contemporary security studies

Contemporary Security Studies

The definitive introduction to security studies, focusing on key theoretical approaches and the critical issues shaping today''s global security landscape. Contemporary Security Studies offers a uniquely engaging introduction to Security Studies, addressing key theories and contemporary issues in the field. A team of expert scholars strikes a careful balance between depth and clarity, making it an essential companion for students exploring the modern security agenda.Key features:· Offers broad, easy-to-digest coverage of the key theories and concepts in Security Studies · Brings together carefully edited contributions from international experts in the field, giving students insights from a range of leading scholars · ''Think point'' boxes challenge students to question their own assumptions, and help to develop critical thinking skills · Case study boxes encourage students to connect theory and practice by demonstrating the real-world manifestations of political issues · Includes coverage of critical Security Studies perspectives, including poststructuralism, postcolonialism, and post-human.· Considers a broad range of traditional and non-traditional security issues, from inter-state armed conflict and nuclear weapons to security issues centring on the environment, crime and cyber-attacks· Also available as an e-book with functionality, navigation features, and links that offer extra learning supportNew to this edition:· Chapter 3 provides a ... Unknown localization key: "more"

Objev podobné jako Contemporary Security Studies

Security Studies: Critical Perspectives - Kyle Grayson, Xavier Guillaume

The only introduction to critical security studies to take a question-centred approach, with a unique emphasis on equipping students with the knowledge and skills to think, analyse, and debate using critical perspectives. Security Studies: Critical Perspectives introduces the analysis of security from critical and interdisciplinary perspectives. Taking a student-centred approach to understanding contemporary security themes and cases, it provides an accessible set of analytic steps so that students develop the critical thinking skills and confidence to ask important questions about security and our worlds in contemporary politics. Common-sense security assumptions that reproduce forms of oppression and domination are revealed and their justifications decentred while perspectives inclusive of class, gender and sexualities, ethnicity and race, religion, disability, culture and ideology, political belonging, and the global south are introduced. In doing so, the authors combine critical analysis with concrete empirical issues that connect students to the social and political worlds around them. Five foundation chapters introducing students to key concepts and methodologies Fifteen thematic chapters, written by leading security analysts exploring key themes in security Detailed illustrative cases for each thematic chapter Accessible short introductions, in the online resources, to some of the major theoretical approaches in critical security studies Online resources ... Unknown localization key: "more"

Objev podobné jako Security Studies: Critical Perspectives - Kyle Grayson, Xavier Guillaume

Security Studies

Security Studies: An Applied Introduction offers a transformative tool to understand, analyse, and engage with the complexities of security in the modern world. This groundbreaking new text redefines the landscape of security studies with the following features: Policy-Relevant: each chapter provides analysis of policy responses to empirical security issues. This practical approach offers a toolkit to assess and contribute to real-world policy discussions. Empirical Application: vividly demonstrating the real-world relevance of Security Studies with online videos from leading security practitioners to show how theory informs practice. Pedagogically Rich: comprehensive online resources and chapters features such as ′security beyond the real′ and hands-on exercises that critically assess real-world security responses and their policy implications that offer ways to apply theoretical concepts in a highly innovative way. Innovative Structure: seamlessly integrating theoretical perspectives with empirical security concerns, this textbook offers a non-compartmentalised approach to theory and practice. Hot Topics: placing contemporary, creative, emerging, and underexplored approaches and empirical topics at the forefront including cyber security, racism, and space security. This is the perfect introduction for undergraduate and postgraduate students studying Security Studies and International or Global Security. Malte Riemann is Assistant Professor in Contemporary Armed Conflict, Leiden University, the Netherlands  Norma ... Unknown localization key: "more"

Objev podobné jako Security Studies

Contemporary Terrorism Studies

- When do individuals radicalise? - Can terrorism be rational? - How can we define terrorism? - What is the role of women in terrorism? - Can states be terrorist? World leading experts answer these questions in Contemporary Terrorism Studies, the first textbook to provide a multi-disciplinary, methodologically plural, and richly diverse introduction to terrorism studies. Contemporary Terrorism Studies covers the main approaches in terrorism studies, and is structured into three comprehensive sections. The first on ''The State of Terrorism Studies'' maps the development and historical context of the discipline, and looks to the future of terrorism studies. Part two on ''Issues and Debates in Terrorism Studies'' examines key contentious questions and debates such as the role of women, technology, and the media in terrorism. The final part, part three on ''Countering Terrorism'' focuses specifically on counterterrorism: it''s instruments, foreign policy, legal frameworks, and organisations. Overall, text will engage students, and establish a confident understanding of the subject. The textbook has been developed with pedagogical features to help enhance student learning. Each chapter contains case studies to highlight real world examples of political violence, questions for reflection to encourage critical thinking, and suggestions for further reading which provide useful sources ... Unknown localization key: "more"

Objev podobné jako Contemporary Terrorism Studies

Contemporary British Studio Pottery - Ashley Thorpe

Pots have existed across the world and in different cultures for thousands of years. This volume explores how contemporary makers use the ancient language of the pot to convey contemporary ideas, from the sculptural and painterly to the ecological and satirical. This beautifully produced book is a visually rich and critically in-depth focus on the work of twenty-four potters. A companion volume to Contemporary British Ceramics: Beneath the Surface, it reveals how pots can be extraordinarily powerful forms of expression.

Objev podobné jako Contemporary British Studio Pottery - Ashley Thorpe

Security in 21st Century Europe - Andrew Cottey

Russia’s 2022 invasion of Ukraine, the rise of populism and uncertainties about the future direction of US politics and foreign policy have created a troubling new international environment for Europe. Against this background, Security in 21st Century Europe explores the evolution of European security since the end of the Cold War and the security challenges facing European states in the 2020s and beyond. It argues that security in Europe has been transformed by the development of liberal regional order underpinned by a security community – a zone of peace where war is inconceivable – and NATO and the EU. But today the European security community, NATO and the EU face a growing array of external challenges and even questions about their continued existence. This third edition analyses:- The relationship between the European security community/NATO/EU and the wider Europe, including: Russia; the Balkans; the former Soviet space; the Mediterranean and North Africa- European engagement with core thematic security issues, including: military intervention; nuclear weapons; terrorism; and non-military security- 3 new chapters on migration, climate change and cybersecurity- All recent major developments that impact on European security, including: the Syrian civil war and resulting regional destabilization; the Russia-Ukraine war; China’s accelerating rise; ... Unknown localization key: "more"

Objev podobné jako Security in 21st Century Europe - Andrew Cottey

Stabilization and Human Security in UN Peace Operations - Alexander Gilder

UN peace operations are increasingly asked to pursue stabilization mandates with lofty expectations of being able to stabilize conflict zones, achieve national reconciliation, and rebuild state legitimacy. This book investigates the relationship between UN stabilization mandates and the concept of ‘human security’.The book is divided into three parts. Part I outlines the emergence of stabilization and other trends in peacekeeping practice and outlines an analytical framework of human security. Part II applies the analytical framework to case studies of MINUSMA, MINUSCA, and UNMISS examining issues, such as human rights, empowerment, protection, and vulnerability. In Part III the book draws out several concerns that arise from stabilization mandates, including the militarisation of UN peace operations and the consequences under international humanitarian law, the risks of close cooperation with the host state and engagement in counter-terror activities, and the potential clash between peacebuilding activities and militarisation.The book will be a valuable resource for academics, policymakers and practitioners working on UN peacekeeping generally, and those specifically looking at stabilization, from the perspective of international relations, international law, peace and conflict studies, security studies and human rights.

Objev podobné jako Stabilization and Human Security in UN Peace Operations - Alexander Gilder

Gibson Les Paul Studio Heritage Cherry Sunburst

Gibson Les Paul Studio Heritage Cherry Sunburst je elektrická kytara kombinující esenciální design Les Paul s prvky pro aktivní hráče. Disponuje odlehčeným tělem, push/pull humbuckery a kombinací mahagonového těla s javorovým topem. Je určena především pro pódium a studiové nahrávání.

  • Odlehčené tělo pro pohodlné hraní
  • Push/pull humbuckery pro univerzální zvuk
  • Kombinace mahagonového těla a javorového topu
  • Cenově dostupnější než vyšší modely Les Paul

Objev podobné jako Gibson Les Paul Studio Heritage Cherry Sunburst

Židle Duo Studio Stone 68 x 46 x 90,5 cm

Kancelářská židle Duo Studio Stone o rozměrech 68 × 46 × 90,5 cm nabízí ergonomický design a praktické funkce pro pracovní a studijní prostředí. Disponuje výškově nastavitelným sedákem, pěti kolečky a odolnou plastovou skořepinou. Díky kompaktním rozměrům a decentnímu vzhledu je vhodná i do menších prostor.

  • Výškově nastavitelný sedák pro individuální přizpůsobení
  • Ergonomicky tvarovaná opěrka zad pro pohodlné sezení
  • Pětiramenný kříž s kolečky zajišťující mobilitu a stabilitu
  • Snadno čistitelný plastový povrch pro jednoduchou údržbu

Objev podobné jako Židle Duo Studio Stone 68 x 46 x 90,5 cm

Židle Duo Studio Carrara 68 x 46 x 90,5 cm

Kancelářská židle Duo Studio Carrara o rozměrech 68 × 46 × 90,5 cm nabízí ergonomický design a praktické funkce pro pracovní i studijní prostředí. Disponuje výškově nastavitelným sedákem, pětikolovou základnou a snadno čistitelným plastovým povrchem. Je vhodná pro domácí kanceláře, studentské pokoje i menší prostory.

  • Výškově nastavitelný sedák pro individuální přizpůsobení
  • Ergonomicky tvarovaná opěrka zad pro pohodlí při dlouhém sezení
  • Pětikolová základna zajišťující stabilitu a snadný pohyb
  • Snadná údržba díky odolnému plastovému povrchu

Objev podobné jako Židle Duo Studio Carrara 68 x 46 x 90,5 cm

HM Studio Šachy společenská hra

Klasická společenská hra šachy od HM Studio je určena pro dva hráče a vhodná pro děti od 6 let. Sada obsahuje hrací desku a 32 figurek. Hra podporuje rozvoj logického a strategického myšlení.

  • Rozvíjí soustředění a strategické uvažování
  • Vhodné pro děti od 6 let
  • Obsahuje kompletní sadu 32 figurek a hrací desku
  • Klasická společenská hra pro dva hráče

Objev podobné jako HM Studio Šachy společenská hra

Alltoys Nehtové studio s Pop It kabelkou

Nehtové studio s Pop It kabelkou je hrací sada pro holčičky od 6 let, která obsahuje 12 nalepovacích nehtů, 24 nálepek, lak na nehty a ozdobné kamínky. Sada umožňuje vytvářet originální nehtové designy a rozvíjí kreativitu. Balení má rozměry 18 x 15 x 2 cm.

  • Kompletní sada pro kreativní manikúru včetně 12 nalepovacích nehtů a 24 nálepek
  • Pop It kabelka pro stylové uložení a přenášení všech doplňků
  • Obsahuje lak na nehty a ozdobné kamínky pro originální designy
  • Vhodné pro děti od 6 let, podporuje jemnou motoriku a kreativitu

Objev podobné jako Alltoys Nehtové studio s Pop It kabelkou

Focusrite Scarlett Solo Studio 4th Gen

Focusrite Scarlett Solo Studio 4th Gen je kompletní záznamový balíček pro sólové hudebníky obsahující USB zvukovou kartu, kondenzátorový mikrofon a sluchátka. Čtvrtá generace přináší vylepšený zvuk a optimalizované ovladače pro nahrávání bez latence. Balíček je ideální pro domácí nahrávací studio zpěváků a hudebníků.

  • Kompletní balíček obsahující zvukovou kartu, mikrofon a sluchátka
  • Vylepšený zvuk 4. generace s křišťálově čistým záznamem
  • Nulová latence při nahrávání díky optimalizovaným ovladačům
  • Kvalitní kardioidní kondenzátorový mikrofon vhodný pro zpěv a nástroje

Objev podobné jako Focusrite Scarlett Solo Studio 4th Gen

DJ.Studio Pro

DJ Studio Pro je sofistikovaný software pro DJing určený začátečníkům i pokročilým uživatelům. Umožňuje přípravu živých setů, rozhlasových pořadů a videomixů přímo z notebooku. Software využívá přes 200 tisíc DJů od amatérů po profesionály.

  • Intuitivní uživatelské rozhraní vhodné pro všechny úrovně
  • Funkce Automix pro automatickou úpravu playlistů podle tempa a harmonie
  • Editor přechodů na časové ose pro precizní mixování
  • Všestranné využití pro živé sety, rozhlasové pořady i videomixy

Objev podobné jako DJ.Studio Pro

CCEA GCSE Business Studies, Third Edition - Hope Kerr

Exam Board: CCEALevel: GCSESubject: BusinessFirst Teaching: September 2017First Exam: June 2019This title has been endorsed for use with the CCEA GCSE Business Studies specificationInspire student success with Hope Kerr''s market-leading Student Book; fully revised for the 2017 specification, it supports and engages learners through up-to-date content coverage and case studies relevant to local, national and global contexts.- Helps students learn and apply key business concepts and theories by providing clear explanations, accompanied by diagrams and photos that aid understanding- Enables students to consolidate their knowledge as they work through a range of activities for each topic- Increases interest and engagement by including contemporary case studies with a particular focus on Northern Ireland businesses and contexts- Prepares students for the new examinations with practice questions, guidance on how to answer different question types and an overview of the assessment objectives and command words- Allows students to track their progress and target their revision using the end-of-chapter checklists

Objev podobné jako CCEA GCSE Business Studies, Third Edition - Hope Kerr

Alltoys Tetovací studio s šablonami

Tetovací studio Alltoys je kreativní sada pro dívky od 6 let, obsahující tetovací pera, kamínky, šablony a kosmetickou taštičku. Umožňuje vytvářet barevné vzory na těle a vlasech, které jsou snadno omyvatelné. Balení má rozměry 25 x 3 x 21 cm.

  • Kompletní sada s tetovacími pery, kamínky a šablonami
  • Vhodné pro kreativní hru od 6 let, podporuje jemnou motoriku
  • Praktická kosmetická taštička pro snadné uskladnění
  • Bezpečné a snadno omyvatelné ozdoby na tělo a vlasy

Objev podobné jako Alltoys Tetovací studio s šablonami

Studies in Ethnomethodology - Harold Garfinkel

This is the first appearance in paper back of one of the major classics of contemporary Sociology. Studies in Ethnomethodology has inspired a wide range of important theoretical and empirical work in the social sciences and linguistics.

Objev podobné jako Studies in Ethnomethodology - Harold Garfinkel

Contemporary Conflict Resolution - Harmonie Toros, Tom Woodhouse, Oliver Ramsbotham, Hugh Miall

The indispensable guide to conflict resolution in a troubled world  At a time of mounting turmoil in world politics, conflict prevention and resolution, peacekeeping, and peacebuilding have never been more important as priorities on the global agenda. The wars in Ukraine and Gaza, and tensions between the major powers in what is now a multi-polar world, require new conflict resolution responses. The fifth edition of this hugely popular text offers a commanding overview of today’s changing conflict landscape and the latest developments and new ideas in the field. Fluently written in an easy-to-follow style, it guides readers carefully through the key concepts, issues and debates, evaluates successes and failures, and assesses the main challenges for conflict resolution today. To counter the prevailing patterns of transnational conflict, the book argues for a response based on cosmopolitan conflict resolution, grounded in the promotion of the cosmopolitan values on which the welfare and life hopes of future generations depend.  Comprehensively updated and illustrated with lively new case studies throughout, the fifth edition returns to its favoured twelve-chapter format. It remains the go-to text for students of peace and security studies, conflict management and international politics as well as policy-makers and those ... Unknown localization key: "more"

Objev podobné jako Contemporary Conflict Resolution - Harmonie Toros, Tom Woodhouse, Oliver Ramsbotham, Hugh Miall

iGET SECURITY M3P22 RFID klíč - používá se společně klávesnicí M3P13v2, pro alarm M3/M4

iGET SECURITY M3P22 - RFID klíčRFID klíč iGET SECURITY M3P22 je určen pro klávesnici iGET SECURITY M3P13v2. Tato klávesnice poté ovládá alarm iGET SECURITY M3 a M4. Stačí pouze přiložit tento klíč ke klávesnici iGET SECURITY M3P13v2 a zvolit zdali se má alarm iGET SECURITY M3 a M4 aktivovat nebo deaktivovat. Velmi snadné použití vhodné pro všechny členy vaší domácnosti. Díky malým rozměrům a úchytu je možné jej připevnit tam, kde je třeba. Hlavní parametryjednoduché rozšíření základního setu alarmu iGET SECURITY M3 a M4,navýšení stupně bezpečnosti při použití klávesnice iGET SECURITY M3P13v2 a RFID klíče iGET SECURITY M3P22 pro vzdálené ovládání, jelikož hlavní jednotka alarmu může být ukrytá,pomocí RFID klíče je možné alarm aktivovat a deaktivovat,RFID klíč nepotřebuje žádné napájení - není nutná výměna baterie,alarm iGET SECURITY M3 a M4 je tak možné ovládat pomocí klávesnice iGET SECURITY M3P13v2 společně s RFID klíčem iGET SECURITY M3P22, také pomocí klíčenky iGET SECURITY M3P5, a pomocí mobilní aplikace iGET SECURITY. Stav se vždy synchronizuje na všech zařízeníchSpecifikacePracovní frekvence: 125 kHzProvozní teplota: -30°C ~ +60°CProvozní vlhkost: 5% ~ 100%Rozměry a hmotnost: 28 x 28 mm, hmotnost 4,1 g

Objev podobné jako iGET SECURITY M3P22 RFID klíč - používá se společně klávesnicí M3P13v2, pro alarm M3/M4

The Security Culture Playbook - Kai Roer, Perry Carpenter

Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization’s security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measuredA careful exploration of the 7 dimensions that comprise security culturePractical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity ModelInsights into building support within the executive team and Board of Directors for your culture management programAlso including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for ... Unknown localization key: "more"

Objev podobné jako The Security Culture Playbook - Kai Roer, Perry Carpenter

Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e - Orin Thomas, Yuri Diogenes

Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for ... Unknown localization key: "more"

Objev podobné jako Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e - Orin Thomas, Yuri Diogenes

Cyber Security Management and Strategic Intelligence - Peter Trim, Yang-Im Lee

Within the organization, the cyber security manager fulfils an important and policy-oriented role. Working alongside the risk manager, the Information Technology (IT) manager, the security manager and others, the cyber security managerÂ’s role is to ensure that intelligence and security manifest in a robust cyber security awareness programme and set of security initiatives that when implemented help strengthen the organizationÂ’s defences and those also of its supply chain partners.Cyber Security Management and Strategic Intelligence emphasizes the ways in which intelligence work can be enhanced and utilized, guiding the reader on how to deal with a range of cyber threats and strategic issues. Throughout the book, the role of the cyber security manager is central, and the work undertaken is placed in context with that undertaken by other important staff, all of whom deal with aspects of risk and need to coordinate the organizationÂ’s defences thus ensuring that a collectivist approach to cyber security management materializes. Real-world examples and cases highlight the nature and form that cyber-attacks may take, and reference to the growing complexity of the situation is made clear. In addition, various initiatives are outlined that can be developed further to make the organization less vulnerable to attack. Drawing ... Unknown localization key: "more"

Objev podobné jako Cyber Security Management and Strategic Intelligence - Peter Trim, Yang-Im Lee

Tribe of Hackers Security Leaders - Jennifer Jin, Marcus J. Carey

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk?How do you lead your team to execute and get results?Do you have a workforce philosophy or unique approach to talent acquisition?Have you created a cohesive strategy for your information security program ... Unknown localization key: "more"

Objev podobné jako Tribe of Hackers Security Leaders - Jennifer Jin, Marcus J. Carey

iGET SECURITY M3P22 - RFID klíč pro iGET SECURITY M3 a M4 (M3P22 SECURITY)

Chytrý přívěsek pro zabezpečovací systém iGET SECURITY M3 a M4 - M3P22 - RFID klíč, RFID klíč iGET SECURITY M3P22 je určen pro klávesnici iGET SECURITY M3P13v2, tato klávesnice poté ovládá alarm iGET SECURITY M3 a M4 Vlastníte zabezpečovací systém iGET Security M3 a M4? Potom rozhodně uvítáte toto praktické příslušenství. Konkrétně jde o RFID tag, který je určen pro bezdrátovou klávesnici iGET SECURITY M3P13v2. Díky tomuto klíči můžete vzdáleně ovládat alarm iGET SECURITY M3 a M4. Použití RFID tagu je velice snadné, pouze přiložíte klíč ke klávesnici a zvolíte, jestli se má alarm aktivovat nebo deaktivovat. Výhodou je bezúdržnost, jelikož tag neboli klíč nepotřebuje žádné napájení. Klíčové vlastnosti iGET SECURITY M3P22RFID klíč Security M3P22 od značky iGETUrčeno pro bezdrátovou klávesnicí iGET Security M3P13v2Vzdálené ovládání alarmu iGET Security M3 A M4Rozšíření základního setu alarmuBez nutnosti napájení

Objev podobné jako iGET SECURITY M3P22 - RFID klíč pro iGET SECURITY M3 a M4 (M3P22 SECURITY)

Cryptography and Network Security: Principles and Practice, Global Ed - William Stallings

For courses in Cryptography, Computer Security, and Network Security. Keep pace with the fast-moving field of cryptography and network security Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security. The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.

Objev podobné jako Cryptography and Network Security: Principles and Practice, Global Ed - William Stallings

iGET SECURITY EP22 - RFID klíč pro alarm iGET M5-4G (EP22 SECURITY)

RFID tag RFID klíč určený pro alarm iGET SECURITY M5. Přikládá se k bezdrátové klávesnici iGET SECURITY EP13 pro vzdálené ovládání alarmu. RFID klíč iGET SECURITY EP22 kompatibilní s alarmem iGET SECURITY M5. Přikládá se k bezdrátové klávesnici iGET SECURITY EP13 pro ovládání alarmu odkudkoliv. Klíč jednoduše přiložte ke klávesnici a zadejte, zda se má alarm zapnout či naopak vypnout. Zajisté vás potěší, že není nutná žádná výměna baterie. Praktický úchyt vám umožňuje si klíč připevnit. Jednoduché párování k základnímu setu alarmu se provádí pomocí QR kódu.Klíčové vlastnosti RFID klíče iGET SECURITY EP22RFID klíč iGET SECURITY EP22 kompatibilní s alarmem iGET SECURITY M5Snadné použití - klíč stačí přiložit ke klávesniciPouze zadejte zda se má alarm aktivovat či deaktivovatZajisté vás potěší, že není nutná žádná výměna bateriePraktický úchyt vám umožňuje si klíč iGET SECURITY EP22 připevnitJednoduché párování k základnímu setu alarmu za pomoci...

Objev podobné jako iGET SECURITY EP22 - RFID klíč pro alarm iGET M5-4G (EP22 SECURITY)

Alice and Bob Learn Application Security - Tanya Janca

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deploymentSecurity Testing (all forms)Common PitfallsApplication Security ProgramsSecuring Modern ApplicationsSoftware Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

Objev podobné jako Alice and Bob Learn Application Security - Tanya Janca

Security in Computing - Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp

The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today''s essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals'' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner''s toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, ... Unknown localization key: "more"

Objev podobné jako Security in Computing - Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp

CompTIA Security+ Practice Tests - David Seidl

Prepare for the Security+ certification exam confidently and quickly CompTIA Security+ Practice Tests: Exam SY0-701, Third Edition, prepares you for the newly updated CompTIA Security+ exam. You'll focus on challenging areas and get ready to ace the exam and earn your Security+ certification. This essential collection of practice tests contains study questions covering every single objective domain included on the SY0-701. Comprehensive coverage of every essential exam topic guarantees that you'll know what to expect on exam day, minimize test anxiety, and maximize your chances of success. You'll find 1000 practice questions on topics like general security concepts, threats, vulnerabilities, mitigations, security architecture, security operations, and security program oversight. You'll also find: Complimentary access to the Sybex test bank and interactive learning environmentClear and accurate answers, complete with explanations and discussions of exam objectivesMaterial that integrates with the CompTIA Security+ Study Guide: Exam SY0-701, Ninth Edition The questions contained in CompTIA Security+ Practice Tests increase comprehension, strengthen your retention, and measure overall knowledge. It's an indispensable part of any complete study plan for Security+ certification.

Objev podobné jako CompTIA Security+ Practice Tests - David Seidl

Security Software Development - Douglas A. Ashbaugh

Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The latest line of defense is to build security features into software as it is being developed. Drawing from the author’s extensive experience as a developer, Secure Software Development: Assessing and Managing Security Risks illustrates how software application security can be best, and most cost-effectively, achieved when developers monitor and regulate risks early on, integrating assessment and management into the development life cycle. This book identifies the two primary reasons for inadequate security safeguards: Development teams are not sufficiently trained to identify risks; and developers falsely believe that pre-existing perimeter security controls are adequate to protect newer software. Examining current trends, as well as problems that have plagued software security for more than a decade, this useful guide:Outlines and compares various techniques to assess, identify, and manage security risks and vulnerabilities, with step-by-step instruction on how to execute each approachExplains the fundamental terms related to the security processElaborates on the pros and cons of each method, phase by phase, to help readers select the one that best ... Unknown localization key: "more"

Objev podobné jako Security Software Development - Douglas A. Ashbaugh

Demystifying Intelligent Multimode Security Systems - Anahit Tarkhanyan, Werner Metz, Sunil Cheruvu, Jody Booth

Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution.There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples'' homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body.IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy.Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law.Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation.What You Will LearnReview the relevant technologies in a surveillance systemDefine and dissect the data pipeline with a focus on key criteria and understand the mapping of this ... Unknown localization key: "more"

Objev podobné jako Demystifying Intelligent Multimode Security Systems - Anahit Tarkhanyan, Werner Metz, Sunil Cheruvu, Jody Booth

International Security - Michael E. Smith

This innovative new text focuses on the politics of international security: how and why issues are interpreted as threats to international security and how such threats are managed. After a brief introduction to the field and its major theories and approaches, the core chapters systematically analyze the major issues on the contemporary international security agenda. Each is examined according to a common framework that brings out the nature of the threat and the responses open to policy makers.From war, terrorism and weapons of mass destruction, through environmental and economic crises, to epidemics, cyber-war and piracy, the twenty-first century world seems beset by a daunting range of international security problems. At the same time, the academic study of security has become more fragmented and contested than ever before as new actors, issues and theories increasingly challenge traditional concepts and approaches.This new edition has been heavily revised to discuss for the failings of the Obama admiration and its strategic partners on a number of different security issues, and the constant, evolving instances of turmoil the world has experienced since, whilst providing the skills students need to conduct their own research of international security issues occurring outside of this text, and for issues ... Unknown localization key: "more"

Objev podobné jako International Security - Michael E. Smith

ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests - Mike Chapple, David Seidl

Full-length practice tests covering all CISSP domains for the ultimate CISSP prep The ISC2 CISSP Official Practice Tests is a major resource for ISC2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain. You also have access to four unique 125-question practice exams to help you master the material. As the only official practice tests endorsed by ISC2, this book gives you the advantage of full and complete preparation. These practice tests align with the 2024 version of the CISSP Detailed Content Outline to ensure up-to-date preparation, and are designed to cover what you will see on exam day. Coverage includes: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security. The CISSP credential signifies a body of knowledge and a set of guaranteed skills that put you in demand in the marketplace. This book is your ticket to achieving this prestigious certification, by helping you test what you know against what you need to know. Test your knowledge of the 2024 CISSP domainsIdentify areas in need ... Unknown localization key: "more"

Objev podobné jako ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests - Mike Chapple, David Seidl

Security-First Compliance for Small Businesses - Karen Walsh

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements.This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that “with security comes compliance,” this book starts by defining “security-first” and then walking readers through the process of creating a holistic security and compliance program.Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.Woven throughout are practical examples of solutions ... Unknown localization key: "more"

Objev podobné jako Security-First Compliance for Small Businesses - Karen Walsh

iGET SECURITY EP27 White - Speciální kovový držák pro ukotvení bateriové kamery iGET SECURITY EP26 W (EP27 White SECURITY)

Držák na kameru iGET SECURITY EP27 White - kovový držák pro kameru EP26 White Kovový držák pro pevné ukotvení určený pro kameru iGET SECURITY EP26 White. Šroubuje se do spodní strany kamery, je naklápěcí a ukotvení je pomocí tří kotevních otvorů. Díky tomuto pevnému držáku ještě lepé ukotvíte kameru iGET SECURITY EP26 na požadované místo. Držák je natáčecí v mnoha směrech pomocí koncového kloubu a zajišťovací matice. iGET SECURITY EP27 White - kovový držák pro kameru EP26 White Kovový držák pro pevné ukotvení určený pro kameru iGET SECURITY EP26 White. Klíčové vlastnosti speciálního kovového držáku pro ukotvení bateriové kameryŠroubuje se do spodní strany kamery, je naklápěcí a ukotvení je pomocí tří kotevních otvorůDíky tomuto pevnému držáku ještě lépe ukotvíte kameru iGET SECURITY EP26 na požadované místoDržák je natáčecí v mnoha směrech pomocí koncového kloubu a zajišťovací maticeJednoduché upevnění na kameruKovový materiál?V prodeji ve...

Objev podobné jako iGET SECURITY EP27 White - Speciální kovový držák pro ukotvení bateriové kamery iGET SECURITY EP26 W (EP27 White SECURITY)

iGET SECURITY EP27 Black - Speciální kovový držák pro ukotvení bateriové kamery iGET SECURITY EP26 B (EP27 Black SECURITY)

Držák na kameru iGET SECURITY EP27 Black - kovový držák pro kameru EP26 Black Kovový držák pro pevné ukotvení určený pro kameru iGET SECURITY EP26 Black. Šroubuje se do spodní strany kamery, je naklápěcí a ukotvení je pomocí tří kotevních otvorů. Díky tomuto pevnému držáku ještě lepé ukotvíte kameru iGET SECURITY EP26 na požadované místo. Držák je natáčecí v mnoha směrech pomocí koncového kloubu a zajišťovací matice. iGET SECURITY EP27 Black, kovový držák pro kameru EP26 Black. Kovový držák pro pevné ukotvení určený pro kameru iGET SECURITY EP26 Black. Klíčové vlastnosti speciálního kovového držáku pro ukotvení bateriové kameryŠroubuje se do spodní strany kamery, je naklápěcí a ukotvení je pomocí tří kotevních otvorůDíky tomuto pevnému držáku ještě lépe ukotvíte kameru iGET SECURITY EP26 na požadované místoDržák je natáčecí v mnoha směrech pomocí koncového kloubu a zajišťovací maticeJednoduché upevnění na kameruKovový materiál?V prodeji...

Objev podobné jako iGET SECURITY EP27 Black - Speciální kovový držák pro ukotvení bateriové kamery iGET SECURITY EP26 B (EP27 Black SECURITY)

Security Engineering - Ross Anderson

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, ... Unknown localization key: "more"

Objev podobné jako Security Engineering - Ross Anderson

International Security - Christopher S. Browning

The subject of international security is never out of the headlines. The subjects of war and peace, military strategy, the proliferation of nuclear weapons and revisionist states remain central to the discussion, but burgeoning concerns such as climate change, migration, poverty, health, and international terrorism have complicated the field. So what really matters? The traditional prioritization of state security or the security needs of individuals, humanity, and the biosphere? And where do the problems lie? Are states themselves as much a part of the problem as the solution for people''s security needs? With globalization, the international security environment has become more interdependent than ever before with the establishment of complex networks that make responding to and managing security challenges increasingly difficult, but increasingly necessary. This Very Short Introduction shows that international security is both vibrant and deeply contested, with stakeholders frequently in disagreement over questions of priority and approach. Christopher S. Browning outlines the nature of the key debates about contemporary international security challenges, and discusses the inherent difficulties that exist in tackling them. He also asks to what extent such debates are infused with questions of power, politics, justice, morality, and responsibility. ABOUT THE SERIES: The Very Short Introductions ... Unknown localization key: "more"

Objev podobné jako International Security - Christopher S. Browning

Covid-19 Global Pandemic and Aspects of Human Security in South Asia - Delwar Hossain, Shariful Islam

The COVID-19 global pandemic has triggered health insecurity, food insecurity, and economic insecurity among many others in South Asia. It has profound impact on every sector of human activities ranging from the economic to environment. There is a need for a critical study of the implications of the COVID-19 pandemic for human security in order to fathom the emerging theoretical and policy issues in the region. Hence, the book provides an understanding of the consequences of the COVID-19 global pandemic for human security in South Asia. This intellectually stimulating book provides a critical analysis and insights on this contemporary challenge to policy makers, health professionals, academics, students, researchers, NGO workers working with health, human security and anyone interested in health and human security in South Asia. The book covers major human security areas, i.e. health security, food security, economic security, and environment issue. The role of regional cooperation and global health governance is also covered in the domain of COVID-19.

Objev podobné jako Covid-19 Global Pandemic and Aspects of Human Security in South Asia - Delwar Hossain, Shariful Islam

iGET SECURITY EP14 - bezdrátový senzor kouře pro alarm iGET M5-4G (EP14 SECURITY)

Detektor senzor kouře pro alarm iGET SECURITY M5. Funguje samostatně a také jako příslušenství pro alarm iGET SECURITY M5. Splňuje ustanovení vč. normy EN14604:2005. Optická detekce kouře, nenápadný design. Ochrana proti sabotáži, nejvyšší zabezpečení přenosu 256bit, dlouhá výdrž baterie až 3 roky, alarm neustále sleduje aktivitu tohoto senzoru, také signál, procenta baterie a další. Není vyplněn Alternativní text k fotografii!Bezdrátový senzor kouře iGET SECURITY EP14Bezdrátový senzor kouře kompatibilní s alarmem iGET SECURITY M5, ale funguje i samostatně. Detekce kouře optickým senzorem. Bezdrátový senzor kouře iGET SECURITY EP14 splňuje veškeré bezpečnostní ustanovení. V případě detekce kouře se spustí jak světelný, tak akustický poplach. Zajisté vás potěší i dlouhá výdrž baterie, tudíž nemusíte myslet na její výměnu. Jednoduché párování k základnímu setu alarmu za pomoci QR kódu. Od hlavní jednotky lze iGET SECURITY EP14 umístit do vzdálenosti 500...

Objev podobné jako iGET SECURITY EP14 - bezdrátový senzor kouře pro alarm iGET M5-4G (EP14 SECURITY)

iGET SECURITY DP24 - Vnitřní siréna pro iGET SECURITY M4 (DP24 SECURITY)

Siréna – bezdrátová vnitřní, určená pro alarm iGet Security M4, napájení 3 bateriemi AA (součástí) či síťovým adaptérem portem microUSB (není součástí), hlasitost 80 dB, výběr z tónů i hlasitosti, ochrana proti sabotáži, umístění až 200 m od hlavní jednotky, při poplachu vydává nouzový tón a svítí červené diody, indikace stavu, ve kterém se alarm nachází Chytré zabezpečení domácnostiBezdrátová vnitřní siréna iGET SECURITY DP24 je doplňkové příslušenství pro alarm iGET SECURITY M4. Siréna se používá v interiérech a lze ji umístit do vzdálenosti až 200 metrů od hlavní jednotky. Napájení zajišťují 3 ks AA baterií, takže k provozu není nutný přívod elektrického proudu. Zařízení lze také napájet ze síťového adaptéru s microUSB portem.Klíčové vlastnosti vnitřní sirény iGET SECURITY DP24Příslušenství pro alarm iGET SECURITY M4Hlasitost sirény 80 dBVýstražné červené LED světloMaximální vzdálenost umístění od hlavní jednotky až 200 mNapájení: 3× AA baterie, 5V...

Objev podobné jako iGET SECURITY DP24 - Vnitřní siréna pro iGET SECURITY M4 (DP24 SECURITY)

iGET SECURITY EP5 - dálkové ovládání (klíčenka) pro alarm iGET M5-4G (EP5 SECURITY)

Klíčenka Dálkový ovladač pro základní ovládání, pro alarm iGET SECURITY M5. Pomocí ovladače lze nastavit: aktivace, deaktivace, režim doma, SOS. Na spodní straně obsahuje jedno volně nastavitelné tlačítko. Dálkové ovládání alarmu (klíčenka) iGET SECURITY EP5Ovládejte alarm iGET SECURITY M5 pohodlně designovým dálkovým ovladačem iGET SECURITY EP5. Alarm jednoduše aktivujte, deaktivujte, uveďte do režimu "Doma" nebo využijte SOS tlačítko k vyvolání poplachu. K dispozici máte i jedno tlačítko navíc, které si sami v aplikaci nadefinujete, bude dělat tedy přesně to, co potřebujete. Dálkové ovládání (klíčenka) iGET SECURITY EP5 pomocí úchytu připevníte např. ke klíčům a budete ho mít neustále po ruce. Zajisté vás potěší i dlouhá výdrž baterie, tudíž nemusíte myslet na její výměnu. Jednoduché párování k základnímu setu provedete pomocí QR kódu.Klíčové vlastnosti dálkového ovládání (klíčenky) iGET SECURITY EP5Designový dálkový ovladač...

Objev podobné jako iGET SECURITY EP5 - dálkové ovládání (klíčenka) pro alarm iGET M5-4G (EP5 SECURITY)

CompTIA Security+ Study Guide with over 500 Practice Test Questions - David Seidl, Mike Chapple

Master key exam objectives and crucial cybersecurity concepts for the CompTIA Security+ SY0-701 exam, along with an online test bank with hundreds of practice questions and flashcards In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You’ll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight. You’ll get access to the information you need to start a new career—or advance an existing one—in cybersecurity, with efficient and accurate content. You’ll also find: Practice exams that get you ready to succeed on your first try at the real thing and help you conquer test anxietyHundreds of review questions that gauge your readiness for the certification exam and help you retain and remember key conceptsComplimentary access to the online Sybex learning environment, complete with hundreds of additional practice questions and flashcards, and a glossary of key terms, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questions Perfect for everyone planning to ... Unknown localization key: "more"

Objev podobné jako CompTIA Security+ Study Guide with over 500 Practice Test Questions - David Seidl, Mike Chapple

ISC2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle - David Seidl, Mike Chapple

This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide, 3rd Edition with an updated collection of practice questions and practice exams in CCSP (ISC)2 Certified Cloud Security Professional Official Practice Tests, 3rd Edition to give you the best preparation ever for the high-stakes (ISC)2 CCSP exam. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with Sybex study tools that include pre-test assessments that show you what you know, and areas you need to further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete, online practice exams. Covering all domains tested by the CCSP exam, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the ... Unknown localization key: "more"

Objev podobné jako ISC2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle - David Seidl, Mike Chapple

8 Steps to Better Security - Kim Crawley

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suiteBuild an effective security team, regardless of the size or nature of your businessComply with regulatory requirements, including general data privacy rules and industry-specific legislationTest your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Objev podobné jako 8 Steps to Better Security - Kim Crawley

Serverless Security - Miguel A. Calles

Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity personnel.At a time when there are many news stories on cybersecurity breaches, it is crucial to think about security in your applications. It is tempting to believe that having a third-party host the entire computing platform will increase security. This book shows you why cybersecurity is the responsibility of everyone working on the project.What You Will LearnGain a deeper understanding of cybersecurity in serverless computingKnow how to use free and open source tools (such as the Node Package Manager, ESLint, and VSCode) to reduce vulnerabilities in your application codeAssess potential threats from event triggers in your serverless functionsUnderstand security best practices in serverless computingDevelop an agnostic security architecture while reducing risk from vendor-specific infrastructureWho This Book Is ForDevelopers or security engineers looking to expand their current knowledge of traditional cybersecurity into serverless computing projects. Individuals ... Unknown localization key: "more"

Objev podobné jako Serverless Security - Miguel A. Calles

iGET SECURITY EP17 - Bezdrátový pohybový PIR senzor bez detekce zvířat pro alarm iGET SECURITY M5

iGET SECURITY EP17 - Bezdrátový Pohybový PIR Senzor Bezpečnostní senzor pro domácnosti s pokročilou technologií. Popis Představujeme vám iGET SECURITY EP17, bezdrátový pohybový PIR senzor bez detekce zvířat pro alarm iGET SECURITY M5. Účinný a spolehlivý Detektor nabízí pokrytí až 9 m a úhly záběru 100° horizontálně a 60° vertikálně. Flexibilní umístění Umístění senzoru od hlavní jednotky je možné do vzdálenosti až 1 km při přímé viditelnosti. Detekce pohybu Funguje na principu digitálního 2fázového logického programování. Detekuje pouze pohyb lidského těla či jiných větších živočichů. Automatická teplotní kompenzace Tato technologie zaručuje vysokou citlivost a stabilitu za každé situace. Vlastnosti Ekologicky úsporný Spotřeba energie nikdy nepřesáhne 100 mA Baterie zajistí bezproblémový provoz po dobu až 5 let Upozornění na stav baterie prostřednictvím mobilní aplikace iGET Specifikace Značka: iGET Řada: Security Model: EP17 Určení: detektor vibrací Slučitelnost: zabezpečovací systémy Kompatibilní domovní interkomy: iGET Security M5-4G / M5-4G Lite Detekce pohybu Typ senzoru: PIR Detekce bez snímání zvířat: Ano Hmotnost zvířat bez spuštění detekce: do 20 kg Vertikální zorný úhel: 60° Horizontální zorný úhel: 100° Ideální instalační výška: 1,8 až 2,2 m Maximální pokrytí: až 9 m (při montáži do výšky 2,2 m) Připojení a baterie Bezdrátové rozhraní: rádiové vlny Frekvence vysílání: 868,35 ... Unknown localization key: "more"

Objev podobné jako iGET SECURITY EP17 - Bezdrátový pohybový PIR senzor bez detekce zvířat pro alarm iGET SECURITY M5

iGET SECURITY M3P16 - bezdrátová řízená zásuvka 230V, pro alarm iGET M4

iGET SECURITY M3P16 - Bezdrátově řízená zásuvka 230 V Jedná se o bezdrátově řízenou zásuvku 230V určenou pro ovládání pomocí alarmu iGET SECURITY M4. Obsahuje funkce pro nastavení zapnutí/vypnutí časovače. Max. spínací výkon 2500 W. Bezdrátová řízená zásuvka iGET SECURITY M3P16 je určena pouze pro použití s alarmem iGET SECURITY M4 a pro používání v interiéru. Veškeré nastavení zásuvky probíhá pomocí aplikace "iGET SECURITY M4". Aplikace tyto pokyny předá alarmu iGET SECURITY M4, ten poté řídí zásuvku dle pokynů. Vzdálenost umístění od hlavní jednotky až 200 m při přímé viditelnosti. Hlavní parametry: Zásuvku je možné použít např. pro zapnutí světla, vytápění, ventilátorů, a mnoho dalších spotřebičů. Možnosti nastavení pro alarm M4: 1) Událost: Při aktivaci/deaktivaci/režimu doma/poplachu zapnout/vypnout pro každý pokyn zvlášť, 2) Časovač: je možné nastavit časové skupiny, v každé pak čas, kdy se má zapnout nebo vypnout a jak často se opakuje - každý den, týden, a nebo přesné datum, Specifikace: Frekvence vysílání: 433,29 MHz Dosah signálu k centrální jednotce: do 200 m při přímé viditelnosti Provozní teplota: - 20°C ~ +50°C Provozní vlhkost: 5% ~ 90% (nekondenzující) Napájecí napětí: 220 V ~ 250 V, 50 ~ 60 Hz, max. 10A Max. spínací výkon pro připojené zařízení: 2500 W ... Unknown localization key: "more"

Objev podobné jako iGET SECURITY M3P16 - bezdrátová řízená zásuvka 230V, pro alarm iGET M4

iGET SECURITY M3B bezdrátový GSM alarm (M3B SECURITY)

Alarm domovní, připojení přes GSM a Rádiové vlny, detekce Na dveře a okna, Pohybu, hlasitost signalizace 110 dB(A), aplikace v češtině a v angličtině pro Android a iOS Víceúčelový bezdrátový GSM alarm iGET SECURITY M3B Bezdrátový hlídací systém iGET Security M3B zabezpečí jakýkoliv byt, dům, kancelář, chatu nebo garáž. Díky bezdrátovému spojení s veškerými detekčními prvky je instalace jednoduchá i rychlá zároveň. Základní jednotku stačí osadit SIM kartou, díky které lze dostávat upozornění pomocí SMS nebo volání. V setu systému iGET Security M3B najdete detektor na dveře a okna, detektor pohybu, vnitřní sirénu ( se 110dB alarmem), 3× dálkové ovládání v podobě klíčenky, 2× varovné nálepky a napájecí adaptér. Klíčové vlastnosti GSM alarmu iGET SECURITY M3BiGET SECURITY M3B je komplexní alarm s napojením přes GSM (nutno vložit vlastní SIM kartu)Veškeré senzory a detektory komunikují s centrální...

Objev podobné jako iGET SECURITY M3B bezdrátový GSM alarm (M3B SECURITY)

iGET SECURITY EP7 - bezdrátové Smart multifunkční tlačítko pro alarm iGET M5-4G (EP7 SECURITY)

Chytré tlačítko Bezdrátové nastavitelné Smart tlačítko určené pro alarm iGET SECURITY M5. Uživatel si v aplikaci sám zvolí co má tlačítko provést a to pro 3 různá stisknutí. Nejvyšší zabezpečení přenosu 256bit, velmi dlouhá výdrž baterie 5 let, alarm neustále sleduje aktivitu tohoto tlačítka, také signál, procenta baterie a další. Zpracování v moderním designu, ekologicky úsporné díky nízké spotřebě energie. Bezdrátové nastavitelné Smart tlačítko iGET SECURITY EP7Bezdrátové Smart multifunkční tlačítko kompatibilní se systémem iGET SECURITY M5. Alarm neustále monitoruje funkčnost tlačítka nebo stav baterie. V aplikaci alarmu si jednoduše nastavíte Smart tlačítko iGET SECURITY EP7. Krátký stisk, dvojitý krátký stisk nebo držení tlačítka déle než 3 vteřiny - pro každý z těchto stisků si sami vyberete, k čemu bude sloužit. Zvolte si např. přepínání režimu alarmu, ovládání zásuvek a žárovek, vyvolejte SOS poplach a nebo dejte tlačítku iGET SECURITY EP7...

Objev podobné jako iGET SECURITY EP7 - bezdrátové Smart multifunkční tlačítko pro alarm iGET M5-4G (EP7 SECURITY)