CHF 41.50
Advanced API Security
This book will prepare you to meet the next wave of challenges in enterprise security, guiding you through and sharing best practices for designing APIs for rock-solid security. It will explore different security standards and protocols, helping you choose the right option for your needs. Advanced API Security, Second Edition explains in depth how to secure APIs from traditional HTTP ... zur Produkt-Seite
11876048 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvZjgvMDkvOTAvNTc4MjUxNzcwMDAwMUFfNjAweDYwMC5qcGc=!aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvYWR2YW5jZWQtYXBpLXNlY3VyaXR5LTI5MjA4MjcyMy5qcGd8fnxodHRwczovL29zMS5tZWluZWNsb3VkLmlvL2IxMDE1OC9tZWRpYS9pbWFnZS9mOC8wOS85MC81NzgyNTE3NzAwMDAxQV82MDB4NjAwLmpwZw==","post_title":"Advanced API Security","deeplink":"https:\/\/track.adtraction.com\/t\/t?a=1632201226&as=1592767275&t=2&tk=1&url=https:\/\/www.weltbild.ch\/artikel\/x\/_21678022-1","labels":[],"brand_id":1,"post_content":"This book will prepare you to meet the next wave of challenges in enterprise security, guiding you through and sharing best practices for designing APIs for rock-solid security. It will explore different security standards and protocols, helping you choose the right option for your needs. Advanced API Security, Second Edition explains in depth how to secure APIs from traditional HTTP Basic Authentication to OAuth 2.0 and the standards built around it. Keep your business thriving while keeping enemies away. Build APIs with rock-solid security. The book takes you through the best practices in designing APIs for rock-solid security, provides an in depth understanding of most widely adopted security standards for API security and teaches you how to compare and contrast different security standards\/protocols to find out what suits your business needs, the best. This new edition enhances all the topics discussed in its predecessor with the latest up to date information, and provides more focus on beginners to REST, JSON, Microservices and API security. Additionally, it covers how to secure APIs for the Internet of Things (IoT). Audience: The Advanced API Security 2nd Edition is for Enterprise Security Architects and Developers who are designing, building and managing APIs. The book will provide guidelines, best practices in designing APIs and threat mitigation techniques for Enterprise Security Architects while developers would be able to gain hands-on experience by developing API clients against Facebook, Twitter, Salesforce and many other cloud service providers. What you'll learn - Build APIs with rock-solid security by understanding best practices and design guidelines. - Compare and contrast different security standards\/protocols to find out what suits your busine ss needs, the best.- Expand business APIs to partners and outsiders with Identity Federation. - Get hands-on experience in developing clients against Facebook, Twitter, and Salesforce APIs. - Understand and learn how to secure Internet of Things.","merchants_number":2,"ean":9781484220498,"category_id":1,"size":null,"min_price":41.5,"low_price_merchant_id":27291482,"ID":11876048,"merchants":["weltbild","euniverse"],"brand":"undefined","slug":"advanced-api-security-1","url":"\/produkt\/advanced-api-security-1\/","low_price_merchant_name":"Weltbild"}
CHF 94.90
Connected Vehicles in the Internet of Things: Concepts, Technologies and Frameworks for the IoV
1. Connected Vehicles in the IoV: Concepts, Technologies and Architectures.- 2. Spatial Intelligence and Vehicle-to-Vehicle Communication: Topologies and Architectures.- 3. Seamless V2I Communication in HetNet: State-of-the-Art and Future Research Directions.- 4. Integrating Vehicular Technologies within the IoT Environment: A Case of Egypt.- 5. Protocols and Design Structures for Veh... zur Produkt-Seite
19735089 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvZGUvZWEvNmIvODkwMzg1NzMwMDAwMUFfNjAweDYwMC5qcGc=!aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvZGUvZWEvNmIvODkwMzg1NzMwMDAwMUFfNjAweDYwMC5qcGd8fnxodHRwczovL2kud2VsdGJpbGQuZGUvcC9jb25uZWN0ZWQtdmVoaWNsZXMtaW4tdGhlLWludGVybmV0LW9mLXRoaW5ncy0zMTE4NTQ5MTUuanBn","post_title":"Connected Vehicles in the Internet of Things: Concepts, Technologies and Frameworks for the IoV","deeplink":"https:\/\/cct.connects.ch\/tc.php?t=116298C1969900829T&subid=9783030361693&deepurl=https%3A%2F%2Feuniverse.ch%2Fbuecher%2Fmathematik-naturwissenschaft-technik%2Finformatik-edv%2F398772%2Fconnected-vehicles-in-the-internet-of-things-concepts-technologies-and-frameworks-for-the-iov%3FsPartner%3Dtoppreise","labels":[],"brand_id":434690,"post_content":"1. Connected Vehicles in the IoV: Concepts, Technologies and Architectures.- 2. Spatial Intelligence and Vehicle-to-Vehicle Communication: Topologies and Architectures.- 3. Seamless V2I Communication in HetNet: State-of-the-Art and Future Research Directions.- 4. Integrating Vehicular Technologies within the IoT Environment: A Case of Egypt.- 5. Protocols and Design Structures for Vehicular Networks.- 6. Intelligent Traffic Management Systems for Next Generation IoV in Smart City Scenario. 7. Smart Transportation Tracking Systems Based on the Internet of Things Vision.- 8. Review: A Unified Telemetry Platform for Electric Vehicles and Charging Infrastructure.- 9. Security Issues in Vehicular Ad Hoc Networks.- 10. Security Issues in Vehicular Ad Hoc Networks or Evolution Towards Internet of Vehicles.- 11. Cloud Based Security VANET with Advanced Resource Management and IoV Applications.","merchants_number":2,"ean":9783030361693,"category_id":1,"size":null,"min_price":94.900000000000005684341886080801486968994140625,"low_price_merchant_id":70255345,"ID":19735089,"merchants":["euniverse","weltbild"],"brand":"Springer Berlin,Springer International Publishing,Springer","slug":"connected-vehicles-in-the-internet-of-things-concepts-technologies-and-frameworks-for-the-iov-1","url":"\/produkt\/connected-vehicles-in-the-internet-of-things-concepts-technologies-and-frameworks-for-the-iov-1\/","low_price_merchant_name":"eUniverse"}
CHF 132.50
Computer and Network Security Essentials
Part I.COMPUTER SECURITY.- Chapter 1.Computer Security.- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems.- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics.- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborati... zur Produkt-Seite
19820142 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvZGYvNDEvNDEvNzYzOTYyOTUwMDAwMUFfNjAweDYwMC5qcGc=!aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvZGYvNDEvNDEvNzYzOTYyOTUwMDAwMUFfNjAweDYwMC5qcGc=","post_title":"Computer and Network Security Essentials","deeplink":"https:\/\/cct.connects.ch\/tc.php?t=116298C1969900829T&subid=9783319864044&deepurl=https%3A%2F%2Feuniverse.ch%2Fbuecher%2Fmathematik-naturwissenschaft-technik%2Ftechnik%2F473143%2Fcomputer-and-network-security-essentials%3FsPartner%3Dtoppreise","labels":[],"brand_id":434690,"post_content":"Part I.COMPUTER SECURITY.- Chapter 1.Computer Security.- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems.- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics.- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining.- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack.- Part II. NETWORK SECURITY.- Chapter 6.Malleable Cryptosystems and Their Applications in Wireless Sensor Networks.- Chapter 7. A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems.- Chapter 8. Security protocols for networks and Internet: A global vision.- Chapter 9. Differentiating Security from Privacy in Internet of Things-A Survey of Threats and Solutions.- Chapter 10. Reliable Transmission Protocol for Underwater Acoustic Networks.- Chapter 11. Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield.- PART 3: CRYPTOGRAPHIC TECHNOLOGIES.- Chapter 12.Security Threats and Solutions for Two Dimensional Barcodes: A Comparative Study.- Chapter 13. Searching Encrypted Data on the Cloud.- Chapter 14. A Strong Single Sign on User Authentication Scheme without Verifier Table for Cloud Based Services.- Chapter 15.Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.- Chapter 16.Secure elliptic curves in Cryptography.- Chapter 17.Network models for malware propagation in Wireless Sensor Networks: An Analysis.- PART 4: BIOMETRICS AND FORENSICS.- Chapter 18. Biometric Systems for User Authentication.- Chapter 19. Biometric Authentication and Data Security in Cloud Computing.- Chapter 20. Approximate Search in Digital Forensics.- Chapter 21.Privacy Preserving Internet Browsers - Forensic Analysis.- Part v. HARDWARE SECURITY.- Chapter 22. Experimental Digital Forensics of SubscriberIdentification Module (SIM) Card.- Chapter 23. A Dynamic Area-Efficient Technique to Enhance ROPUFs Security against Modeling Attacks.- Chapter 24. Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs.- PART 6. SECURITY APPLICATIONS.- Chapter 25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking.- Chapter 26. On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns.- Chapter 27.Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment.- PART 7: SECURITY MANAGEMENT.- Chapter 28. Securing the Internet of Things: Best Practices for Deploying IoT Devices.- Chapter 29. Cognitive Computing and Multiscale Analysis for Cyber Security.- Chapter 30. A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems.- Chapter 31. Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts.- Chapter 32. A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems.- Chapter 33. Accountability for Federated Clouds.- Chapter 34. A Cognitive and Concurrent Cyber Kill Chain Model.- Chapter 35.Defense Methods Against Social Engineering Attacks.","merchants_number":1,"ean":9783319864044,"category_id":1,"size":null,"min_price":132.5,"low_price_merchant_id":70255345,"ID":19820142,"merchants":["euniverse"],"brand":"Springer Berlin,Springer International Publishing,Springer","slug":"computer-and-network-security-essentials-1","url":"\/produkt\/computer-and-network-security-essentials-1\/","low_price_merchant_name":"eUniverse"}
CHF 132.50
Internet of Things Use Cases for the Healthcare Industry
AI in Health Sector.- Real-Time Smart Healthcare Model using IoT.- A Fog Based Approach for Real-Time Analytics of IoT-Enabled Healthcare.- Applications of IoT in Indoor Air Quality Monitoring Systems.- CloudIoT for Smart Healthcare: Architecture, Issues and Challenges.- Impact of IoT on the Healthcare Producers: Epitomizing Pharmaceutical Drug Discovery Process.- Cyber-Security Threa... zur Produkt-Seite
19731843 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvMjgvZjAvODYvODA5NTI5NDUwMDAwMUFfNjAweDYwMC5qcGc=!aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvMjgvZjAvODYvODA5NTI5NDUwMDAwMUFfNjAweDYwMC5qcGc=","post_title":"Internet of Things Use Cases for the Healthcare Industry","deeplink":"https:\/\/cct.connects.ch\/tc.php?t=116298C1969900829T&subid=9783030375256&deepurl=https%3A%2F%2Feuniverse.ch%2Fbuecher%2Fmathematik-naturwissenschaft-technik%2Finformatik-edv%2F399251%2Finternet-of-things-use-cases-for-the-healthcare-industry%3FsPartner%3Dtoppreise","labels":[],"brand_id":436454,"post_content":"AI in Health Sector.- Real-Time Smart Healthcare Model using IoT.- A Fog Based Approach for Real-Time Analytics of IoT-Enabled Healthcare.- Applications of IoT in Indoor Air Quality Monitoring Systems.- CloudIoT for Smart Healthcare: Architecture, Issues and Challenges.- Impact of IoT on the Healthcare Producers: Epitomizing Pharmaceutical Drug Discovery Process.- Cyber-Security Threats in Medical Devices.- Smart Healthcare Use Cases and Applications.- IoT Use Cases and Applications.- Internet of Things for Ambient Assisted Living - An Overview.- Smart Health care Applications and Real Time Analytics through Edge Computing.- The Role of Blockchain for Medical Electronics Security.- Clinical Data Analysis using IoT Data Analytics Platforms.- Internet of Things - Tools and Technologies in Healthcare.- Clinical data analysis using IoT.- Security Issues in IoT and Healthcare Devices.","merchants_number":1,"ean":9783030375256,"category_id":1,"size":null,"min_price":132.5,"low_price_merchant_id":70255345,"ID":19731843,"merchants":["euniverse"],"brand":"Springer Berlin,Springer","slug":"internet-of-things-use-cases-for-the-healthcare-industry","url":"\/produkt\/internet-of-things-use-cases-for-the-healthcare-industry\/","low_price_merchant_name":"eUniverse"}
CHF 178.00
Guide to Wireless Network Security
Foreword by Michael Erbschloe.- Overview of Wireless Network Security Technology.- Wireless Network Security Fundamentals.- Types of Wireless Network Security Technology.- Standards.- Enhanced Security for Wireless Lans and Wans in the Enterprise: Hands On.- Handling Wireless Private Information.- Designing Wireless Network Security.- Wireless Network Security Design Issues.- Cost Jus... zur Produkt-Seite
12105911 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvYmUvZTAvZTIvMTUxOTg1ODMwMDAwMUFfNjAweDYwMC5qcGc=!aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvYmUvZTAvZTIvMTUxOTg1ODMwMDAwMUFfNjAweDYwMC5qcGd8fnxodHRwczovL2kud2VsdGJpbGQuZGUvcC9ndWlkZS10by13aXJlbGVzcy1uZXR3b3JrLXNlY3VyaXR5LTI5MjcxODUxNy5qcGc=","post_title":"Guide to Wireless Network Security","deeplink":"https:\/\/cct.connects.ch\/tc.php?t=116298C1969900829T&subid=9780387954257&deepurl=https%3A%2F%2Feuniverse.ch%2Fbuecher%2Fmathematik-naturwissenschaft-technik%2Finformatik-edv%2F199057%2Fguide-to-wireless-network-security%3FsPartner%3Dtoppreise","labels":[],"brand_id":1,"post_content":"Foreword by Michael Erbschloe.- Overview of Wireless Network Security Technology.- Wireless Network Security Fundamentals.- Types of Wireless Network Security Technology.- Standards.- Enhanced Security for Wireless Lans and Wans in the Enterprise: Hands On.- Handling Wireless Private Information.- Designing Wireless Network Security.- Wireless Network Security Design Issues.- Cost Justification and Consideration.- Standards Design Issues.- Authenticating Architectural Design Issues.- Planning for Wireless Network Security.- Implementation Plan Development.- Wireless Network Security Planning Techniques.- Installing and Deploying Wireless Network Security.- Testing Techniques.- Internetworking Wireless Security.- Installation and Deployment.- Securing your Wireless E-Commerce Storefront.- Certification of Wireless Network Security Performance.- Maintaining Wireless Network Security.- Configuring Secure Access.- Management of Wireless Network Security.- Ongoing Maintenance.- Standards Development.- Ensuring Site Security.- Information Warfare Countermeasures: The Wireless Network Security Solution.- Defensive Wireless Network Security Strategies for Governments and Industry Groups.- The Information Warfare Wireless Network Security Arsenal and Tactics of the Military.- The Information Warfare Wireless Network Security Arsenal and Tactics of Terrorists and Rogues.- The Information Warfare Wireless Network Security Arsenal and Tactics of Private Enterprises.- The Information Warfare Wireless Network Security Arsenal of the Future.- Wireless Network Security Surveillance Tools for Information Warfare of the Future.- Civilian Casualties: The Victims and Refugees of Information Warfare Wireless Network Security.- Results and Future Directions.- Providing Wireless Network Security Solutions for ISP Intranet, Internet and E-Commerce.- Enhancing Wireless Web Server Security.- Wireless Network Security Solutions for Consideration.- Summary, Conclusions, and Recommendations.- Appendices. Index.","merchants_number":2,"ean":9780387954257,"category_id":1,"size":null,"min_price":178,"low_price_merchant_id":70255345,"ID":12105911,"merchants":["euniverse","weltbild"],"brand":"undefined","slug":"guide-to-wireless-network-security-1","url":"\/produkt\/guide-to-wireless-network-security-1\/","low_price_merchant_name":"eUniverse"}
CHF 47.90
DNS Security
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a... zur Produkt-Seite
17858220 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9hc3NldHMudGhhbGlhLm1lZGlhL2ltZy9hcnRpa2VsLzg5YWMwMzUyMWFmMmI4NjdjMWZkYTcwODZhYzc3MjUyNGQ3NTY1ZTMtMDAtMDAuanBlZw==!aHR0cHM6Ly9hc3NldHMudGhhbGlhLm1lZGlhL2ltZy9hcnRpa2VsLzg5YWMwMzUyMWFmMmI4NjdjMWZkYTcwODZhYzc3MjUyNGQ3NTY1ZTMtMDAtMDAuanBlZw==","post_title":"DNS Security","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=29208679423&a=401125&m=13971&pref1=9780128033395","labels":[],"brand_id":432170,"post_content":"DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts. Presents a multi-platform approach, covering Linux and Windows DNS security tips Demonstrates how to implement DNS Security tools, including numerous screen shots and configuration examples Provides a timely reference on DNS security, an integral part of the Internet Includes information of interest to those working in DNS: Securing Microsoft DNS and BIND servers, understanding buffer overflows and cache poisoning, DDoS Attacks, pen-testing DNS infrastructure, DNS firewalls, Response Policy Zones, and DNS Outsourcing, amongst other topics","merchants_number":1,"ean":9780128033395,"category_id":1,"size":null,"min_price":47.89999999999999857891452847979962825775146484375,"low_price_merchant_id":70254503,"ID":17858220,"merchants":["orell-fuessli"],"brand":"Elsevier Science & Techn.","slug":"dns-security","url":"\/produkt\/dns-security\/","low_price_merchant_name":"Orell F\u00fcssli"}
CHF 55.50
Ethical and Social Issues in the Information Age
History of ComputingMorality and the LawEthics and Ethical AnalysisEthics and the ProfessionsAnonymity, Security, Privacy, and Civil LibertiesIntellectual Property Rights and Computer TechnologySocial Context of ComputingSoftware Issues: Risks and LiabilitiesComputer CrimesNew Frontiers for Computer Ethics: Artificial IntelligenceNew Frontiers for Computer Ethics: Virtualization and V... zur Produkt-Seite
19822074 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvZXRoaWNhbC1hbmQtc29jaWFsLWlzc3Vlcy1pbi10aGUtaW5mb3JtYXRpb24tYWdlLTMxMDU5NDc3MC5qcGc=!aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvZXRoaWNhbC1hbmQtc29jaWFsLWlzc3Vlcy1pbi10aGUtaW5mb3JtYXRpb24tYWdlLTMxMDU5NDc3MC5qcGd8fnxodHRwczovL29zMS5tZWluZWNsb3VkLmlvL2IxMDE1OC9tZWRpYS9pbWFnZS9mOC85ZS9hNi83NjM3Mjc3MjAwMDAxQV82MDB4NjAwLmpwZw==","post_title":"Ethical and Social Issues in the Information Age","deeplink":"https:\/\/track.adtraction.com\/t\/t?a=1632201226&as=1592767275&t=2&tk=1&url=https:\/\/www.weltbild.ch\/artikel\/x\/_32755143-1","labels":[],"brand_id":436454,"post_content":"History of ComputingMorality and the LawEthics and Ethical AnalysisEthics and the ProfessionsAnonymity, Security, Privacy, and Civil LibertiesIntellectual Property Rights and Computer TechnologySocial Context of ComputingSoftware Issues: Risks and LiabilitiesComputer CrimesNew Frontiers for Computer Ethics: Artificial IntelligenceNew Frontiers for Computer Ethics: Virtualization and Virtual RealityNew Frontiers for Computer Ethics: Cyberspace and Online Social NetworksCyberbullyingNew Frontiers for Computer Ethics: Internet of Things (IoT)Ethical, Privacy and Security Issues in the Social Network EcoSystemsMobile Systems and Intractable Social, Ethical and Security IssuesComputer Crime Investigations - Computer ForensicsBiometrics","merchants_number":2,"ean":9783319889825,"category_id":1,"size":null,"min_price":55.5,"low_price_merchant_id":27291482,"ID":19822074,"merchants":["weltbild","euniverse"],"brand":"Springer Berlin,Springer","slug":"ethical-and-social-issues-in-the-information-age-2","url":"\/produkt\/ethical-and-social-issues-in-the-information-age-2\/","low_price_merchant_name":"Weltbild"}
CHF 63.90
Securing Systems
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of as zur Produkt-Seite
10186126 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9hc3NldHMudGhhbGlhLm1lZGlhL2ltZy9hcnRpa2VsL2VkYWRmZWRkOTFjMzU1NGY5ZTMzMjI4Y2Y4ZGU2ODg2YmRkNDE5ODUtMDAtMDAuanBlZw==!aHR0cHM6Ly9hc3NldHMudGhhbGlhLm1lZGlhL2ltZy9hcnRpa2VsL2VkYWRmZWRkOTFjMzU1NGY5ZTMzMjI4Y2Y4ZGU2ODg2YmRkNDE5ODUtMDAtMDAuanBlZw==","post_title":"Securing Systems","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=25178861555&a=401125&m=13971&pref1=9781482233988","labels":[],"brand_id":37119,"post_content":"Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of as","merchants_number":1,"ean":9781482233988,"category_id":1,"size":null,"min_price":63.89999999999999857891452847979962825775146484375,"low_price_merchant_id":70254503,"ID":10186126,"merchants":["orell-fuessli"],"brand":"Taylor & Francis Ltd.","slug":"securing-systems","url":"\/produkt\/securing-systems\/","low_price_merchant_name":"Orell F\u00fcssli"}