Cyber warfare : techniques, tactics and tools for security practitioners /
Сохранить в:
Главные авторы: | Andress, Jason, Winterfeld, Steve |
---|---|
Язык: | английский |
Опубликовано: |
Amsterdam Syngress/Elsevier
2014
|
Предметы: | |
Online-ссылка: | https://catalogo.acervo.nic.br/cgi-bin/koha/opac-detail.pl?biblionumber=279 |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
Hands-on machine learning with Scikit-Learn, Keras and TensorFlow : concepts, tools, and techniques to build intelligent systems /
по: Géron, Aurélien,
Опубликовано: (2023)
по: Géron, Aurélien,
Опубликовано: (2023)
Cyber war : the next threat to national security and what to do about it /
по: Clarke, Richard A. 1951- (Richard Alan), и др.
Опубликовано: (2010)
по: Clarke, Richard A. 1951- (Richard Alan), и др.
Опубликовано: (2010)
IPv6 Security: protection measures for the next Internet Protocol/
по: Hogg, Scott CCIE No. 5133 CCIE No. 5133, и др.
Опубликовано: (2008)
по: Hogg, Scott CCIE No. 5133 CCIE No. 5133, и др.
Опубликовано: (2008)
Tallinn manual 2.0 on the international law applicable to cyber operations
по: Schmitt, Michael N.,, и др.
Опубликовано: (2017)
по: Schmitt, Michael N.,, и др.
Опубликовано: (2017)
Information security assurance for executives : an international business companion to the 2002 OECD Guidelines for the security of networks and information systems : towards a culture of security
по: International Chamber of Commerce
Опубликовано: (2003)
по: International Chamber of Commerce
Опубликовано: (2003)
Information security in Brazil
по: Hoepers, Cristine, и др.
Опубликовано: (2024)
по: Hoepers, Cristine, и др.
Опубликовано: (2024)
Information security in Brazil
по: Hoepers, Cristine, и др.
по: Hoepers, Cristine, и др.
The hacker and the state : cyber attacks and the new normal of geopolitics
по: Buchanan, Ben (Writer on cybersecurity),
Опубликовано: (2020)
по: Buchanan, Ben (Writer on cybersecurity),
Опубликовано: (2020)
Building bridges in cyber diplomacy: How Brazil shaped global cyber norms
по: Paulus, Alexandra
Опубликовано: (2024)
по: Paulus, Alexandra
Опубликовано: (2024)
The hundredth window : protecting your privacy and security in the age of the Internet
по: Jennings, Charles, 1948-, и др.
Опубликовано: (2000)
по: Jennings, Charles, 1948-, и др.
Опубликовано: (2000)
Securing your business: an companion for small or entrepeneurial companies to the 2002 OECD guidelines for security of networks and information systems : towards a culture of security
по: International Chamber of Commerce, и др.
Опубликовано: (2004)
по: International Chamber of Commerce, и др.
Опубликовано: (2004)
The tools of government in the digital age /
по: Hood, Christopher 1947-, и др.
Опубликовано: (2007)
по: Hood, Christopher 1947-, и др.
Опубликовано: (2007)
Cyber risk management for small and medium enterprises
по: Leverett, Éireann
Опубликовано: (2020)
по: Leverett, Éireann
Опубликовано: (2020)
Cyber sovereignty : the future of governance in cyberspace /
по: Kadlecová, Lucie,
Опубликовано: (2024)
по: Kadlecová, Lucie,
Опубликовано: (2024)
19 deadly sins of software security : programming flaws and how to fix them
по: Howard, Michael, 1965-, и др.
Опубликовано: (2005)
по: Howard, Michael, 1965-, и др.
Опубликовано: (2005)
Information security: practice and regulation in health
по: Kiatake, Luis Gustavo Gasparini, и др.
по: Kiatake, Luis Gustavo Gasparini, и др.
Information security: Practice and regulation in health
по: Santoro, Ricardo da Silva, и др.
Опубликовано: (2024)
по: Santoro, Ricardo da Silva, и др.
Опубликовано: (2024)
CyberBRICS: cybersecurity regulations in the BRICS countries
по: Editor Belli, Luca
Опубликовано: (2021)
по: Editor Belli, Luca
Опубликовано: (2021)
Digital security: An analysis of risk management in Brazilian enterprises
Опубликовано: (2020)
Опубликовано: (2020)
The policy design primer : choosing the right tools for the job /
по: Howlett, Michael, 1955-
Опубликовано: (2019)
по: Howlett, Michael, 1955-
Опубликовано: (2019)
Cyber republic : reinventing democracy in the age of intelligent machines
по: Zarkadakēs, Giōrgos, 1964- author.
Опубликовано: (2020)
по: Zarkadakēs, Giōrgos, 1964- author.
Опубликовано: (2020)
Cyberpower and national security /
по: Kramer, Franklin D., и др.
Опубликовано: (2009)
по: Kramer, Franklin D., и др.
Опубликовано: (2009)
Race after technology : abolitionist tools for the new Jim code
по: Benjamin, Ruha author.
Опубликовано: (2019)
по: Benjamin, Ruha author.
Опубликовано: (2019)
Automating inequality : how high-tech tools profile, police, and punish the poor /
по: Eubanks, Virginia 1972- author.
Опубликовано: (2017)
по: Eubanks, Virginia 1972- author.
Опубликовано: (2017)
The skilled facilitator fieldbook: tips, tools, and tested methods for consultants, facilitators, managers, trainers, and coaches/
по: Schwarz, Robert M., и др.
Опубликовано: (2005)
по: Schwarz, Robert M., и др.
Опубликовано: (2005)
Innovation and technology in education: the EDUTEC Guide – a diagnostic and planning tool for educational technology policies
по: Dellagnelo, Lúcia Gomes Vieira
по: Dellagnelo, Lúcia Gomes Vieira
Keep the internet free, open and secure
по: The Berlin Conference on the internet and human rights Berlin, Germany 13-14 sep., и др.
Опубликовано: (2012)
по: The Berlin Conference on the internet and human rights Berlin, Germany 13-14 sep., и др.
Опубликовано: (2012)
Towards a global framework for cyber peace and digital cooperation : an agenda for the 2020s
по: Internet Governance Forum Berlin. Germany 25-29 nov, и др.
Опубликовано: (2020)
по: Internet Governance Forum Berlin. Germany 25-29 nov, и др.
Опубликовано: (2020)
Digital security and risk management: An analysis of Brazilian enterprises
по: Cantoni, Stefania Lapolla, и др.
Опубликовано: (2020)
по: Cantoni, Stefania Lapolla, и др.
Опубликовано: (2020)
Using ICT as an innovation tool: the case of a global service enterprise operating in Brazil
по: Pinheiro, Alessandro Maia, и др.
по: Pinheiro, Alessandro Maia, и др.
The importance of metrics to ensure security and to fight spam
по: Hoepers, Cristine, и др.
по: Hoepers, Cristine, и др.
Innovation and technology in education: The EduTec Guide – A diagnostic and planning tool for educational technology policies
по: Dellagnelo, Lúcia Gomes Vieira
Опубликовано: (2024)
по: Dellagnelo, Lúcia Gomes Vieira
Опубликовано: (2024)
Using ICT as an innovation tool: The case of a global service enterprise operating in Brazil
по: Pinheiro, Alessandro Maia, и др.
Опубликовано: (2024)
по: Pinheiro, Alessandro Maia, и др.
Опубликовано: (2024)
The importance of metrics to ensure security and to fight spam
по: Hoepers, Cristine, и др.
Опубликовано: (2024)
по: Hoepers, Cristine, и др.
Опубликовано: (2024)
Computer networks/
по: Tanenbaum, Andrew S. 1944, и др.
Опубликовано: (2011)
по: Tanenbaum, Andrew S. 1944, и др.
Опубликовано: (2011)
Rede de computadores
по: Tanenbaum, Andrew S., и др.
Опубликовано: (2011)
по: Tanenbaum, Andrew S., и др.
Опубликовано: (2011)
Rede de computadores
по: Tanenbaum, Andrew S., и др.
Опубликовано: (1997)
по: Tanenbaum, Andrew S., и др.
Опубликовано: (1997)
Manual do Hacker: aprenda a proteger aplicações web conhecendo as técnicas de Pentest utilizadas pelos hackers.
по: Pruteanu, Adrian, и др.
Опубликовано: (2019)
по: Pruteanu, Adrian, и др.
Опубликовано: (2019)
Nothing to hide: the false tradeoff between privacy and security
по: - Solove, Daniel J.,
Опубликовано: (2011)
по: - Solove, Daniel J.,
Опубликовано: (2011)
Enabling efficient and operational mobility in large heterogeneous IP networks
по: Equipe IPV6.br
Опубликовано: (2008)
по: Equipe IPV6.br
Опубликовано: (2008)
Схожие документы
-
Hands-on machine learning with Scikit-Learn, Keras and TensorFlow : concepts, tools, and techniques to build intelligent systems /
по: Géron, Aurélien,
Опубликовано: (2023) -
Cyber war : the next threat to national security and what to do about it /
по: Clarke, Richard A. 1951- (Richard Alan), и др.
Опубликовано: (2010) -
IPv6 Security: protection measures for the next Internet Protocol/
по: Hogg, Scott CCIE No. 5133 CCIE No. 5133, и др.
Опубликовано: (2008) -
Tallinn manual 2.0 on the international law applicable to cyber operations
по: Schmitt, Michael N.,, и др.
Опубликовано: (2017) -
Information security assurance for executives : an international business companion to the 2002 OECD Guidelines for the security of networks and information systems : towards a culture of security
по: International Chamber of Commerce
Опубликовано: (2003)