and examining the tools and resources that will make your job easier Conducting a five-step risk assessment, and creating a Statement of Applicability (SoA) and risk treatment plan (RTP) Guidance on integrating your ISO 27001 ISMS with an ISO 9001 quality management system (QMS) and other management systems Addressing the documentation challenges you'll face as you create business policies, procedures, work instructions, and records - including viable alternatives to a costly trial-and-error approach Continual improvement of your ISMS, including internal auditing and testing, and management review The six secrets to certification success. If you're tackling ISO 27001 for the first time, Nine Steps to Success - An ISO 27001 Implementation Overview will give you the guidance you need to understand the Standard's requirements and ensure your implementation project is a success - from inception to certification.

9 特價1692
立即代訂
下次再買

Digital Earth

Sarah,Katz  著
Ingram 出版
2022/07/22 出版

An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.

9 特價1184
立即代訂
下次再買

A Concise Introduction to the NIS Directive

Ingram 出版
2022/07/22 出版

This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This pocket guide is a primer for any DSP that needs to comply with the NIS Directive.The pocket guide helps DSPs: Gain insight into the NIS Directive and who is regulating it; Identify if they are within the scope of the Directive; Understand the key requirements; and Understand how guidance from international standards and ENISA can help them comply. Your essential guide to understanding the EU's NIS Directive - buy this book today and get the help and guidance you need.

9 特價803
立即代訂
下次再買

It Induction and Information Security Awareness

Ingram 出版
2022/07/22 出版

Where your information security is concerned, prevention is better than cure. If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention. Training Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company's information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. Practical advice This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company's information security and reduce the risk that your data will be stolen or lost. A sense of responsibility Encouraging good corporate working and a strong sense of responsibility are, the author argues, essential for the protection of your business information. She shows you how to strike the right balance in your approach to staff training, thereby enabling you to provide your employees with an IT Induction that is at once informative and accessible. Benefits to business include: -Reduce the likelihood of a damaging security breach. Putting in place a programme of IT Induction will help ensure that your company's staff are following information security best practice. Educating employees in good IT working practices will help them to avoid the errors that might otherwise put your organisation at risk. -Protect the company's reputation. The damage an information security breach can do to your business goes beyond the initial cost of clearing up the mess. Without proper staff training, the danger is that theft or loss of data will damage your company's reputation. You need to provide your staff with a proper IT Induction in order to preserve good relations with your customers. -Avoid legal complications. IT offers business new, less formal means of communication. Employees write e-mails in a different style from the way they write letters. However, contracts can be made or broken via e-mail, and e-mail correspondence can be cited in litigation. An IT Induction programme will give your staff the appropriate guidance on e-mail communication with the clients or business partners of your company. -Manage employee working practices. Laptop computers and broadband mean that for many employees, the boundaries between work and home are becoming blurred. If you allow your staff to mix and match between working in the office and working from home, you need to make sure they know what they have to do to safeguard your firm's data both inside and outside the office. As the author comments, ""Empowering and trusting employees, through good educational practices and advice specific to their needs, is the best solution to address information security risk"". 'This clearly written booklet is soundly based in practice, and I challenge anyone with responsibilities in IT or HR in an organisation not to find value in it.' David Clayden About the author Valerie Maddock holds a degree in Computer Science from the Open University and has over 35 years' experience in IT. Since 1996 she has been employed in the IT department of the Salvation Army UK. She created the department's IT Learning and User Support Unit, and also developed an online IT Induction programme for the needs of the Salvation Army's staff.

9 特價803
立即代訂
下次再買

Coordinating Service Compositions

Ingram 出版
2022/07/22 出版

Electronic documents frequently include contributions from different human and non-human sources. The Web, for instance, offers ever-changing content and services which can perform activities during document creation. This thesis introduces a solution for collaborative document creation which maps contributions of human and non-human participants to software services. The joint flexible composition and coordination of these services leads to a novel understanding of dynamic Web-based documents.

9 特價3722
立即代訂
下次再買

The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks

Ingram 出版
2022/07/22 出版

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book.Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book.Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success.Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

9 特價2707
立即代訂
下次再買

Assessing Information Security

Ingram 出版
2022/07/22 出版

The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cyber security that goes beyond technology - all staff in the organisation have a role to play and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that explain what to do when under attack. With this in mind, the authors of this book have drawn on the work of Clausewitz and Sun Tzu and applied it to the understanding of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict. Building on the success of the first edition, this new edition covers the most recent developments in the threat landscape and the best practice advice available in the latest version of ISO27001:2013.

9 特價2707
立即代訂
下次再買

Practical Mathematical Cryptography

Ingram 出版
2022/07/22 出版

This book provides a clear and accessible introduction to practical mathematical cryptography. The presentation provides a unified and consistent treatment of the most important cryptographic topics, from the initial design and analysis of basic cryptographic schemes towards applications.

9 特價6628
立即代訂
下次再買

Dimensions of Uncertainty in Communication Engineering

Ingram 出版
2022/07/21 出版

Dimensions of Uncertainty in Communication Engineering is a comprehensive and self-contained introduction to the problems of nonaleatory uncertainty and the mathematical tools needed to solve them. The book gathers together tools derived from statistics, information theory, moment theory, interval analysis and probability boxes, dependence bounds, nonadditive measures, and Dempster-Shafer theory. While the book is mainly devoted to communication engineering, the techniques described are also of interest to other application areas, and commonalities to these are often alluded to through a number of references to books and research papers. This is an ideal supplementary book for courses in wireless communications, providing techniques for addressing epistemic uncertainty, as well as an important resource for researchers and industry engineers. Students and researchers in other fields such as statistics, financial mathematics, and transport theory will gain an overview and understanding on these methods relevant to their field.

9 特價7312
立即代訂
下次再買

Entropy Randomization in Machine Learning

Ingram 出版
2022/07/20 出版

Entropy Randomization in Machine Learning presents a new approach to machine learning - entropy randomization - to obtain optimal solutions under uncertainty (uncertain data and models of the objects under study).

9 特價6315
立即代訂
下次再買

Wordpress

Walter,Dobbs  著
Ingram 出版
2022/07/20 出版

If You Are A Small Business Owner Or A Hopeful Internet Entrepreneur, Then You Know You Need A Professional Website. How Do You Build That Website Without Needing To Learn How To Do Computer Programming Or Having To Sell Your First-Born To Get A Website Built For You? How Do You Get A Professionally-Designed And Beautiful Website Built That Won't Cost You Mega-Bucks Per Month To Maintain? The Good News Is That There Is A Better - And Much Less Expensive - Way To Get A Beautiful Website Made, With Just A Few Clicks Of Your Mouse.What's Included In This Book: Why Should You Select WordpressWhat You Need To Create A Wordpress BlogWordpress SettingsChoosing A Wordpress ThemeDifferent Wordpress PluginsWordpress Widgets And MenusCreating ContentWordpress Is So Easy To Use, And Wordpress To Go Will Take What Is Already Easy And Make It Even More Simple - Simple Enough A Monkey Could Do It! You'll Know All The Gotchas Before Setting Up A Wordpress Site, Discover How To Make It Content Rich, And Even How To Attract The Search Engines! You'll Gain Traffic, Exposure, And Ultimately More Business.

9 特價682
立即代訂
下次再買

Socio-Technical Aspects in Security

Simon,Parkin  著
Springer 出版
2022/07/18 出版

This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.

9 特價4175
立即代訂
下次再買

Theoretical Cybersecurity

Apress 出版
2022/07/17 出版

There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade--the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry's past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities--as well as defensible experimentation concepts--are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations. What you'll learn The current state of the cybersecurity sector and how it constrains theoretical innovation How to understand attacker and defender cost benefit The detect, prevent, and accept paradigm How to build your own cybersecurity box Supporting cybersecurity innovation through defensible experimentation How to implement strategic cybersecurity Infinite vs finite game play in cybersecurity Who This Book Is For This book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities.

9 特價1881
立即代訂
下次再買

Data and Applications Security and Privacy XXXVI

Shamik,Sural  著
Springer 出版
2022/07/16 出版

This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2022, held in Newark, NJ, USA, in July 2022.The 12 full papers and 6 short papers presented were carefully reviewed and selected from 33 submissions. The conference covers research in data and applications security and privacy.

9 特價5219
立即代訂
下次再買

VLSI-SoC

Springer 出版
2022/07/15 出版

This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2020, held in Salt Lake City, UT, USA, in October 2020.*The 16 full papers included in this volume were carefully reviewed and selected from the 38 papers (out of 74 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.

9 特價7307
立即代訂
下次再買

Smma

Ingram 出版
2022/07/15 出版

Over a billion people use social media every day to engage with their favorite brands. Marketing has changed. The way we approach customers has changed. And a dull online presence is detrimental to your business no matter how great your product or service is. The opportunity is even more ripe with small and medium businesses looking for budget-friendly social media marketers to tackle the bulk of their social media engagement. What you will be learning in this book: Why an online marketing agency?Creating your own agencyPicking a nicheFinding a client Signing a clientGetting paidDelivering the servicesLearn step by step how to start social media marketing as a beginner in 2020!I cover every single step in detail on how to start, scale, and automate a social media marketing agencySmm has been the driving force for myself to becoming completely financially free over the last few years, that's why i believe that starting a smma is one of the best business models out there right now.

9 特價682
立即代訂
下次再買

Senaya Dictionary

Lulu.com 出版
2022/07/14 出版

The Chaldean language of Sanandaj Christians has been forgotten over time, but recently the new generation of this people is trying to revive and learn this language, and future generations will also speak this mother tongue. In addition, linguists and researchers from all over the world were looking for a source to learn about this type of language that was specific to the Christians of Sanandaj. Therefore, with the publication of this dictionary, this language will be revived

9 特價688
立即代訂
下次再買

Listenable

Bert,Weiss  著
Ingram 出版
2022/07/14 出版

Listenable provides a simple content and delivery system from an internationally syndicated radio host that anyone can use to set their podcast apart and keep listeners coming back.

9 特價579
立即代訂
下次再買
頁數52/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing