CHF 156,00

Understanding Cybersecurity Technologies
A Guide to Selecting the Right Cybersecurity Tools

Anglais · Livre Relié

Expédition généralement dans un délai de 1 à 3 semaines

Description

En savoir plus










Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too


A propos de l'auteur










Dr. Abbas Moallem is a consultant and adjunct professor at San Jose State University, California where he teaches human-computer interaction, cybersecurity, information visualization and human factors. He is the program chair of HCI-CPT, the International Conference on HCI for Cybersecurity, Privacy and Trust.
Dr. Moallem is the editor of "HCI in cybersecurity Handbook" and the author of "Cybersecurity Awareness Among College Students and Faculty". He is also the editor of a book series from CRC PRESS called "The Human Element in Smart and Intelligent Systems Series".


Résumé

Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too

Détails du produit

Auteurs Abbas Moallem, Abbas (Adjunct Faculty Moallem
Edition Taylor & Francis Ltd.
 
Contenu Livre
Forme du produit Livre Relié
Date de parution 31.12.2021
Catégorie Sciences naturelles, médecine, it, technique > Informatique, ordinateurs > Communication des données, réseaux
 
EAN 9780367457457
ISBN 978-0-367-45745-7
Nombre de pages 202
 
Thème The Human Element in Smart and Intelligent Systems
Catégories ID, SQL Injection, LAW / Forensic Science, hip, TECHNOLOGY & ENGINEERING / Industrial Engineering, TECHNOLOGY & ENGINEERING / Engineering (General), COMPUTERS / Security / General, Antivirus, TCP, Digital Forensics, Privacy & data protection, Privacy and data protection, Ethical & social aspects of IT, COMPUTERS / Human-Computer Interaction (HCI), Computer fraud & hacking, Computer fraud and hacking, IPS, COMPUTERS / Security / Network Security, Ergonomics, security protocols, Endpoint Security, Phishing Detection, Vulnerability Assessment, Phishing Attacks, Authentication Methods, Email security, Digital and information technologies: social and ethical aspects, cyber risk management, IoT Technology, IoT Device, Violated, pen testing, compliance monitoring, Antivirus software, Biometric systems, web application firewall, Packet Filtering, Biometric Technologies, location tracking, insider threat analysis, advanced threat detection techniques, endpoint protection, Application Firewall, Host Intrusion Prevention System, Id Technology, Average Visit Duration, Network Security Technologies
 

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.