Listing 1 - 10 of 93 | << page >> |
Sort by
|
Choose an application
Computer security. --- Systèmes informatiques --- Mesures de sûreté.
Choose an application
Installations nucléaires --- Droit nucléaire --- Mesures de sûreté
Choose an application
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint.
Computer security --- Systèmes informatiques --- Mesures de sûreté.
Choose an application
Les plus de cette édition : - L'intégralité de la réglementation française, européenne et internationale expliquée et mise en perspective ; - Des commentaires accessibles rédigés par des juristes et des spécialistes de I'IT et des SSI ; - Des décryptages et des notices pratiques rédigés par des spécialistes et des praticiens de la matière ; - Inclus : le Code en ligne, enrichi, annoté et mis à jour en continu. La conformité juridique, un pilier de la cybersécurité : le Code de la cybersécurité se veut la réponse aux enjeux de la menace cyber et de la transformation numérique. Le code s'appuie ainsi sur la définition de la cybersécurité donnée par l'Agence nationale de la sécurité des systèmes d'information (ANSSI) déclinée en 3 parties : - LIVRE I : Sécurité des systèmes d'information ; - LIVRE II : Lutte contre la cybercriminalité ; - LIVRE III : Cyberdéfense. Cette édition, réalisée sous la direction scientifique de Michel Séjean, Professeur des universités en droit privé et sciences criminelles, et avec le concours du Général Watin-Augouard, est préfacée par : - Marie-Laure Denis, présidente de la CNIL ; - Guillaume Poupard, directeur général de l'ANSSI ; - Xavier Léonetti, Chef de la mission de prévention et de lutte contre la cybercriminalité du ministère de la Justice.
Systèmes informatiques --- Protection de l'information (informatique) --- Réseaux d'ordinateurs --- Cybercriminalité. --- Cyberterrorisme. --- Cyberespace. --- Mesures de sûreté --- Droit --- Mesures de sûreté
Choose an application
Linux (système d'exploitation des ordinateurs) --- Computer security. --- Systèmes informatiques --- Internet --- Internet --- Mesures de sûreté. --- Security measures. --- Mesures de sûreté. --- Linux.
Choose an application
"With identity theft, cybercrime, and digital file sharing proliferating in today's wired world, providing safe and accurate information transfers has become a paramount concern. The issues and problems raised in this endeavor are encompassed within three disciplines: cryptography, information theory, and error-correction. As technology continues to develop, these fields have converged at a practical level, increasing the need for a unified treatment of these three cornerstones of the information age. This book offers a complete, yet accessible account of the technologies shaping the 21st century. This new edition is geared towards audiences from financial institutions, banks, law companies and governments interested in blockchains, and companies using security for new products such as self-driving cars. This new edition also features five new chapters on security and the internet of things, increased security in elliptic curve cryptography, some new equalities in information theory, blockchains and cryptocurrency, and Bletchley Park." [Publisher]
Cryptography. --- Computer security. --- Telecommunication systems --- Cryptographie --- Systèmes informatiques --- Systèmes de télécommunications --- Security measures. --- Mesures de sûreté --- Mesures de sûreté.
Choose an application
Computer security --- Computer networks --- Systèmes informatiques --- Réseaux d'ordinateurs --- Examinations. --- Security measures --- Examinations. --- Mesures de sûreté --- Examens --- Mesures de sûreté
Choose an application
"Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-601. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a team of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601) will help you pass the exam and become a CompTIA certified computer security expert" [Publisher]
Computer security --- Computer networks --- Systèmes informatiques --- Réseaux d'ordinateurs --- Examinations. --- Security measures --- Examinations. --- Mesures de sûreté --- Examens --- Mesures de sûreté
Choose an application
"In this fast-paced global economy, academia and industry must innovate to evolve and succeed. Today's researchers and industry experts are seeking transformative technologies to meet the challenges of tomorrow. The cutting-edge technological advances in cybersecurity solutions aids in enabling the security of complex heterogeneous high-performance computing environments. On the other hand, high-performance computing power facilitates powerful and intelligent innovative models for reducing time to response to identify and resolve a multitude of potential new emerging cyber-attacks. Cybersecurity and High-Performance Computing Environments provides a collection of the current and emergent research innovations, practices, and applications focusing on the interdependence of cybersecurity and high-performance computing domains for discovering and resolving new emerging cyber-threats. The text represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments and covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent multifaceted anomalous and malicious characteristics. The content will help university students, researchers, and professionals understand how high-performance computing research fits broader cybersecurity objectives and vice versa" [Publisher]
Choose an application
For courses in computer/network security. Balancing principle and practice-an updated survey of the fast-moving world of computer and network securityComputer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate-and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.
Computer security. --- Computer networks --- Systèmes informatiques --- Réseaux d'ordinateurs --- Security measures. --- Mesures de sûreté. --- Mesures de sûreté.
Listing 1 - 10 of 93 | << page >> |
Sort by
|