Der Einsatz von Cloud-Services birgt neben vielfältigen Vorteilen auch Risiken für die
In diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO ) und
In diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO) und
Thorsten Walter beschreibt die technischen und juristischen Fallstricke sogenannter „Bring
Secure your PHP-based web applications with this compact handbook. You'll get
Sybex's
Ensure robust web security for your Java applications in just a few days. This
Cisco Routers for the Small Business provides, in plain English, a
Hackers, cyber-criminals, Dark Web users, and techno-terrorists beware! This book should
Improve cloud security within your organization by
This book focuses on the innovation of blockchain technology and the advantages it offers.
IT
In nontechnical language and engaging style, 10 Don’ts on Your Digital
Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack.
Analyzing how hacks are done, so as to stop them in the
Uncover hidden patterns of data and respond with
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training
Use the guidance in this comprehensive field guide to gain the support of your top
Learn the basics of ethical hacking and gain insights into the logic,