Wir konnten keine exakten Treffer zu Ihrer Suche nach "Computer ethics and security" finden. Könnten diese Produkte zu Ihrer Suche passen?

Ansicht:
Mike Chapple: Isc2 Cissp Certified Information Systems Security Professional Official Study Guide, Buch

Mike Chapple, James Michael Stewart, Darril Gibson
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide

CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated base…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 87,77*
Artikel ist im Warenkorb
Hamilton Mann: Artificial Integrity, Buch

Hamilton Mann
Artificial Integrity

Navigating the transitions to the future of AI--Integrity over Intelligence Envision a world where artificial intelligence can deliver integrity-led outcomes seamlessly, adapting to diverse cultural conte…

lieferbar ab 29.10.2024.
Buch
EUR 34,89*
Artikel ist im Warenkorb
Lawrence C Miller: Cissp for Dummies, Buch

Lawrence C Miller, Peter H Gregory
Cissp for Dummies

Boost your cybersecurity career with CISSP Fully revised for the April 2024 CBK(R), this book is your key to succeeding on the CISSP exam. You'll learn everything you need to know about the popular ISC2 c…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 44,87*
Artikel ist im Warenkorb
Kashmir Hill: Your Face Belongs to Us: A Secretive Startup's Quest to End Privacy as We Know It, Buch

Kashmir Hill
Your Face Belongs to Us: A Secretive Startup's Quest to End Privacy as We Know It

"In this riveting feat of reporting, Kashmir Hill illuminates the improbable rise of Clearview AI and how Hoan Ton-That, a computer engineer and Richard Schwartz, a Giuliani associate, launched a terrifyi…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 29,92*
Artikel ist im Warenkorb
Adam Tilmar Jakobsen: Practical Cyber Intelligence, Buch

Adam Tilmar Jakobsen
Practical Cyber Intelligence

Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to …

lieferbar innerhalb 1-2 Wochen
Buch
EUR 124,41*
Artikel ist im Warenkorb
Bart R McDonough: Cyber Guardians, Buch

Bart R McDonough
Cyber Guardians

A comprehensive overview for directors aiming to meet their cybersecurity responsibilities In Cyber Guardians: Empowering Board Members for Effective Cybersecurity, veteran cybersecurity advisor Bart McD…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 39,88*
Artikel ist im Warenkorb
Kyle Cucci: Evasive Malware, Buch

Kyle Cucci
Evasive Malware

Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowH…

lieferbar ab 10.9.2024.
Buch
EUR 69,28*
Artikel ist im Warenkorb
Ethan Cowan: Hands-On Differential Privacy, Buch

Ethan Cowan, Michael Shoemate, Mayana Pereira
Hands-On Differential Privacy

Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for o…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 79,27*
Artikel ist im Warenkorb
Kim Crawley: Hacker Culture A to Z, Buch

Kim Crawley
Hacker Culture A to Z

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and co…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 45,86*
Artikel ist im Warenkorb
David Senecal: The Reign of Botnets, Buch

David Senecal
The Reign of Botnets

A start-to-finish presentation of how to defend against bot attacks on the web for security newbies and veterans In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, veteran …

lieferbar innerhalb 1-2 Wochen
Buch
EUR 40,38*
Artikel ist im Warenkorb
Panos Louridas: Cryptography, Buch

Panos Louridas
Cryptography

A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics. We all keep secrets—from our gym locker codes to …

lieferbar ab 22.10.2024.
Buch
EUR 19,43*
Artikel ist im Warenkorb
Omar Santos: The AI Revolution in Networking, Cybersecurity, and Emerging Technologies, Buch

Omar Santos, Samer Salam, Hazim Dahir
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.   AI is having a profound impact on nearly every sector of the workforce. Huge professional and finan…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 34,89*
Artikel ist im Warenkorb
Chris Jay Hoofnagle: Cybersecurity in Context, Buch

Chris Jay Hoofnagle, Golden G Richard
Cybersecurity in Context

"A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our…

lieferbar ab 8.10.2024.
Buch
EUR 145,86*
Artikel ist im Warenkorb
Maximilian Kiener: Moral Responsibility and Artificial Intelligence, Buch

Maximilian Kiener,
Moral Responsibility and Artificial Intelligence

This book uses the 'Lorry Driver Paradox', a novel puzzle, to explore and clarify our understanding of moral responsibility, to break new ground in the ethics of artificial intelligence (AI), and to conne…

lieferbar ab 6.2.2025.
Buch
EUR 158,50*
Artikel ist im Warenkorb
Drinor Selmanaj: Adversary Emulation with Mitre Att&ck, Buch

Drinor Selmanaj
Adversary Emulation with Mitre Att&ck

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This co…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 65,29*
Artikel ist im Warenkorb
Zoubir Z Mammeri: Cryptography, Buch

Zoubir Z Mammeri
Cryptography

An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitig…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 173,65*
Artikel ist im Warenkorb
Ev Kontsevoy: Identity-Native Infrastructure Access Management, Buch

Ev Kontsevoy, Sakshyam Shah, Peter Conrad
Identity-Native Infrastructure Access Management

"Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation f…

sofort lieferbar
Buch
EUR 42,04*
Artikel ist im Warenkorb
Len Noe: Human Hacked, Buch

Len Noe
Human Hacked

Discover the future of cybersecurity through the eyes of the world's first augmented ethical hacker In Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker by Len Noe, a pioneer…

lieferbar ab 29.10.2024.
Buch
EUR 35,39*
Artikel ist im Warenkorb
: Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection, Buch

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial I…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 155,97*
Artikel ist im Warenkorb
Roy J Eidelson: Doing Harm, Buch

Roy J Eidelson
Doing Harm

*Doing Harm *recounts a critical chapter in the recent history of psychology: the field's enmeshment in the "war on terror," and the ensuing reckoning over do-no-harm ethics during times of threat. Eidels…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 32,90*
Artikel ist im Warenkorb
Informationen zur Lieferbarkeit bzw. zu Veröffentlichungsterminen von Artikeln beruhen auf Vorabinformationen unserer Lieferanten. Diese Termine sind ohne Gewähr und können sich jederzeit ändern.