As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect
163 83 3MB
English Pages 272 Year 2013
Report DMCA / Copyright
DOWNLOAD FILE
Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile thr
209 29 5MB Read more
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security,
760 96 14MB Read more
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn t
565 94 27MB Read more
This book studies the design optimization, state estimation, and advanced control methods for cyber-physical vehicle sys
1,085 130 18MB Read more
969 92 5MB Read more
Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contribut
521 82 4MB Read more
3,640 395 436KB Read more
1,206 266 820KB Read more
930 178 22MB Read more
Today cybersecurity is one of the prime concerns for any organization, whether governmental or private sector; and for t
782 35 5MB Read more