Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

281.930 results (0,83436 seconds)

Brand

Colour

Size

Gender

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

Advancing Computational Intelligence Techniques for Security Systems Design

Cyber Security and Operations Management for Industry 4.0

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Trust Security and Privacy for Big Data

Trust Security and Privacy for Big Data

Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT social platforms healthcare system logs bio-informatics etc. contribute to and define the ethos of Big Data which is volume velocity and variety. Data lakes formed by the amalgamation of data from these sources requires powerful scalable and resilient storage and processing platforms to reveal the true value hidden inside this data mine. Data formats and its collection from various sources not only introduce unprecedented challenges to different domains including IoT manufacturing smart cars power grids etc. but also highlight the security and privacy issues in this age of big data. Security and privacy in big data is facing many challenges such as generative adversary networks efficient encryption and decryption algorithms encrypted information retrieval attribute-based encryption attacks on availability and reliability. Providing security and privacy for big data storage transmission and processing have been attracting much attention in all big data related areas. The book provides timely and comprehensive information for researchers and industry partners in communications and networking domains to review the latest results in security and privacy related work of Big Data. It will serve computer science and cybersecurity communities including researchers academicians students and practitioners who have interest in big data trust privacy and security aspects. It is a comprehensive work on the most recent developments in security of datasets from varied sources including IoT cyber physical domains big data architectures studies for trustworthy computing and approaches for distributed systems and big data security solutions etc. | Trust Security and Privacy for Big Data

GBP 145.00
1

Cryptographic and Information Security Approaches for Images and Videos

Network Security

Network Security

First Published in 2002. Network Security: a practical guide provides a comprehensive review of network security issues with relevance to corporate networks fromboth an administrative and user perspective. It is particularly suited to IS executives administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization. The book covers a broad range of issues starting with an assessment of network security including the financial implications of security breaches and moving on to discuss the different types of security threats facing computer networks. Particular attention is also given to the legal framework for network security. Attention is then turned to increasing security awareness and readiness including system configuration acceptable use business continuity and explaining technical solutions available such as firewalls and content control. Introduction of a security policy is widely accepted as best practise in informing and educating users and the final chapter is devoted to policy writing. By the end of the book readers should be ready to create and implement a network security policy for their organization and start reducing overheads and downtime immediately!*Discusses all the relevant issues with a concise straightforward and readily accessible approach. *Important emphasis placed on the people management aspects of network security. *Practical business oriented approach includes reference to legal and financial aspects of network security. *Companion web site at www. networksecurity. org. uk includes updates additional material downloads and links to resources and further information.

GBP 175.00
1

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4. 0: Applications Challenges and Management presents new cyber-physical security findings for Industry 4. 0 using emerging technologies like artificial intelligence (with machine/deep learning) data mining applied mathematics. All these are the essential components for processing data recognizing patterns modeling new techniques and improving the advantages of data science. Features • Presents an integrated approach with Cyber-Physical Systems CPS security and Industry 4. 0 in one place • Exposes the necessity of security initiatives standards security policies and procedures in the context of industry 4. 0 • Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security • Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4. 0 This book is primarily aimed at graduates researchers and professionals working in the field of security. Executives concerned with security management knowledge dissemination information and policy development for data and network security in different educational government and non-government organizations will also find this book useful. | Intelligent Cyber-Physical Systems Security for Industry 4. 0 Applications Challenges and Management

GBP 110.00
1

Security Engineering for Embedded and Cyber-Physical Systems

Security Engineering for Embedded and Cyber-Physical Systems

Digital transformation also known as Industry 4. 0 Smart Industry and Smart Manufacturing is at the top of leaders’ agendas. Such a transformation stimulates innovation in new products and services the digital transformation of processes and the creation of new business models and ecosystems. In the world of manufacturing Industry 4. 0 is based on various technological advances among which we can mainly cite CPS (cyber-physical systems) IoT (Internet of Things) and IoS (internet of services). While engaging this fourth wave also brings significant challenges for manufacturers. Business operations and the supply chain are becoming more vulnerable to cyber threats. Security Engineering for Embedded and Cyber-Physical Systems is an invaluable resource to discover cybersecurity and privacy techniques for embedded and cyber-physical systems. This book presents the latest studies and research results on all aspects of security engineering for embedded and cyber-physical systems. It also provides a premier interdisciplinary reference for researchers practitioners and educators to discover the most recent innovations trends concerns and practical challenges encountered and solutions adopted in security engineering for embedded and cyber-physical systems. The book offers comprehensive coverage of the essential topics including the following: Embedded and cyber-physical systems threats and vulnerabilities Security engineering techniques for embedded and cyber-physical systems Security engineering for embedded and cyber-physical systems and potential future-use cases Artificial intelligence techniques for cybersecurity and privacy Security engineering for Internet of Things Blockchain for cybersecurity in embedded and cyber-physical systems This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in security engineering for embedded and cyber-physical systems. It aspires to provide a relevant reference for students researchers engineers and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances and future trends related to security engineering for embedded and cyber-physical systems.

GBP 105.00
1

Privacy and Security for Mobile Crowdsourcing

Cyber Security Essentials

Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats tactics and procedures. To accomplish this the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security the book: Covers attacker methods and motivations exploitation trends malicious code techniques and the latest threat vectors Addresses more than 75 key security concepts in a series of concise well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

GBP 160.00
1

Security Analytics A Data Centric Approach to Information Security

Security Analytics A Data Centric Approach to Information Security

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards practices procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes including intrusion from the outside and damaging practices from the inside how criminals apply across devices networks and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire prepare visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development challenges ways for detection and mitigation of attacks advanced technologies and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues analysis threats vulnerabilities novel ideas analysis of latest techniques and technology mitigation of threats and attacks along with demonstration of practical applications and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers. | Security Analytics A Data Centric Approach to Information Security

GBP 150.00
1

Fabufacture Frosted Window Film - SKU-3428 - 4 Metres, 610mm (24")

Fabufacture Frosted Window Film - SKU-3428 - 5 Metres, 610mm (24")

Fabufacture Frosted Window Film - SKU-3428 - 10 Metres, 300mm (12")

Fabufacture Frosted Window Film - SKU-3428 - 2 Metres, 1220mm (48")

Fabufacture Frosted Window Film - SKU-3428 - 3 Metres, 1220mm (48")

Fabufacture Frosted Window Film - SKU-3428 - 4 Metres, 1220mm (48")