Exclusivité web : à partir de 35 euros d’achat, frais de port à 1 centime pour les expéditions vers la France métropolitaine, la Suisse et l’UE avec Colissimo ou GLS
Recherche avancée
Année de parution (33)
Appliquer
Effacer ce filtre
État de parution (6)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Langue (4)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Thème (2)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Support (4)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Auteur
Appliquer
Effacer ce filtre
Trier par...
Pertinence
Date de parution
Auteur
Titre
Prix
Recherche sur le thème Sécurité informatique :
Nous trouvons 2087 ouvrages correspondant à Sécurité informatique
The first-ever introduction to the full range of cybersecurity challenges and solutionsCybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data...
1. Web3 concepts and general introduction; 2. The first principles of Web3; 3. Blockchains: the foundation; 4. The scalability of Web3; 5. The smart contract ecosystem; 6. The tokenomics for Web3...
This book presents a new, innovative cloud federation solution called Federation-as-a-Service (FaaS) and its software platform, SUNFISH. The authors explain the various engineering innovations...
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits, but also the art of human manipulation. Social engineering attacks...
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of...
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of...
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability managementOrganizations spend tremendous time and resources addressing...
A rigorous new framework for understanding the world of the futureInformation technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an...
Cybercrime and Digital Deviance, 2nd Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance...
Cybercrime and Digital Deviance, 2nd Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance...
Ce livre, structuré en trois parties, revient d'abord sur les notions clés de l'informatique et des données du cyber-espace, puis il en identifie les failles et les menaces auxquelles tendent la...
This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the...
Dans notre société de plus en plus connectée, la cybersécurité a pris une place centrale au point de devenir une absolue nécessité. Attaques contre des institutions publiques, cyberguerre...
The financial sector is witnessing rapid technological innovations, leading to the emergence of Fintech (financial technologies), revolutionizing national and international financial landscapes...
Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.. Stepping Through Cybersecurity Risk Management...
Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden Krisen. Dieses Buch hilft nicht nur bei ihrer...
Optimal Spending on Cybersecurity Measures: DevOps aims to discuss the integration of risk management methodologies within the DevOps process.. This book introduces the cyber risk investment...