Cyber warfare : techniques, tactics and tools for security practitioners /
Sábháilte in:
Príomhchruthaitheoirí: | Andress, Jason, Winterfeld, Steve |
---|---|
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Amsterdam Syngress/Elsevier
2014
|
Ábhair: | |
Rochtain ar líne: | https://catalogo.acervo.nic.br/cgi-bin/koha/opac-detail.pl?biblionumber=279 |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Hands-on machine learning with Scikit-Learn, Keras and TensorFlow : concepts, tools, and techniques to build intelligent systems /
de réir: Géron, Aurélien,
Foilsithe / Cruthaithe: (2023)
de réir: Géron, Aurélien,
Foilsithe / Cruthaithe: (2023)
Cyber war : the next threat to national security and what to do about it /
de réir: Clarke, Richard A. 1951- (Richard Alan), et al.
Foilsithe / Cruthaithe: (2010)
de réir: Clarke, Richard A. 1951- (Richard Alan), et al.
Foilsithe / Cruthaithe: (2010)
IPv6 Security: protection measures for the next Internet Protocol/
de réir: Hogg, Scott CCIE No. 5133 CCIE No. 5133, et al.
Foilsithe / Cruthaithe: (2008)
de réir: Hogg, Scott CCIE No. 5133 CCIE No. 5133, et al.
Foilsithe / Cruthaithe: (2008)
Tallinn manual 2.0 on the international law applicable to cyber operations
de réir: Schmitt, Michael N.,, et al.
Foilsithe / Cruthaithe: (2017)
de réir: Schmitt, Michael N.,, et al.
Foilsithe / Cruthaithe: (2017)
Information security assurance for executives : an international business companion to the 2002 OECD Guidelines for the security of networks and information systems : towards a culture of security
de réir: International Chamber of Commerce
Foilsithe / Cruthaithe: (2003)
de réir: International Chamber of Commerce
Foilsithe / Cruthaithe: (2003)
Information security in Brazil
de réir: Hoepers, Cristine, et al.
Foilsithe / Cruthaithe: (2024)
de réir: Hoepers, Cristine, et al.
Foilsithe / Cruthaithe: (2024)
Information security in Brazil
de réir: Hoepers, Cristine, et al.
de réir: Hoepers, Cristine, et al.
The hacker and the state : cyber attacks and the new normal of geopolitics
de réir: Buchanan, Ben (Writer on cybersecurity),
Foilsithe / Cruthaithe: (2020)
de réir: Buchanan, Ben (Writer on cybersecurity),
Foilsithe / Cruthaithe: (2020)
Building bridges in cyber diplomacy: How Brazil shaped global cyber norms
de réir: Paulus, Alexandra
Foilsithe / Cruthaithe: (2024)
de réir: Paulus, Alexandra
Foilsithe / Cruthaithe: (2024)
The hundredth window : protecting your privacy and security in the age of the Internet
de réir: Jennings, Charles, 1948-, et al.
Foilsithe / Cruthaithe: (2000)
de réir: Jennings, Charles, 1948-, et al.
Foilsithe / Cruthaithe: (2000)
Securing your business: an companion for small or entrepeneurial companies to the 2002 OECD guidelines for security of networks and information systems : towards a culture of security
de réir: International Chamber of Commerce, et al.
Foilsithe / Cruthaithe: (2004)
de réir: International Chamber of Commerce, et al.
Foilsithe / Cruthaithe: (2004)
The tools of government in the digital age /
de réir: Hood, Christopher 1947-, et al.
Foilsithe / Cruthaithe: (2007)
de réir: Hood, Christopher 1947-, et al.
Foilsithe / Cruthaithe: (2007)
Cyber risk management for small and medium enterprises
de réir: Leverett, Éireann
Foilsithe / Cruthaithe: (2020)
de réir: Leverett, Éireann
Foilsithe / Cruthaithe: (2020)
Cyber sovereignty : the future of governance in cyberspace /
de réir: Kadlecová, Lucie,
Foilsithe / Cruthaithe: (2024)
de réir: Kadlecová, Lucie,
Foilsithe / Cruthaithe: (2024)
19 deadly sins of software security : programming flaws and how to fix them
de réir: Howard, Michael, 1965-, et al.
Foilsithe / Cruthaithe: (2005)
de réir: Howard, Michael, 1965-, et al.
Foilsithe / Cruthaithe: (2005)
Information security: practice and regulation in health
de réir: Kiatake, Luis Gustavo Gasparini, et al.
de réir: Kiatake, Luis Gustavo Gasparini, et al.
Information security: Practice and regulation in health
de réir: Santoro, Ricardo da Silva, et al.
Foilsithe / Cruthaithe: (2024)
de réir: Santoro, Ricardo da Silva, et al.
Foilsithe / Cruthaithe: (2024)
CyberBRICS: cybersecurity regulations in the BRICS countries
de réir: Editor Belli, Luca
Foilsithe / Cruthaithe: (2021)
de réir: Editor Belli, Luca
Foilsithe / Cruthaithe: (2021)
Digital security: An analysis of risk management in Brazilian enterprises
Foilsithe / Cruthaithe: (2020)
Foilsithe / Cruthaithe: (2020)
The policy design primer : choosing the right tools for the job /
de réir: Howlett, Michael, 1955-
Foilsithe / Cruthaithe: (2019)
de réir: Howlett, Michael, 1955-
Foilsithe / Cruthaithe: (2019)
Cyber republic : reinventing democracy in the age of intelligent machines
de réir: Zarkadakēs, Giōrgos, 1964- author.
Foilsithe / Cruthaithe: (2020)
de réir: Zarkadakēs, Giōrgos, 1964- author.
Foilsithe / Cruthaithe: (2020)
Cyberpower and national security /
de réir: Kramer, Franklin D., et al.
Foilsithe / Cruthaithe: (2009)
de réir: Kramer, Franklin D., et al.
Foilsithe / Cruthaithe: (2009)
Race after technology : abolitionist tools for the new Jim code
de réir: Benjamin, Ruha author.
Foilsithe / Cruthaithe: (2019)
de réir: Benjamin, Ruha author.
Foilsithe / Cruthaithe: (2019)
Automating inequality : how high-tech tools profile, police, and punish the poor /
de réir: Eubanks, Virginia 1972- author.
Foilsithe / Cruthaithe: (2017)
de réir: Eubanks, Virginia 1972- author.
Foilsithe / Cruthaithe: (2017)
The skilled facilitator fieldbook: tips, tools, and tested methods for consultants, facilitators, managers, trainers, and coaches/
de réir: Schwarz, Robert M., et al.
Foilsithe / Cruthaithe: (2005)
de réir: Schwarz, Robert M., et al.
Foilsithe / Cruthaithe: (2005)
Innovation and technology in education: the EDUTEC Guide – a diagnostic and planning tool for educational technology policies
de réir: Dellagnelo, Lúcia Gomes Vieira
de réir: Dellagnelo, Lúcia Gomes Vieira
Keep the internet free, open and secure
de réir: The Berlin Conference on the internet and human rights Berlin, Germany 13-14 sep., et al.
Foilsithe / Cruthaithe: (2012)
de réir: The Berlin Conference on the internet and human rights Berlin, Germany 13-14 sep., et al.
Foilsithe / Cruthaithe: (2012)
Towards a global framework for cyber peace and digital cooperation : an agenda for the 2020s
de réir: Internet Governance Forum Berlin. Germany 25-29 nov, et al.
Foilsithe / Cruthaithe: (2020)
de réir: Internet Governance Forum Berlin. Germany 25-29 nov, et al.
Foilsithe / Cruthaithe: (2020)
Digital security and risk management: An analysis of Brazilian enterprises
de réir: Cantoni, Stefania Lapolla, et al.
Foilsithe / Cruthaithe: (2020)
de réir: Cantoni, Stefania Lapolla, et al.
Foilsithe / Cruthaithe: (2020)
Using ICT as an innovation tool: the case of a global service enterprise operating in Brazil
de réir: Pinheiro, Alessandro Maia, et al.
de réir: Pinheiro, Alessandro Maia, et al.
The importance of metrics to ensure security and to fight spam
de réir: Hoepers, Cristine, et al.
de réir: Hoepers, Cristine, et al.
Innovation and technology in education: The EduTec Guide – A diagnostic and planning tool for educational technology policies
de réir: Dellagnelo, Lúcia Gomes Vieira
Foilsithe / Cruthaithe: (2024)
de réir: Dellagnelo, Lúcia Gomes Vieira
Foilsithe / Cruthaithe: (2024)
Using ICT as an innovation tool: The case of a global service enterprise operating in Brazil
de réir: Pinheiro, Alessandro Maia, et al.
Foilsithe / Cruthaithe: (2024)
de réir: Pinheiro, Alessandro Maia, et al.
Foilsithe / Cruthaithe: (2024)
The importance of metrics to ensure security and to fight spam
de réir: Hoepers, Cristine, et al.
Foilsithe / Cruthaithe: (2024)
de réir: Hoepers, Cristine, et al.
Foilsithe / Cruthaithe: (2024)
Computer networks/
de réir: Tanenbaum, Andrew S. 1944, et al.
Foilsithe / Cruthaithe: (2011)
de réir: Tanenbaum, Andrew S. 1944, et al.
Foilsithe / Cruthaithe: (2011)
Rede de computadores
de réir: Tanenbaum, Andrew S., et al.
Foilsithe / Cruthaithe: (2011)
de réir: Tanenbaum, Andrew S., et al.
Foilsithe / Cruthaithe: (2011)
Rede de computadores
de réir: Tanenbaum, Andrew S., et al.
Foilsithe / Cruthaithe: (1997)
de réir: Tanenbaum, Andrew S., et al.
Foilsithe / Cruthaithe: (1997)
Manual do Hacker: aprenda a proteger aplicações web conhecendo as técnicas de Pentest utilizadas pelos hackers.
de réir: Pruteanu, Adrian, et al.
Foilsithe / Cruthaithe: (2019)
de réir: Pruteanu, Adrian, et al.
Foilsithe / Cruthaithe: (2019)
Nothing to hide: the false tradeoff between privacy and security
de réir: - Solove, Daniel J.,
Foilsithe / Cruthaithe: (2011)
de réir: - Solove, Daniel J.,
Foilsithe / Cruthaithe: (2011)
Enabling efficient and operational mobility in large heterogeneous IP networks
de réir: Equipe IPV6.br
Foilsithe / Cruthaithe: (2008)
de réir: Equipe IPV6.br
Foilsithe / Cruthaithe: (2008)
Míreanna comhchosúla
-
Hands-on machine learning with Scikit-Learn, Keras and TensorFlow : concepts, tools, and techniques to build intelligent systems /
de réir: Géron, Aurélien,
Foilsithe / Cruthaithe: (2023) -
Cyber war : the next threat to national security and what to do about it /
de réir: Clarke, Richard A. 1951- (Richard Alan), et al.
Foilsithe / Cruthaithe: (2010) -
IPv6 Security: protection measures for the next Internet Protocol/
de réir: Hogg, Scott CCIE No. 5133 CCIE No. 5133, et al.
Foilsithe / Cruthaithe: (2008) -
Tallinn manual 2.0 on the international law applicable to cyber operations
de réir: Schmitt, Michael N.,, et al.
Foilsithe / Cruthaithe: (2017) -
Information security assurance for executives : an international business companion to the 2002 OECD Guidelines for the security of networks and information systems : towards a culture of security
de réir: International Chamber of Commerce
Foilsithe / Cruthaithe: (2003)