Cyber warfare : techniques, tactics and tools for security practitioners /
Na minha lista:
Main Authors: | Andress, Jason, Winterfeld, Steve |
---|---|
Idioma: | Inglês |
Publicado em: |
Amsterdam Syngress/Elsevier
2014
|
Assuntos: | |
Acesso em linha: | https://catalogo.acervo.nic.br/cgi-bin/koha/opac-detail.pl?biblionumber=279 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Hands-on machine learning with Scikit-Learn, Keras and TensorFlow : concepts, tools, and techniques to build intelligent systems /
Por: Géron, Aurélien,
Publicado em: (2023)
Por: Géron, Aurélien,
Publicado em: (2023)
Cyber war : the next threat to national security and what to do about it /
Por: Clarke, Richard A. 1951- (Richard Alan), et al.
Publicado em: (2010)
Por: Clarke, Richard A. 1951- (Richard Alan), et al.
Publicado em: (2010)
IPv6 Security: protection measures for the next Internet Protocol/
Por: Hogg, Scott CCIE No. 5133 CCIE No. 5133, et al.
Publicado em: (2008)
Por: Hogg, Scott CCIE No. 5133 CCIE No. 5133, et al.
Publicado em: (2008)
Tallinn manual 2.0 on the international law applicable to cyber operations
Por: Schmitt, Michael N.,, et al.
Publicado em: (2017)
Por: Schmitt, Michael N.,, et al.
Publicado em: (2017)
Information security assurance for executives : an international business companion to the 2002 OECD Guidelines for the security of networks and information systems : towards a culture of security
Por: International Chamber of Commerce
Publicado em: (2003)
Por: International Chamber of Commerce
Publicado em: (2003)
Information security in Brazil
Por: Hoepers, Cristine, et al.
Publicado em: (2024)
Por: Hoepers, Cristine, et al.
Publicado em: (2024)
Information security in Brazil
Por: Hoepers, Cristine, et al.
Por: Hoepers, Cristine, et al.
The hacker and the state : cyber attacks and the new normal of geopolitics
Por: Buchanan, Ben (Writer on cybersecurity),
Publicado em: (2020)
Por: Buchanan, Ben (Writer on cybersecurity),
Publicado em: (2020)
Building bridges in cyber diplomacy: How Brazil shaped global cyber norms
Por: Paulus, Alexandra
Publicado em: (2024)
Por: Paulus, Alexandra
Publicado em: (2024)
The hundredth window : protecting your privacy and security in the age of the Internet
Por: Jennings, Charles, 1948-, et al.
Publicado em: (2000)
Por: Jennings, Charles, 1948-, et al.
Publicado em: (2000)
Securing your business: an companion for small or entrepeneurial companies to the 2002 OECD guidelines for security of networks and information systems : towards a culture of security
Por: International Chamber of Commerce, et al.
Publicado em: (2004)
Por: International Chamber of Commerce, et al.
Publicado em: (2004)
The tools of government in the digital age /
Por: Hood, Christopher 1947-, et al.
Publicado em: (2007)
Por: Hood, Christopher 1947-, et al.
Publicado em: (2007)
Cyber risk management for small and medium enterprises
Por: Leverett, Éireann
Publicado em: (2020)
Por: Leverett, Éireann
Publicado em: (2020)
Cyber sovereignty : the future of governance in cyberspace /
Por: Kadlecová, Lucie,
Publicado em: (2024)
Por: Kadlecová, Lucie,
Publicado em: (2024)
19 deadly sins of software security : programming flaws and how to fix them
Por: Howard, Michael, 1965-, et al.
Publicado em: (2005)
Por: Howard, Michael, 1965-, et al.
Publicado em: (2005)
Information security: practice and regulation in health
Por: Kiatake, Luis Gustavo Gasparini, et al.
Por: Kiatake, Luis Gustavo Gasparini, et al.
Information security: Practice and regulation in health
Por: Santoro, Ricardo da Silva, et al.
Publicado em: (2024)
Por: Santoro, Ricardo da Silva, et al.
Publicado em: (2024)
CyberBRICS: cybersecurity regulations in the BRICS countries
Por: Editor Belli, Luca
Publicado em: (2021)
Por: Editor Belli, Luca
Publicado em: (2021)
Digital security: An analysis of risk management in Brazilian enterprises
Publicado em: (2020)
Publicado em: (2020)
The policy design primer : choosing the right tools for the job /
Por: Howlett, Michael, 1955-
Publicado em: (2019)
Por: Howlett, Michael, 1955-
Publicado em: (2019)
Cyber republic : reinventing democracy in the age of intelligent machines
Por: Zarkadakēs, Giōrgos, 1964- author.
Publicado em: (2020)
Por: Zarkadakēs, Giōrgos, 1964- author.
Publicado em: (2020)
Cyberpower and national security /
Por: Kramer, Franklin D., et al.
Publicado em: (2009)
Por: Kramer, Franklin D., et al.
Publicado em: (2009)
Race after technology : abolitionist tools for the new Jim code
Por: Benjamin, Ruha author.
Publicado em: (2019)
Por: Benjamin, Ruha author.
Publicado em: (2019)
Automating inequality : how high-tech tools profile, police, and punish the poor /
Por: Eubanks, Virginia 1972- author.
Publicado em: (2017)
Por: Eubanks, Virginia 1972- author.
Publicado em: (2017)
The skilled facilitator fieldbook: tips, tools, and tested methods for consultants, facilitators, managers, trainers, and coaches/
Por: Schwarz, Robert M., et al.
Publicado em: (2005)
Por: Schwarz, Robert M., et al.
Publicado em: (2005)
Innovation and technology in education: the EDUTEC Guide – a diagnostic and planning tool for educational technology policies
Por: Dellagnelo, Lúcia Gomes Vieira
Por: Dellagnelo, Lúcia Gomes Vieira
Keep the internet free, open and secure
Por: The Berlin Conference on the internet and human rights Berlin, Germany 13-14 sep., et al.
Publicado em: (2012)
Por: The Berlin Conference on the internet and human rights Berlin, Germany 13-14 sep., et al.
Publicado em: (2012)
Towards a global framework for cyber peace and digital cooperation : an agenda for the 2020s
Por: Internet Governance Forum Berlin. Germany 25-29 nov, et al.
Publicado em: (2020)
Por: Internet Governance Forum Berlin. Germany 25-29 nov, et al.
Publicado em: (2020)
Digital security and risk management: An analysis of Brazilian enterprises
Por: Cantoni, Stefania Lapolla, et al.
Publicado em: (2020)
Por: Cantoni, Stefania Lapolla, et al.
Publicado em: (2020)
Using ICT as an innovation tool: the case of a global service enterprise operating in Brazil
Por: Pinheiro, Alessandro Maia, et al.
Por: Pinheiro, Alessandro Maia, et al.
The importance of metrics to ensure security and to fight spam
Por: Hoepers, Cristine, et al.
Por: Hoepers, Cristine, et al.
Innovation and technology in education: The EduTec Guide – A diagnostic and planning tool for educational technology policies
Por: Dellagnelo, Lúcia Gomes Vieira
Publicado em: (2024)
Por: Dellagnelo, Lúcia Gomes Vieira
Publicado em: (2024)
Using ICT as an innovation tool: The case of a global service enterprise operating in Brazil
Por: Pinheiro, Alessandro Maia, et al.
Publicado em: (2024)
Por: Pinheiro, Alessandro Maia, et al.
Publicado em: (2024)
The importance of metrics to ensure security and to fight spam
Por: Hoepers, Cristine, et al.
Publicado em: (2024)
Por: Hoepers, Cristine, et al.
Publicado em: (2024)
Computer networks/
Por: Tanenbaum, Andrew S. 1944, et al.
Publicado em: (2011)
Por: Tanenbaum, Andrew S. 1944, et al.
Publicado em: (2011)
Rede de computadores
Por: Tanenbaum, Andrew S., et al.
Publicado em: (2011)
Por: Tanenbaum, Andrew S., et al.
Publicado em: (2011)
Rede de computadores
Por: Tanenbaum, Andrew S., et al.
Publicado em: (1997)
Por: Tanenbaum, Andrew S., et al.
Publicado em: (1997)
Manual do Hacker: aprenda a proteger aplicações web conhecendo as técnicas de Pentest utilizadas pelos hackers.
Por: Pruteanu, Adrian, et al.
Publicado em: (2019)
Por: Pruteanu, Adrian, et al.
Publicado em: (2019)
Nothing to hide: the false tradeoff between privacy and security
Por: - Solove, Daniel J.,
Publicado em: (2011)
Por: - Solove, Daniel J.,
Publicado em: (2011)
Enabling efficient and operational mobility in large heterogeneous IP networks
Por: Equipe IPV6.br
Publicado em: (2008)
Por: Equipe IPV6.br
Publicado em: (2008)
Registos relacionados
-
Hands-on machine learning with Scikit-Learn, Keras and TensorFlow : concepts, tools, and techniques to build intelligent systems /
Por: Géron, Aurélien,
Publicado em: (2023) -
Cyber war : the next threat to national security and what to do about it /
Por: Clarke, Richard A. 1951- (Richard Alan), et al.
Publicado em: (2010) -
IPv6 Security: protection measures for the next Internet Protocol/
Por: Hogg, Scott CCIE No. 5133 CCIE No. 5133, et al.
Publicado em: (2008) -
Tallinn manual 2.0 on the international law applicable to cyber operations
Por: Schmitt, Michael N.,, et al.
Publicado em: (2017) -
Information security assurance for executives : an international business companion to the 2002 OECD Guidelines for the security of networks and information systems : towards a culture of security
Por: International Chamber of Commerce
Publicado em: (2003)