In Depth Security Vol. III

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information.

Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

Aloita tämä kirja jo tänään, hintaan 0€

  • Kokeilujakson aikana käytössäsi on kaikki sovelluksen kirjat
  • Ei sitoumusta, voit perua milloin vain
Kokeile nyt ilmaiseksi
Yli 52 000 ihmistä on antanut Nextorylle viisi tähteä App Storessa ja Google Playssä.

Muut ovat myös lukeneet

Ohita lista
  1. Artificial Intelligence for Cybersecurity : Develop AI approaches to solve cybersecurity problems in your organization

    Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras

    book
  2. 4.0

    Swarm Intelligence

    Fouad Sabry

    book
  3. Combating Cyberattacks Targeting the AI Ecosystem : Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities

    Aditya K. Sood

    book
  4. Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques

    Milad Aslaner

    book
  5. Mastering Cyber Intelligence : Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

    Jean Nestor M. Dahj

    book
  6. Incident Response with Threat Intelligence : Practical insights into developing an incident response capability through intelligence-based threat hunting

    Roberto Martinez

    book
  7. CC Certified in Cybersecurity Study Guide

    Mike Chapple

    audiobook
  8. Market Intelligence

    Fouad Sabry

    book
  9. Alice and Bob Learn Application Security

    Tanya Janca

    audiobook
  10. Cyber Warfare – Truth, Tactics, and Strategies : Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

    Gregory J. Touhill, Dr. Chase Cunningham

    book
  11. A Spy Called Cynthia : And a Life in Intelligence

    Anonymous

    book
  12. Living to Tell the Horrid Tales: True Life Stories of Fomer Slaves, Historical Documents & Novels

    Frederick Douglass, Harriet Jacobs, Harriet Beecher Stowe, Mark Twain, Lydia Maria Child, Harriet E. Wilson, William Wells Brown, Charles W. Chesnutt, James Weldon Johnson, Albion Winegar Tourgée, Sutton E. Griggs, Solomon Northup, Willie Lynch, Nat Turner, Sojourner Truth, Mary Prince, William Craft, Ellen Craft, Louis Hughes, Jacob D. Green, Booker T. Washington, Olaudah Equiano, Elizabeth Keckley, William Still, Sarah H. Bradford, Josiah Henson, Charles Ball, Austin Steward, Henry Bibb, L. S. Thompson, Kate Drumgoold, Lucy A. Delaney, Moses Grandy, John Gabriel Stedman, Henry Box Brown, Margaretta Matilda Odell, Thomas S. Gaines, Brantz Mayer, Aphra Behn, Theodore Canot, Daniel Drayton, Thomas Clarkson, F. G. De Fontaine, John Dixon Long, Stephen Smith, Joseph Mountain, Ida B. Wells-Barnett

    book

Liittyvät kategoriat