As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect
168 84 3MB
English Pages 272 Year 2013
Report DMCA / Copyright
DOWNLOAD FILE
Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile thr
279 31 5MB Read more
This book presents a comprehensive reference source for dynamic and innovative research in the field of cyber security,
122 17 13MB Read more
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security,
763 98 14MB Read more
This book studies the design optimization, state estimation, and advanced control methods for cyber-physical vehicle sys
1,101 130 18MB Read more
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn t
572 95 27MB Read more
980 93 5MB Read more
Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contribut
533 82 4MB Read more
3,687 403 436KB Read more
1,219 268 820KB Read more
970 181 22MB Read more