Showing 1 to 9 of 14 (2 Pages)

Card List Article

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. 
The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control;..

USD0
  • User Rating Count:

Card List Article

This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. 
The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security;..

USD0
  • User Rating Count:

Card List Article

Written in an easy to understand style, this book provides a comprehensive overview of the physical-cyber security of Industrial Control Systems benefitting the computer science and automation engineers, students and industrial cyber security agencies in obtaining essential understanding of the ICS cyber security from concepts to realization.

USD3.99
  • User Rating Count:

Card List Article

No data is completely safe.

Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT..

USD22.99
  • User Rating Count:

Card List Article

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems,..

USD12.99
  • User Rating Count:

Card List Article

The February 2015 cyber-attack on Anthem, in which cyber-terrorists accessed 80 million member and employee records, exposed the vulnerability of the US healthcare system in a way no other attack—whether retail or healthcare—has.  In this ground breaking work, John Gomez, CEO of Sensato and Colin Konschak, CEO of Divurgent, explore the challenges..

USD0
  • User Rating Count:

Card List Article

This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.


Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.

Table of Contents

What is Cloud Computing?
Types..

USD0
  • User Rating Count: 31

Card List Article

Cybersecurity is a concern for anyone who uses the internet to communicate, conduct research, shop, or find entertainment. 
This interactive handbook is designed to introduce the basic concepts of cybersecurity, to anyone who uses the internet. The content provides the reader with a broad overview of the threats and pitfalls, found in the..

USD0
  • User Rating Count:

Card List Article

Welcome to the connected world. So you’re all set up on Facebook and Instagram? Great, but what should you do when you’re contemplating a divorce? Anyone on your Facebook feed might learn where you are and when you went to see your new attorney and that might not be what you want. Is there a way to manage your online security and presence so that..

USD0
  • User Rating Count:

Card List Article

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist..

USD39.99
  • User Rating Count:

Card List Article

Finance: Cloud Computing, Cyber Security and Cyber Heist - Beginners Guide to Help Protect Against Online Theft in the Cyber World 

***Please Note: This is a Guide to Help Protect against Online Theft in the Cyber World - For Beginners*** 

With so many different cyber-crime activities to watch for, protecting your security..

USD0
  • User Rating Count: 5

Card List Article

An essential, eye-opening book about cyberterrorism, cyber war, and the next great threat to our national security.  

“Cyber War may be the most important book about national security policy in the last several years.” –Slate

Former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and..

USD13.99
  • User Rating Count: 106

Card List Article

A beautiful computer hacker and a bad-boy FBI agent must collaborate—in more ways than one—in this sexy, suspenseful novel from #1 New York Times bestselling author Julie Garwood.

Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous..

USD6.99
  • User Rating Count: 1350

Card List Article

NEW YORK TIMES BESTSELLER. The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom—and almost got away with it
 
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark..

USD13.99
  • User Rating Count: 1089

Card List Article

In this modern era, the rising importance of electronic gadgets (i.e., mobile hand-held devices) – which became an integral part of business, providing connectivity with the Internet outside the office – brings many challenges to secure these devices from being a victim of cybercrime.

In the recent years, the use of laptops, personal..

USD1.99
  • User Rating Count:

Card List Article

The true, declassified account of CIA operative Tony Mendez's daring rescue of American hostages from Iran that inspired the critically-acclaimed film directed by and starring Ben Affleck, and co-starring John Goodman, Alan Arkin, and Bryan Cranston.

On November 4, 1979, Iranian militants stormed the American embassy in Tehran and..

USD13.99
  • User Rating Count: 328

Card List Article

Reality just became a virtual nightmare in book two of the bestselling Mortality Doctrine series, the next phenomenon from the author of the Maze Runner series, James Dashner.

Includes a sneak peek of The Fever Code, the highly-anticipated conclusion to the Maze Runner series—the novel that finally reveals how the..

USD8.99
  • User Rating Count: 312

Card List Article

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians..

USD10.99
  • User Rating Count:

Card List Article

NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.

“Fascinating, frightening, and beyond timely.”—Anderson Cooper


Imagine a blackout lasting not..

USD11.99
  • User Rating Count: 125

Card List Article

From the author of Argo comes an unforgettable behind-the-scenes story of espionage in action. In the first ever memoir by a top-level operative to be authorized by the CIA, Antonio J. Mendez reveals the cunning tricks and insights that helped save hundreds from deadly situations.

Adept at creating new identities for anyone, anywhere, Mendez..

USD12.99
  • User Rating Count: 183

Card List Article

“Conventional analysis suffers from a profound failure of imagination. It imagines passing clouds to be permanent and is blind to powerful, long-term shifts taking place in full view of the world.” —George Friedman

In his long-awaited and provocative new book, George Friedman turns his eye on the future—offering a lucid, highly..

USD7.99
  • User Rating Count: 114

Card List Article

Ali Reynolds returns in this suspenseful thriller featuring New York Times bestselling author J.A. Jance’s signature “fast pacing, surprising plot twists, and a strong, principled heroine” (Booklist).

Cybersecurity expert Roger McGeary finally has his life back on track after years of struggling with depression...

USD9.99
  • User Rating Count: 159

Card List Article

The #1 New York Times-bestselling master of international intrigue takes readers into the bleeding-edge world of technological espionage in a propulsive thriller that feels chillingly real.

Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime..

USD6.99
  • User Rating Count: 400

Card List Article

Acclaimed journalist Jeffrey Toobin takes us into the chambers of the most important—and secret—legal body in our country, the Supreme Court, revealing the complex dynamic among the nine people who decide the law of the land. An institution at a moment of transition, the Court now stands at a crucial point, with major changes in store on such..

USD13.99
  • User Rating Count: 80