Zobrazeno 1 - 10
of 46
pro vyhledávání: '"521"'
Autor:
Meg Leta Jones
A free ebook version of this title is available through Luminos, University of California Press's Open Access publishing program. Visit www.luminosoa.org to learn more. This vibrant and visionary reimagining of the field of cyberlaw through a feminis
Autor:
Jochen Nickel
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsKey FeaturesUnderstand how to identify and manage business drivers during transitionsExplore Microsoft Identity a
Autor:
Patrik Uytterhoeven, Rihards Olups
Gather detailed statistics and deploy impressive business solutions with Zabbix 4.0Key FeaturesExperience the full impact of Zabbix 4.0, a useful and increasingly popular toolEnhance your network's performance and manage hosts and systemsA step-by-st
Autor:
Nicole van Deursen
Cybersecurity needs a change in communication. It is time to show the world that cybersecurity is an exciting and diverse field to work in. Cybersecurity is not only about hackers and technical gobbledygook. It is a diverse field of work with a lot o
Autor:
Sander Berkouwer
Learn the intricacies of managing Azure AD and Azure AD Connect, as well as Active Directory for administration on cloud and Windows Server 2019Key FeaturesExpert solutions for the federation, certificates, security, and monitoring with Active Direct
Autor:
Yuri Diogenes, Dr. Erdal Ozkaya
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurityKey FeaturesCovers the latest security threats and defense strategies for 2020Introduces techniques and skillsets require
Autor:
Zaid Sabih
Learn how to hack systems like black hat hackers and secure them like security expertsKey FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure system
Autor:
Dr. Erdal Ozkaya
Improve information security by learning Social Engineering.Key FeaturesLearn to implement information security using social engineeringGet hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so onPract
Autor:
Musa, Sarhan M.
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and netw
Autor:
John R. Vacca
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity