Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Resultados para: security

Refinar por
2250 produtos
  • e-book

    Certificação Security+

    Diógenes,Yuri
    (9281980)

    A Editora Novaterra traz o título de tecnologia, em sua terceira edição, para atender aos estudantes da Certificação Security + e o seu novo exame, o SY0-401. Com uma visão bastante detalhada e prática desses conceitos, o livro abrange os seis...

  • Kaspersky Internet Security Multidispositivos...

    (9378635)

    Como você gasta boa parte da sua vida on-line, realizando compras e operações no Internet Banking e socializando, nossa segurança premiada faz o máximo para ajudá-lo a proteger o que mais importa... no seu PC, Mac e Android.Protege seus dispositivos...

  • Kaspersky Internet Security Multidispositivos...

    (9378636)

    Como você gasta boa parte da sua vida on-line, realizando compras e operações no Internet Banking e socializando, nossa segurança premiada faz o máximo para ajudá-lo a proteger o que mais importa... no seu PC, Mac e Android.Protege seus dispositivos...

  • e-book

    OAuth 2.0: Proteja suas aplicações com o...

    Adolfo Eloy
    (9880439)

    Quando se trata de proteger os recursos de uma aplicação, é comum utilizar OAuth. Ainda assim, percebe-se que ainda existe bastante confusão a respeito dele, havendo até cenários de brechas em sistemas grandes devido ao mau uso da tecnologia. OAuth...

  • e-book

    Security for Cloud Computing

    Roberto Di Pietro; Flavio Lombardi
    (9498113)

    This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The...

  • e-book

    Security+ Certification Exam Cram 2 (Exam...

    Barrett,Diane; Weiss,Martin; Hausman,Kirk
    (8102357)

    A new edition of this title is available, ISBN-10: 078973804X ISBN-13: 9780789738042   The Security+ certification is CompTIA's answer to the market's need for a baseline, vendor-neutral security certification. The IT industry recognizes there is a...

  • e-book

    CompTIA Security+ Study Guide - Exam SY0-501

    Easttom, Chuck
    (9887953)

    Expert preparation covering 100% of Security+ exam SY0-501 objectives CompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with...

  • Norton Security Essencial - 1 Dispositivo 12...

    (9337932)

    O Norton Security Essencial protege PCs e Macs contra vírus e outras ameaças online, ajudando a manter a segurança de sua identidade, suas informações pessoais e seus dados financeiros. Temos mais de duas décadas de experiência na luta contra o crime...

  • e-book

    CompTIA Security+ Review Guide - Exam SY0-501

    James M. Stewart
    (9943262)

    Consolidate your knowledge base with critical Security+ review CompTIA Security+ Review Guide, Fourth Edition, is the smart candidate's secret weapon for passing Exam SY0-501 with flying colors. You've worked through your study guide, but are you...

  • e-book

    Information Security Architecture

    (2902826)

    Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies...

  • e-book

    Security on the Web

    (3462173)

    Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their...

  • e-book

    CompTIA Security+ Review Guide - Exam SY0-401

    James M. Stewart
    (9858109)

    Focused review for the CompTIA Security+ certification exam The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam...

  • e-book

    Security Information and Event Management...

    Harper,Allen; Harris,Shon; Miller,David
    (3165667)

    Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation...

  • e-book

    Security Metrics, A Beginner'apos;s Guide

    (8332699)

    Security Smarts for the Self-Guided IT Professional'quot;An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it. A must-have for any quality security...

  • e-book

    Security without Obscurity - A Guide to PKI...

    Jeff Stapleton; W. Clay Epstein
    (9502008)

    Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and...

  • e-book

    Security in Computing

    Pfleeger,Shari Lawrence; Pfleeger,Charles P.; Jonathan Margulies
    (9745952)

    The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer...

  • e-book

    Security Operations Center - Building,...

    Joseph Muniz; Nadhem AlFardan; Gary McIntyre
    (9462915)

    Security Operations Center Building, Operating, and Maintaining Your SOC   The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to...

  • e-book

    Security Intelligence - A Practitioner's...

    Clark,Gregory; Li,Qing
    (9306407)

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables,...

  • e-book

    Security without Obscurity - A Guide to PKI...

    Jeff Stapleton; W. Clay Epstein
    (9517158)

    Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and...

  • e-book

    Security in Computing

    Pfleeger,Shari Lawrence; Pfleeger,Charles P.; Jonathan Margulies
    (9632650)

    The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer...

  • e-book

    Security Testing Handbook for Banking...

    Nilesh Kapoor; Sangita Pakala; Arvind Doraiswamy
    (2996635)

    The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field.

  • e-book

    Security Operations Center - Building,...

    Joseph Muniz; Nadhem AlFardan; Gary McIntyre
    (9667971)

    Security Operations Center Building, Operating, and Maintaining Your SOC   The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to...

  • e-book

    Security Controls Evaluation, Testing, and...

    (9614453)

    Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today'apos;s IT systems. This handbook shows you...

  • e-book

    Security Metrics - Replacing Fear,...

    Jaquith,Andrew
    (3528805)

    The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations   Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.   ...

  • e-book

    Security Monitoring with Cisco Security MARS

    Halleen,Gary; Kellogg, Greg
    (3526938)

    This is the eBook version of the printed book.Security Monitoring with Cisco Security MARS Threat mitigation system deployment Gary Halleen Greg Kellogg Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover...

  • e-book

    Security Automation Essentials: Streamlined...

    Kerr,Matt; Cook,Melanie; Witte,Greg
    (8332697)

    Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined...

  • e-book

    Security of Mobile Communications

    Boudriga,Noureddine
    (9458628)

    The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels-from subscriber to...

  • e-book

    Security - The Human Factor

    Paul Kearney
    (9778468)

    Based on the approach used by BT to protect its own data, this guide looks at the challenges associated with information security, the consequences of failing to meet them and - most importantly - at the steps organisations can take to make...

  • e-book

    Security Management of Next Generation...

    Stuart Jacobs
    (9306414)

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive...

  • e-book

    Security and Privacy in Internet of Things...

    Hu, Fei
    (9554456)

    The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations...

  • e-book

    Security Intelligence - A Practitioner's...

    Li,Qing
    (9447524)

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables,...

  • e-book

    Security Program and Policies - Principles...

    Greene,Sari
    (7398449)

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges,...

  • e-book

    Security Concepts, Services, and Threats

    Dowland,Paul S.; Furnell,Steven M.
    (2989759)

    Chaper 2 from Securing Information and Communication Systems, Steven Furnell, Sokratis Katsikas, Javier Lopez, Ahmed Patel, editors

  • e-book

    Security in Computing, Fourth Edition, Adobe...

    Pfleeger,Shari Lawrence; Pfleeger,Charles P.,
    (2892883)

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the...

  • e-book

    Security Sage's Guide to Hardening the...

    Andres,Steven; Kenyon,Brian; Pack Birkholz,Erik
    (3025128)

    This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises....

  • e-book

    Security Testing Handbook for Banking...

    Nilesh Kapoor; Sangita Pakala; Arvind Doraiswamy
    (9779642)

    The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field.

  • e-book

    Security Technology Convergence Insights

    Bernard,Ray
    (9644826)

    Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control...

  • e-book

    Security Metrics - Replacing Fear,...

    (2909996)

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. <>The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations   ...

  • e-book

    Security Engineering - A Guide to Building...

    Anderson,Ross J.
    (9306402)

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize,...

  • e-book

    Security Program and Policies - Principles...

    Greene,Sari
    (9745152)

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges,...

  • e-book

    Security and Privacy For Microsoft Office...

    Tulloch,Mitch
    (9837990)

    This title is also available as a free eBook. Take control—and put the built-in security and privacy features in Microsoft Office to work! Whether downloading documents, publishing a presentation, or collaborating online—this guide offers concise,...

    Grátis
  • e-book

    Security Management of Next Generation...

    Stuart Jacobs
    (9445323)

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive...

  • e-book

    Security Monitoring with Cisco Security MARS,...

    Halleen,Gary; Kellogg, Greg
    (3039217)

    Security Monitoring with Cisco Security MARS   Threat mitigation system deployment   Gary Halleen Greg Kellogg   Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater...

  • e-book

    Security in Distributed, Grid, Mobile, and...

    Xiao,Yang
    (9530482)

    Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in...

Busca por