Zobrazeno 1 - 10
of 1 327
pro vyhledávání: '"358"'
Autor:
Dirk Heckmann, Sarah Rachut
Weder anwaltliche Schriftsätze noch Urteile oder Verwaltungsakte werden heute handschriftlich verfasst: Sollten dann nicht auch die Klausuren in den juristischen Staatsexamina am Computer erstellt werden (sog. E-Klausur) statt mit Papier und Stift?
Datenschutz bleibt ein umkämpftes Thema im Kontext der voranschreitenden Digitalisierung. Die Beiträge des Bandes gehen der Frage nach, welche Formen Privatheit in einer digitalen Gesellschaft annehmen kann und welche Chancen und Risiken dabei ents
Learn how to secure your Java applications from hackers using Spring Security 4.2About This BookArchitect solutions that leverage the full power of Spring Security while remaining loosely coupled.Implement various scenarios such as supporting existin
Autor:
Corey P. Schultz, Bob Perciaccante
Over 80 recipes to effectively test your network and boost your career in securityAbout This BookLearn how to scan networks to find vulnerable computers and serversHack into devices to control them, steal their data, and make them yoursTarget wireles
Autor:
Karl-Heinz Schriever, Markus Schröder
Establishing ethical and privacy protection aspects in scientific research, especially in medical research, has a long history. Medical data are usually more sensible than other personal data and require therefore an even higher degree of protection
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warf
Autor:
Hughes, Connor R., Collins, Howard
The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has gro
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managi
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography techn
Autor:
L. Taylor, Laura P. Taylor
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The differen