SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Essential Cybersecurity Science - Build, Test, and Evaluate Secure Systems

Essential Cybersecurity Science, 1. udgave
Søgbar e-bog

Essential Cybersecurity Science Vital Source e-bog

Josiah Dykstra
(2015)
O'Reilly Media, Inc
551,00 kr. 495,90 kr.
Leveres umiddelbart efter køb
Essential Cybersecurity Science, 1. udgave
Søgbar e-bog

Essential Cybersecurity Science Vital Source e-bog

Josiah Dykstra
(2015)
O'Reilly Media, Inc
486,00 kr. 437,40 kr.
Leveres umiddelbart efter køb
Essential Cybersecurity Science - Build, Test, and Evaluate Secure Systems

Essential Cybersecurity Science

Build, Test, and Evaluate Secure Systems
Josiah Dykstra
(2016)
Sprog: Engelsk
O'Reilly Media, Incorporated
453,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage
  • Klik for at bedømme:
  • 0.0/6 (0 bedømmelser)

Detaljer om varen

  • 1. Udgave
  • Vital Source searchable e-book (Fixed pages)
  • Udgiver: O'Reilly Media, Inc (December 2015)
  • ISBN: 9781491921074
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments. Learn the steps necessary to conduct scientific experiments in cybersecurity Explore fuzzing to test how your software handles various inputs Measure the performance of the Snort intrusion detection system Locate malicious “needles in a haystack” in your network and IT environment Evaluate cryptography design and application in IoT products Conduct an experiment to identify relationships between similar malware binaries Understand system-level security requirements for enterprise networks and web services
Licens varighed:
Bookshelf online: 365 dage fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 10 sider kan printes ad gangen
Copy: højest 10 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source searchable e-book (Reflowable pages)
  • Udgiver: O'Reilly Media, Inc (December 2015)
  • ISBN: 9781491921067
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments. Learn the steps necessary to conduct scientific experiments in cybersecurity Explore fuzzing to test how your software handles various inputs Measure the performance of the Snort intrusion detection system Locate malicious “needles in a haystack” in your network and IT environment Evaluate cryptography design and application in IoT products Conduct an experiment to identify relationships between similar malware binaries Understand system-level security requirements for enterprise networks and web services
Licens varighed:
Bookshelf online: 365 dage fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: -1 sider kan printes ad gangen
Copy: højest -1 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • Paperback: 190 sider
  • Udgiver: O'Reilly Media, Incorporated (Januar 2016)
  • ISBN: 9781491920947

If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.

Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments.

  • Learn the steps necessary to conduct scientific experiments in cybersecurity
  • Explore fuzzing to test how your software handles various inputs
  • Measure the performance of the Snort intrusion detection system
  • Locate malicious "needles in a haystack" in your network and IT environment
  • Evaluate cryptography design and application in IoT products
  • Conduct an experiment to identify relationships between similar malware binaries
  • Understand system-level security requirements for enterprise networks and web services
De oplyste priser er inkl. moms

Kunder der købte denne bog købte også en af disse:

miniaturebillede af omslaget til Applied Network Security Monitoring - Collection, Detection, and Analysis

Applied Network Security Monitoring

Collection, Detection, and Analysis
Chris Sanders og Jason Smith
Elsevier Science & Technology Books (2014)
399,00 kr.
Print on demand. Leveringstid vil være ca 2-3 uger.
miniaturebillede af omslaget til Dataetik - Den nye konkurrencefordel, 2. udgave

Dataetik

Den nye konkurrencefordel
Gry Hasselbalch
PubliShare (2016)
149,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 3 hverdage
miniaturebillede af omslaget til Linux Basics for Hackers - Getting Started with Networking, Scripting, and Security in Kali

Linux Basics for Hackers

Getting Started with Networking, Scripting, and Security in Kali
OccupyTheWeb
No Starch Press, Incorporated (2018)
345,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage
miniaturebillede af omslaget til Computer Security: Principles and Practice, Global Edition, 4. udgave

Computer Security: Principles and Practice, Global Edition

William Stallings og Lawrie Brown
Pearson Education, Limited (2018)
658,00 kr.
På lager, Bestil nu og få den leveret
om ca. 2 hverdage

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.