Showing 1 to 9 of 14 (2 Pages)

Card List Article

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. 
The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control;..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. 
The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security;..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT..

USD0
  • User Rating Count:

Card List Article

Written in an easy to understand style, this book provides a comprehensive overview of the physical-cyber security of Industrial Control Systems benefitting the computer science and automation engineers, students and industrial cyber security agencies in obtaining essential understanding of the ICS cyber security from concepts to realization.

USD3.99
  • User Rating Count:

Card List Article

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems,..

USD12.99
  • User Rating Count:

Card List Article

The February 2015 cyber-attack on Anthem, in which cyber-terrorists accessed 80 million member and employee records, exposed the vulnerability of the US healthcare system in a way no other attack—whether retail or healthcare—has.  In this ground breaking work, John Gomez, CEO of Sensato and Colin Konschak, CEO of Divurgent, explore the challenges..

USD0
  • User Rating Count:

Card List Article

No data is completely safe.

Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT..

USD22.99
  • User Rating Count:

Card List Article

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist..

USD42.99
  • User Rating Count:

Card List Article

This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.


Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.

Table of Contents

What is Cloud Computing?
Types..

USD0
  • User Rating Count: 36

Card List Article

Cybersecurity is a concern for anyone who uses the internet to communicate, conduct research, shop, or find entertainment. 
This interactive handbook is designed to introduce the basic concepts of cybersecurity, to anyone who uses the internet. The content provides the reader with a broad overview of the threats and pitfalls, found in the..

USD0
  • User Rating Count:

Card List Article

Before the multi-million, runaway bestseller The Da Vinci Code, Dan Brown set his razor-sharp research and storytelling skills on the most powerful intelligence organization on earth--the National Security Agency (NSA)--in this thrilling novel, Digital Fortress.

When the NSA's invincible code-breaking machine encounters..

USD9.99
  • User Rating Count: 2034

Card List Article

Finance: Cloud Computing, Cyber Security and Cyber Heist - Beginners Guide to Help Protect Against Online Theft in the Cyber World 

***Please Note: This is a Guide to Help Protect against Online Theft in the Cyber World - For Beginners*** 

With so many different cyber-crime activities to watch for, protecting your security..

USD0
  • User Rating Count: 7

Card List Article

Welcome to the connected world. So you’re all set up on Facebook and Instagram? Great, but what should you do when you’re contemplating a divorce? Anyone on your Facebook feed might learn where you are and when you went to see your new attorney and that might not be what you want. Is there a way to manage your online security and presence so that..

USD0
  • User Rating Count:

Card List Article

An essential, eye-opening book about cyberterrorism, cyber war, and the next great threat to our national security.  

“Cyber War may be the most important book about national security policy in the last several years.” –Slate

Former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and..

USD13.99
  • User Rating Count: 107

Card List Article

In this modern era, the rising importance of electronic gadgets (i.e., mobile hand-held devices) – which became an integral part of business, providing connectivity with the Internet outside the office – brings many challenges to secure these devices from being a victim of cybercrime.

In the recent years, the use of laptops, personal..

USD1.99
  • User Rating Count:

Card List Article

A beautiful computer hacker and a bad-boy FBI agent must collaborate—in more ways than one—in this sexy, suspenseful novel from #1 New York Times bestselling author Julie Garwood.

Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous..

USD7.99
  • User Rating Count: 1418

Card List Article

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. 
The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security;..

USD0
  • User Rating Count:

Card List Article

NEW YORK TIMES BESTSELLER. The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom—and almost got away with it
 
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark..

USD13.99
  • User Rating Count: 1143

Card List Article

It is important to say that innovation influences the market and its operators, especially about competition conditions.

One of the most significant technological advances relates to the possibility of capturing a huge amount of information and the rapid processing thereof (two of the main features that make up the phenomenon known..

USD0
  • User Rating Count:

Card List Article

National Bestseller 

NPR Best Book of the Year

“Not all superheroes wear capes, and Elizebeth Smith Friedman should be the subject of a future Wonder Woman movie.” —The New York Times

Joining the ranks of Hidden Figures and In the Garden of Beasts, the incredible true story of the greatest codebreaking duo..

USD13.99
  • User Rating Count: 338

Card List Article

Reality just became a virtual nightmare in book two of the bestselling Mortality Doctrine series, the next phenomenon from the author of the Maze Runner series, James Dashner.

Includes a sneak peek of The Fever Code, the highly-anticipated conclusion to the Maze Runner series—the novel that finally reveals how the..

USD8.99
  • User Rating Count: 315

Card List Article

“[A] high-octane blend of nervy characters, dark humor and bristling dialogue... smart, timely, electrifying.”
   — NPR

An exhilarating thrill-ride through the underbelly of cyber espionage in the vein of David Ignatius’s The Director and the television series Leverage, CSI: Cyber, and Person of Interest,..

USD1.99
  • User Rating Count: 138

Card List Article

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians..

USD10.99
  • User Rating Count:

Card List Article

NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.

“Fascinating, frightening, and beyond timely.”—Anderson Cooper


Imagine a blackout lasting not..

USD11.99
  • User Rating Count: 130

Card List Article

From the author of Argo comes an unforgettable behind-the-scenes story of espionage in action. In the first ever memoir by a top-level operative to be authorized by the CIA, Antonio J. Mendez reveals the cunning tricks and insights that helped save hundreds from deadly situations.

Adept at creating new identities for anyone, anywhere, Mendez..

USD12.99
  • User Rating Count: 193