Related Books

Chained Exploits
Language: en
Pages: 474
Authors: Andrew Whitaker
Categories: Computers
Type: BOOK - Published: 2009-02-27 - Publisher: Pearson Education

DOWNLOAD EBOOK

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just
Inside the Security Mind
Language: en
Pages: 336
Authors: Kevin Day
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Prentice Hall Professional

DOWNLOAD EBOOK

A guide to managing the process of securing an enterprise network, covering all aspects from perimeter security to application security.
The Aerospace Supply Chain and Cyber Security
Language: en
Pages: 80
Authors: Kirsten M Koepsel
Categories: Technology & Engineering
Type: BOOK - Published: 2018-07-20 - Publisher: SAE International

DOWNLOAD EBOOK

The Aerospace Supply Chain and Cyber Security - Challenges Ahead looks at the current state of commercial aviation and cyber security, how information technolog
Securing AI Model Weights
Language: en
Pages: 130
Authors: Sella Nevo
Categories: Computers
Type: BOOK - Published: 2024-05-30 - Publisher: Rand Corporation

DOWNLOAD EBOOK

The authors describe how to secure the weights of frontier artificial intelligence and machine learning models (that is, models that match or exceed the capabil
Security and Privacy in Smart Sensor Networks
Language: en
Pages: 464
Authors: Maleh, Yassine
Categories: Computers
Type: BOOK - Published: 2018-05-09 - Publisher: IGI Global

DOWNLOAD EBOOK

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more effici