Aid organizations usually embrace the idea of digitalization, both in terms of using
Similar to unraveling a math word problem, Security Intelligence: A
This book deals with computer performance by addressing basic preconditions. Besides
The frontlines of cybersecurity operations include many unfilled jobs and exciting career
The cybersecurity industry has seen an investment of over $45 billion in the past 15
This unique new volume analyses source documents both previously known and recently
Learn how to attack and defend the world’s most popular web server platform
With today's flood of data circulating on storage media and the Internet, compression of
Cloud storage is an important service of cloud computing, which offers service for data
As a privacy-preserving and illumination-robust manner, WiFi signal-based user
Up-to-the-minute observations from a world-famous security
Learn to identify the social engineer by non-verbal behavior
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize
The first comprehensive guide to discovering and preventing attacks on the
A must-have, hands-on guide for working in the cybersecurity
Gain a practical prescription for both private and public
In a world where cybersecurity threats evolve daily, it’s time to leave traditional,
Discover the process of e-discovery and put good practices in place.
Uncover hidden patterns of data and respond with
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of
An example-driven approach to securing Oracle APEX