Cargando…

Cyber-Vigilance and Digital Trust /

Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminal...

Descripción completa

Detalles Bibliográficos
Autor principal: Tounsi, Wiem (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Wiley-ISTE, 2019.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1162606030
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 200701s2019 xx o 000 0 eng
040 |a AU@  |b eng  |c AU@  |d UAB  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCO 
020 |z 9781786304483 
020 |z 9781119618386 
024 8 |a 9781786304483 
029 0 |a AU@  |b 000067299647 
029 1 |a AU@  |b 000072394994 
035 |a (OCoLC)1162606030 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Tounsi, Wiem,  |e author. 
245 1 0 |a Cyber-Vigilance and Digital Trust /  |c Tounsi, Wiem. 
250 |a 1st edition. 
264 1 |b Wiley-ISTE,  |c 2019. 
300 |a 1 online resource (248 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminals, but also to stay one step ahead. Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems. 
542 |f Copyright © 2019 by John Wiley & Sons  |g 2019 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed July 30, 2019) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Internet of things  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Internet des objets  |x Sécurité  |x Mesures. 
650 7 |a Computer security  |2 fast 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781786304483/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP