Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

748 results (0,21514 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Security for Software Engineers

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4. 0: Applications Challenges and Management presents new cyber-physical security findings for Industry 4. 0 using emerging technologies like artificial intelligence (with machine/deep learning) data mining applied mathematics. All these are the essential components for processing data recognizing patterns modeling new techniques and improving the advantages of data science. Features • Presents an integrated approach with Cyber-Physical Systems CPS security and Industry 4. 0 in one place • Exposes the necessity of security initiatives standards security policies and procedures in the context of industry 4. 0 • Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security • Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4. 0 This book is primarily aimed at graduates researchers and professionals working in the field of security. Executives concerned with security management knowledge dissemination information and policy development for data and network security in different educational government and non-government organizations will also find this book useful. | Intelligent Cyber-Physical Systems Security for Industry 4. 0 Applications Challenges and Management

GBP 110.00
1

Security Analytics A Data Centric Approach to Information Security

Security Analytics A Data Centric Approach to Information Security

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards practices procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes including intrusion from the outside and damaging practices from the inside how criminals apply across devices networks and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire prepare visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development challenges ways for detection and mitigation of attacks advanced technologies and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues analysis threats vulnerabilities novel ideas analysis of latest techniques and technology mitigation of threats and attacks along with demonstration of practical applications and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers. | Security Analytics A Data Centric Approach to Information Security

GBP 150.00
1

Software Security Concepts & Practices

Cloud Security Attacks Techniques Tools and Challenges

Cloud Security Attacks Techniques Tools and Challenges

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks Techniques Tools and Challenges provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics including: Basic fundamentals of Cloud Computing Cloud security concepts vulnerabilities security standards and reference models Cloud security goals key issues and privacy requirements Threat model detailed taxonomy of cloud attacks Attack feature analysis – case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools LibVMI – case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook for a semester course at undergraduate and post graduate level in Computer Science Information Technology Information Security and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners cloud security team and the cloud security auditor as well. To get the most out of this book the reader should have a working knowledge of various operating system environments hypervisors cloud computing fundamentals programming languages like Python and a working knowledge of security tools. | Cloud Security Attacks Techniques Tools and Challenges

GBP 130.00
1

Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Security privacy and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are again crucial for the effective performance of these systems. Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies as well as a wide range of examples and illustrations to effectively show the principles algorithms challenges and applications of security privacy and trust for IoT and CPS. Book features: Introduces new directions for research development and engineering security privacy and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles algorithms challenges and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security privacy and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers academics and practitioners from various national and international organizations and universities.

GBP 48.99
1

Security Risk Models for Cyber Insurance

Security Risk Models for Cyber Insurance

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude—and in their destructive potential. New threats emerge regularly the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution – based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts – but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges this volume presents new models for cybersecurity risk management partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis analytics technology management actuarial sciences behavioural sciences and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020 called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective). | Security Risk Models for Cyber Insurance

GBP 44.99
1

Network Forensics Privacy and Security

Network Forensics Privacy and Security

This book primarily focuses on providing deep insight into the concepts of network security network forensics botnet forensics ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know – how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security all kind of network attacks intention of an attacker identification of attack detection its analysis incident response ethical issues botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security tools Digital forensics. Differentiation among network security computer forensics network forensics and botnet forensics. Discussion on various cybercrimes attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication Computer Science and Computer Engineering. | Network Forensics Privacy and Security

GBP 130.00
1

Security and Resilience of Cyber Physical Systems

Security and Resilience of Cyber Physical Systems

In this era of 5G digital communication the implementation of industry 4. 0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity correct decision making and increased efficiency. All the concepts of industry 4. 0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing detecting characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students faculty research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems | Security and Resilience of Cyber Physical Systems

GBP 89.99
1

Introduction to Machine Learning with Applications in Information Security

Introduction to Machine Learning with Applications in Information Security

Introduction to Machine Learning with Applications in Information Security Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques reinforced via realistic applications. The book is accessible and doesn’t prove theorems or dwell on mathematical theory. The goal is to present topics at an intuitive level with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth including Hidden Markov Models (HMM) Support Vector Machines (SVM) and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN) boosting Random Forests and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation Convolutional Neural Networks (CNN) Multilayer Perceptrons (MLP) and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented including Long Short-Term Memory (LSTM) Generative Adversarial Networks (GAN) Extreme Learning Machines (ELM) Residual Networks (ResNet) Deep Belief Networks (DBN) Bidirectional Encoder Representations from Transformers (BERT) and Word2Vec. Finally several cutting-edge deep learning topics are discussed including dropout regularization attention explainability and adversarial attacks. Most of the examples in the book are drawn from the field of information security with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming and elementary computing concepts are assumed in a few of the application sections. However anyone with a modest amount of computing experience should have no trouble with this aspect of the book. Instructor resources including PowerPoint slides lecture videos and other relevant material are provided on an accompanying website: http://www. cs. sjsu. edu/~stamp/ML/.

GBP 62.99
1

Integration of IoT with Cloud Computing for Smart Applications

Artificial Intelligence for Autonomous Networks

Information Technology An Introduction for Today’s Digital World

GBP 74.99
1

Mobile Devices Tools and Technologies

Mobile Devices Tools and Technologies

Wireless and mobile communications have grown exponentially. The average individual now possesses a minimum of two smart mobile devices. The consistent advancement of mobile devices feeds the ever-growing appetite for faster bandwidth uninterrupted connectivity applications to fulfill the needs of consumers and businesses and security for all of this information. Mobile Devices: Tools and Technologies provides readers at all levels of technical expertise with an understanding of mobile device concepts application development processes networking and infrastructure and security methods. This book is organized into four sections with chapters contributed by engineers with extensive real-world experience in the mobile and wireless field. The first section discusses the current mobile device landscape including the latest technology innovations personal and business use trends and mobile operating systems and applications. The second section focuses on the application development process from strategy and process through the development phases to production and launch. This section covers both Android and iOS application development. In the third section the authors explore mobile access standards network types and infrastructure components. This section also covers proximity communications standards including Bluetooth NFC and RFID. The book concludes with a look at mobile device security including mobile encryption methods wireless security levels and corporate security and workforce management strategies. Throughout the book the contributors illustrate proven best practices and methodologies using real-world case studies drawn from their extensive experiences with mobile software and infrastructures for enterprise customers. | Mobile Devices Tools and Technologies

GBP 44.99
1

Consumer Health Informatics Enabling Digital Health for Everyone

Consumer Health Informatics Enabling Digital Health for Everyone

An engaging introduction to an exciting multidisciplinary field where positive impact depends less on technology than on understanding and responding to human motivations specific information needs and life constraints. Betsy L. Humphreys former Deputy Director National Library of Medicine This is a book for people who want to design or promote information technology that helps people be more active and informed participants in their healthcare. Topics include patient portals wearable devices apps websites smart homes and online communities focused on health. Consumer Healthcare Informatics: Enabling Digital Health for Everyone educates readers in the core concepts of consumer health informatics: participatory healthcare; health and e-health literacy; user-centered design; information retrieval and trusted information resources; and the ethical dimensions of health information and communication technologies. It presents the current state of knowledge and recent developments in the field of consumer health informatics. The discussions address tailoring information to key user groups including patients consumers caregivers parents children and young adults and older adults. For example apps are considered as not just a rich consumer technology with the promise of empowered personal data management and connectedness to community and healthcare providers but also a domain rife with concerns for effectiveness privacy and security requiring both designer and user to engage in critical thinking around their choices. This book’s unique contribution to the field is its focus on the consumer and patient in the context of their everyday life outside the clinical setting. Discussion of tools and technologies is grounded in this perspective and in a context of real-world use and its implications for design. There is an emphasis on empowerment through participatory and people-centered care. | Consumer Health Informatics Enabling Digital Health for Everyone

GBP 44.99
1

Handbook of Military and Defense Operations Research

Python for Beginners

Python for Beginners

Python is an amazing programming language. It can be applied to almost any programming task. It allows for rapid development and debugging. Getting started with Python is like learning any new skill: it’s important to find a resource you connect with to guide your learning. Luckily there’s no shortage of excellent books that can help you learn both the basic concepts of programming and the specifics of programming in Python. With the abundance of resources it can be difficult to identify which book would be best for your situation. Python for Beginners is a concise single point of reference for all material on python. Provides concise need-to-know information on Python types and statements special method names built-in functions and exceptions commonly used standard library modules and other prominent Python tools Offers practical advice for each major area of development with both Python 3. x and Python 2. x Based on the latest research in cognitive science and learning theory Helps the reader learn how to write effective idiomatic Python code by leveraging its best—and possibly most neglected—features This book focuses on enthusiastic research aspirants who work on scripting languages for automating the modules and tools development of web applications handling big data complex calculations workflow creation rapid prototyping and other software development purposes. It also targets graduates postgraduates in computer science information technology academicians practitioners and research scholars.

GBP 120.00
1

C++ for Financial Mathematics

Cybersecurity A Practical Engineering Approach

Python for Bioinformatics

Geometry for the Artist

Metamodeling for Variable Annuities

Numerical Methods for Finance

Mathematics for Engineers and Scientists