Browsing by Subject Bảo mật máy tính

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 8 of 8
  • TVS.005062_TT_William Chuck Easttom - Computer Security Fundamentals, 5th Edition-Pearson IT Certification (2023).pdf.jpg
  • Sách/Book


  • Authors: Easttom, William (2023)

  • This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

  • TVS.005062_TT_William Chuck Easttom - Computer Security Fundamentals, 5th Edition-Pearson IT Certification (2023).pdf.jpg
  • Sách/Book


  • Authors: Easttom, William (2023)

  • This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

  • TVS.005271_TT_Zoubir Z. Mammeri - Cryptography_ Algorithms, Protocols, and Standards for Computer Security-Wiley (2024).pdf.jpg
  • Sách/Book


  • Authors: Mammeri, Zoubir (2024)

  • This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics.The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come

  • TVS.005248_TT_Shaurya Gupta, Kanta Prasad Sharma, Ashish Sharma, Dac-Nhuong Le - Evolving Networking Technologies_ Developments and Future Directions-.pdf.jpg
  • Sách/Book


  • Authors: - (2023)

  • This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication

  • TVS.005245_TT_Ram Shankar Siva Kumar_ Hyrum Anderson - Not with a Bug, But with a Sticker _ Attacks on Machine Learning Systems and What To Do About T.pdf.jpg
  • Sách/Book


  • Authors: Siva Kumar, Ram Shankar (2023)

  • A robust and engaging account of the single greatest threat faced by AI and ML systems In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats.

  • TVS.005285_TT_Chris Hughes_ Tony Turner - Software Transparency_ Supply Chain Security in an Era of a Software-Driven Society-Wiley (2023).pdf.jpg
  • Sách/Book


  • Authors: Hughes, Chris (2023)

  • Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you'll explore real-world examples and guidance on how to defend your own organization against internal and external attacks

  • TVS.005216_TT_S. Sountharrajan_ R. Maheswar Geetanjali_ Rathee_ M. Akila - Wireless Communication for Cybersecurity-Wiley (2023).pdf.jpg
  • Sách/Book


  • Authors: - (2023)

  • This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered. The chapters also state the challenges in privacy and security levels for various algorithms and various techniques and tools are proposed for each challenge.