Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Resultados para: security

Refinar por
2302 produtos
  • Kaspersky Internet Security Multidispositivos...

    (9378635)

    Como você gasta boa parte da sua vida on-line, realizando compras e operações no Internet Banking e socializando, nossa segurança premiada faz o máximo para ajudá-lo a proteger o que mais importa... no seu PC, Mac e Android.Protege seus dispositivos...

  • e-book

    Certificação Security+

    Diógenes,Yuri
    (9281980)

    A Editora Novaterra traz o título de tecnologia, em sua terceira edição, para atender aos estudantes da Certificação Security + e o seu novo exame, o SY0-401. Com uma visão bastante detalhada e prática desses conceitos, o livro abrange os seis...

  • Certificação Security + - da Prática Para o...

    Diógenes,Yuri; Mauser, Daniel
    (8892234)

    A Editora Novaterra traz o título de tecnologia, em sua terceira edição, para atender aos estudantes da Certificação Security + e o seu novo exame, o SY0-401. Com uma visão bastante detalhada e prática desses conceitos, o livro abrange os seis...

  • Kaspersky Internet Security Multidispositivos...

    (9378636)

    Como você gasta boa parte da sua vida on-line, realizando compras e operações no Internet Banking e socializando, nossa segurança premiada faz o máximo para ajudá-lo a proteger o que mais importa... no seu PC, Mac e Android.Protege seus dispositivos...

  • Certificação Security - da Prática Para o...

    Diogenes,Yuri; Mauser, Daniel
    (4842455)

    'Certificação Security+ - Da Prática Para o Exame SY0-301' tem como objetivo preparar o leitor para o exame de certificação, cobrindo os conceitos requisitados e trazendo uma visão que busca ser prática da implementação destes conceitos em um...

  • Security Practitioner And Cryptography...

    Schneier, Bruce; Gregg,Michael
    (9239375)

    CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 by Michael Greggis the updated edition of the bestselling book covering the CASP certification exam. CompTIA approved, this guide covers all of the CASP exam objectives with clear,...

    sob encomenda
  • e-book

    CompTIA Security+ Review Guide - Exam SY0-401

    James M. Stewart
    (9858109)

    Focused review for the CompTIA Security+ certification exam The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam...

  • Norton Security Essencial - 1 Dispositivo 12...

    (9337932)

    O Norton Security Essencial protege PCs e Macs contra vírus e outras ameaças online, ajudando a manter a segurança de sua identidade, suas informações pessoais e seus dados financeiros. Temos mais de duas décadas de experiência na luta contra o crime...

  • e-book

    OAuth 2.0: Proteja suas aplicações com o...

    Adolfo Eloy
    (9880439)

    Quando se trata de proteger os recursos de uma aplicação, é comum utilizar OAuth. Ainda assim, percebe-se que ainda existe bastante confusão a respeito dele, havendo até cenários de brechas em sistemas grandes devido ao mau uso da tecnologia. OAuth...

  • e-book

    Security for Cloud Computing

    Roberto Di Pietro; Flavio Lombardi
    (9498113)

    This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The...

  • e-book

    Security Operations Center - Building,...

    Joseph Muniz; Nadhem AlFardan; Gary McIntyre
    (9667971)

    Security Operations Center Building, Operating, and Maintaining Your SOC   The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to...

  • e-book

    Security Metrics - Replacing Fear,...

    (2909996)

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. <>The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations   ...

  • e-book

    Security and Privacy For Microsoft Office...

    Tulloch,Mitch
    (9837990)

    This title is also available as a free eBook. Take control—and put the built-in security and privacy features in Microsoft Office to work! Whether downloading documents, publishing a presentation, or collaborating online—this guide offers concise,...

    Grátis
  • e-book

    Security and Privacy in Internet of Things...

    Hu, Fei
    (9554456)

    The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations...

  • e-book

    Security Architect - Careers in information...

    Collins, Jon
    (9572892)

    Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security...

  • e-book

    CompTIA Security+ Study Guide - Exam SY0-501

    Dulaney, Emmett; Easttom, Chuck
    (9887953)

    Expert preparation covering 100% of Security+ exam SY0-501 objectives CompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with...

  • e-book

    Security Sage's Guide to Hardening the...

    Andres,Steven; Kenyon,Brian; Pack Birkholz,Erik
    (3025128)

    This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises....

  • e-book

    Security Engineering - A Guide to Building...

    Anderson,Ross J.
    (9306402)

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize,...

  • e-book

    Security without Obscurity - A Guide to PKI...

    Jeff Stapleton; W. Clay Epstein
    (9517158)

    Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and...

  • e-book

    Security Monitoring with Cisco Security MARS

    Halleen,Gary; Kellogg, Greg
    (3526938)

    This is the eBook version of the printed book.Security Monitoring with Cisco Security MARS Threat mitigation system deployment Gary Halleen Greg Kellogg Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover...

  • e-book

    Security Operations Center - Building,...

    Joseph Muniz; Nadhem AlFardan; Gary McIntyre
    (9462915)

    Security Operations Center Building, Operating, and Maintaining Your SOC   The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to...

  • e-book

    Security Technologies for the World Wide Web,...

    Oppliger
    (2986497)

    This newly revised edition of the Artech House bestseller brings you the most, up-to-date, comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures,...

  • e-book

    Security Planning and Disaster Recovery

    Maiwald, Eric; Sieglein,William
    (3023923)

    Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any...

  • e-book

    Security of Mobile Communications

    Boudriga,Noureddine
    (9458628)

    The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels-from subscriber to...

  • e-book

    Security and Auditing of Smart Devices

    Philip Chukwuma
    (9482005)

    Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have...

  • e-book

    Security Testing Handbook for Banking...

    Nilesh Kapoor; Sangita Pakala; Arvind Doraiswamy
    (2996635)

    The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field.

  • e-book

    Security Information and Event Management...

    Harper,Allen; Harris,Shon; Miller,David
    (3165667)

    Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation...

  • e-book

    Security in Computing

    Pfleeger,Shari Lawrence; Pfleeger,Charles P.; Jonathan Margulies
    (9632650)

    The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer...

  • e-book

    Security Management of Next Generation...

    Stuart Jacobs
    (9445323)

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive...

  • e-book

    Security without Obscurity - A Guide to PKI...

    Jeff Stapleton; W. Clay Epstein
    (9502008)

    Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and...

  • e-book

    Security Metrics - Replacing Fear,...

    Jaquith,Andrew
    (3528805)

    The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations   Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.   ...

  • e-book

    Security on the Web

    (3462173)

    Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their...

  • e-book

    Security for Business Professionals

    (9681817)

    Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don'apos;t have the resources to hire an in-house security staff. It can also be used for...

  • e-book

    Security Automation Essentials: Streamlined...

    Kerr,Matt; Cook,Melanie; Witte,Greg
    (8332697)

    Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined...

  • e-book

    Security Intelligence - A Practitioner's...

    Clark,Gregory; Li,Qing
    (9306407)

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables,...

  • e-book

    Security Concepts, Services, and Threats

    Dowland,Paul S.; Furnell,Steven M.
    (2989759)

    Chaper 2 from Securing Information and Communication Systems, Steven Furnell, Sokratis Katsikas, Javier Lopez, Ahmed Patel, editors

  • e-book

    Security in Computing

    Pfleeger,Shari Lawrence; Pfleeger,Charles P.; Jonathan Margulies
    (9745952)

    The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer...

  • e-book

    Security Intelligence - A Practitioner's...

    Li, Qing
    (9447524)

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables,...

  • e-book

    Security Assessment: Case Studies for...

    Syngress
    (3025127)

    The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also...

  • e-book

    Security Program and Policies - Principles...

    Greene, Sari
    (7398449)

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges,...

  • e-book

    Security - The Human Factor

    Paul Kearney
    (9778468)

    Based on the approach used by BT to protect its own data, this guide looks at the challenges associated with information security, the consequences of failing to meet them and - most importantly - at the steps organisations can take to make...

  • e-book

    Security Controls Evaluation, Testing, and...

    (9614453)

    Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today'apos;s IT systems. This handbook shows you...

  • e-book

    Security in Distributed, Grid, Mobile, and...

    Xiao,Yang
    (9530482)

    Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in...

  • e-book

    Security in Computing, Fourth Edition, Adobe...

    Pfleeger,Shari Lawrence; Pfleeger,Charles P.,
    (2892883)

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the...

Busca por