Showing 1 to 9 of 14 (2 Pages)

Card List Article

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. 
The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control;..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. 
The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security;..

USD0
  • User Rating Count:

Card List Article

Written in an easy to understand style, this book provides a comprehensive overview of the physical-cyber security of Industrial Control Systems benefitting the computer science and automation engineers, students and industrial cyber security agencies in obtaining essential understanding of the ICS cyber security from concepts to realization.

USD3.99
  • User Rating Count:

Card List Article

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems,..

USD12.99
  • User Rating Count:

Card List Article

This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.


Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.

Table of Contents

What is Cloud Computing?
Types..

USD0
  • User Rating Count: 29

Card List Article

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist..

USD39.99
  • User Rating Count:

Card List Article

Cybersecurity is a concern for anyone who uses the internet to communicate, conduct research, shop, or find entertainment. 
This interactive handbook is designed to introduce the basic concepts of cybersecurity, to anyone who uses the internet. The content provides the reader with a broad overview of the threats and pitfalls, found in the..

USD0
  • User Rating Count:

Card List Article

Welcome to the connected world. So you’re all set up on Facebook and Instagram? Great, but what should you do when you’re contemplating a divorce? Anyone on your Facebook feed might learn where you are and when you went to see your new attorney and that might not be what you want. Is there a way to manage your online security and presence so that..

USD0
  • User Rating Count:

Card List Article

Finance: Cloud Computing, Cyber Security and Cyber Heist - Beginners Guide to Help Protect Against Online Theft in the Cyber World 

***Please Note: This is a Guide to Help Protect against Online Theft in the Cyber World - For Beginners*** 

With so many different cyber-crime activities to watch for, protecting your security..

USD0
  • User Rating Count:

Card List Article

An essential, eye-opening book about cyberterrorism, cyber war, and the next great threat to our national security.  

“Cyber War may be the most important book about national security policy in the last several years.” –Slate

Former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and..

USD12.99
  • User Rating Count: 106

Card List Article

A beautiful computer hacker and a bad-boy FBI agent must collaborate—in more ways than one—in this sexy, suspenseful novel from #1 New York Times bestselling author Julie Garwood.

Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous..

USD7.99
  • User Rating Count: 1289

Card List Article

NEW YORK TIMES BESTSELLER. The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom—and almost got away with it
 
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark..

USD13.99
  • User Rating Count: 1067

Card List Article

Reality just became a virtual nightmare in book two of the bestselling Mortality Doctrine series, the next phenomenon from the author of the Maze Runner series, James Dashner.

Includes a sneak peek of The Fever Code, the highly-anticipated conclusion to the Maze Runner series—the novel that finally reveals how the..

USD8.99
  • User Rating Count: 311

Card List Article

“Conventional analysis suffers from a profound failure of imagination. It imagines passing clouds to be permanent and is blind to powerful, long-term shifts taking place in full view of the world.” —George Friedman

In his long-awaited and provocative new book, George Friedman turns his eye on the future—offering a lucid, highly..

USD12.99
  • User Rating Count: 111

Card List Article

Ali Reynolds returns in this suspenseful thriller featuring New York Times bestselling author J.A. Jance’s signature “fast pacing, surprising plot twists, and a strong, principled heroine” (Booklist).

Cybersecurity expert Roger McGeary finally has his life back on track after years of struggling with depression...

USD9.99
  • User Rating Count: 154

Card List Article

The #1 New York Times-bestselling master of international intrigue takes readers into the bleeding-edge world of technological espionage in a propulsive thriller that feels chillingly real.

Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime..

USD6.99
  • User Rating Count: 392

Card List Article

It’s December 1997, and a man-eating tiger is on the prowl outside a remote village in Russia’s Far East. The tiger isn’t just killing people, it’s annihilating them, and a team of men and their dogs must hunt it on foot through the forest in the brutal cold. As the trackers sift through the gruesome remains of the victims, they discover that..

USD9.99
  • User Rating Count: 133

Card List Article

Acclaimed journalist Jeffrey Toobin takes us into the chambers of the most important—and secret—legal body in our country, the Supreme Court, revealing the complex dynamic among the nine people who decide the law of the land. An institution at a moment of transition, the Court now stands at a crucial point, with major changes in store on such..

USD13.99
  • User Rating Count: 80

Card List Article

The New York Times bestselling author J.A. Jance returns with the thirteenth pulse-pounding thriller in the “engaging and entertaining” (Los Angeles Times) Ali Reynolds series.

After taking down the man responsible for his best friend’s death, Stuart Ramey believes the case is finally closed. That is, until Stu..

USD9.99
  • User Rating Count: 164

Card List Article

“[A] high-octane blend of nervy characters, dark humor and bristling dialogue... smart, timely, electrifying.”
   — NPR

An exhilarating thrill-ride through the underbelly of cyber espionage in the vein of David Ignatius’s The Director and the television series Leverage, CSI: Cyber, and Person of Interest,..

USD7.99
  • User Rating Count: 126

Card List Article

The February 2015 cyber-attack on Anthem, in which cyber-terrorists accessed 80 million member and employee records, exposed the vulnerability of the US healthcare system in a way no other attack—whether retail or healthcare—has.  In this ground breaking work, John Gomez, CEO of Sensato and Colin Konschak, CEO of Divurgent, explore the challenges..

USD0
  • User Rating Count:

Card List Article

..

USD13.99
  • User Rating Count: 107

Card List Article

No data is completely safe.

Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT..

USD22.99
  • User Rating Count:

Card List Article

NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER

ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015

One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using..

USD5.99
  • User Rating Count: 38