cybersecurity duane c wilson

Cybersecurity - Duane C. Wilson

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing ... Unknown localization key: "more"

Objev podobné jako Cybersecurity - Duane C. Wilson

Wilson ULTRA 100UL V5 RKT Tenisová raketa, modrá, velikost L2

Wilson ULTRA 100UL V5 RKT je nejlehčí raketa řady Ultra, ideální pro hráče preferující ovladatelnost a šetrnost k paži. Díky technologiím SI3D a Crush Zone nabízí optimální kombinaci síly, rotace a kontroly. Konstrukce Dual Taper Beam a technologie FORTYFIVE° zajišťují stabilitu a razanci úderů.

  • Nejlehčí model řady Ultra pro maximální ovladatelnost
  • Technologie SI3D pro optimální kombinaci síly, rotace a kontroly
  • Systém Crush Zone rozšiřuje sweetspot a prodlužuje kontakt míče
  • Konstrukce Dual Taper Beam zajišťuje razanci bez ztráty komfortu

Objev podobné jako Wilson ULTRA 100UL V5 RKT Tenisová raketa, modrá, velikost L2

CC Certified in Cybersecurity Study Guide - Mike Chapple

Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color illustrations! In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the ISC2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you’ll need to succeed on both the exam and in your first day at a cybersecurity-focused job, using full-color illustrations to highlight and emphasize the concepts discussed inside. Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. You’ll also find: Efficient and lean content, ensuring you get up-to-speed as quickly as possibleBite-sized chapters that break down essential topics into manageable and accessible lessonsComplimentary online access to Sybex’ celebrated online learning environment, which comes with practice questions, a complete glossary of common industry terminology, and more A clear and effective pathway to the Certified in Cybersecurity ... Unknown localization key: "more"

Objev podobné jako CC Certified in Cybersecurity Study Guide - Mike Chapple

Developing Cybersecurity Programs and Policies in an AI-Driven World - Omar Santos

ALL THE KNOWLEDGE YOU NEED TO BUILD CYBERSECURITY PROGRAMS AND POLICIES THAT WORK Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functions—from HR to physical security—to enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses ... Unknown localization key: "more"

Objev podobné jako Developing Cybersecurity Programs and Policies in an AI-Driven World - Omar Santos

Cybersecurity Culture - Gulsebnem Bishop

The culture of cybersecurity is a complex subject. We can look at cybersecurity culture from different perspectives. We can look at it from the organizational point of view or from within the culture. Each organization has a culture. Attitudes toward security have different manifestations in each organizational culture. We also see how the cybersecurity phenomenon unfolds in other cultures is complicated. Each culture reacts differently to this phenomenon. This book will emphasize both aspects of cybersecurity. From the organizational point of view, this book will emphasize the importance of the culture of cybersecurity in organizations, what it is, and how it can be achieved. This includes the human aspects of security, approach and awareness, and how we can design systems that promote the culture of security. It is also important to emphasize the psychological aspects briefly because it is a big part of the human approach.From a cultural point of view, this book will emphasize how different cultures approach the culture of cybersecurity. The cultural complexity of cybersecurity will be noted by giving examples from different cultures. How leadership in different cultures approach security and how different cultures approach change. Case studies from each culture will be presented to demonstrate ... Unknown localization key: "more"

Objev podobné jako Cybersecurity Culture - Gulsebnem Bishop

Practical Industrial Cybersecurity - Charles J. Brooks, Philip A., Jr. Craig

A practical roadmap to protecting against cyberattacks in industrial environments In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security author Charles J. Brooks and electrical grid cybersecurity expert Philip Craig deliver an authoritative and robust discussion of how to meet modern industrial cybersecurity challenges. The book outlines the tools and techniques used by practitioners in the industry today, as well as the foundations of the professional cybersecurity skillset required to succeed on the SANS Global Industrial Cyber Security Professional (GICSP) exam. Full of hands-on explanations and practical guidance, this book also includes: Comprehensive coverage consistent with the National Institute of Standards and Technology guidelines for establishing secure industrial control systems (ICS)Rigorous explorations of ICS architecture, module and element hardening, security assessment, security governance, risk management, and morePractical Industrial Cybersecurity is an indispensable read for anyone preparing for the Global Industrial Cyber Security Professional (GICSP) exam offered by the Global Information Assurance Certification (GIAC). It also belongs on the bookshelves of cybersecurity personnel at industrial process control and utility companies. Practical Industrial Cybersecurity provides key insights to the Purdue ANSI/ISA 95 Industrial Network Security reference model and how it is implemented from the production floor level ... Unknown localization key: "more"

Objev podobné jako Practical Industrial Cybersecurity - Charles J. Brooks, Philip A., Jr. Craig

Cybersecurity of Industrial Internet of Things (IIoT) - Atdhe Buja

While the Industrial Internet of Things (IIoT) continues to redefine industrial infrastructure, the need for thriving Cybersecurity measures has never been more pressing. Cybersecurity of the Industrial Internet of Things (IIoT) contends the critical question of how to secure IIoT systems against the intensifying risks posed by cyber threats and attacks. This book is a fundamental guide for industrial leaders and professionals pursuing to understand and implement effective Cybersecurity solutions. It covers the fundamentals of Cyber-Physical Systems (CPS), IoT, and IT systems, while handing insights into prevailing and emerging cyber threats targeting industrial environments.This thorough resource connects theory and practice, providing a reasoned theoretical foundation upon practical knowledge. Each chapter builds a vital link between academic research and industry application, making it a valuable tool for both Cybersecurity professionals and industrial practitioners. With a focus on the latest hacking techniques, multidisciplinary standards, and regulatory frameworks, this book prepares readers with the skills and knowledge needed to protect their industrial infrastructure now and into the future.Key Features:§ Detailed exploration of industrial infrastructure architecture and communication protocols.§ Understanding of traditional security methods and the threats facing IIoT systems.§ Extensive analysis of IIoT vulnerabilities and effective countermeasures.§ Inspection of reference frameworks, standards, and ... Unknown localization key: "more"

Objev podobné jako Cybersecurity of Industrial Internet of Things (IIoT) - Atdhe Buja

A Cybersecurity Leader's Journey - Edward Marchewka

In today’s cybersecurity landscape, the role of a cybersecurity leader goes beyond technical expertise. Communicating cybersecurity risks and initiatives to executives and boards demands a unique blend of strategic insight and business language. A Cybersecurity Leader’s Journey: Speaking the Language of the Board takes readers on a transformative path from technical talk to business-savvy communication. Follow Nick, a newly appointed CISO, as he navigates the challenges of bridging the gap between complex cybersecurity concepts and the business-focused concerns of board members. Struggling to convey the impact of cybersecurity initiatives, Nick quickly realizes that his technical knowledge alone isn’t enough to gain the board’s trust. With guidance from a mentor, he learns how to address the board’s priorities, answer the critical question of “What’s in it for me?” and deliver insights that resonate. This book offers more than just a narrative—it provides actionable takeaways for cybersecurity leaders and other professionals who want to master the art of strategic communication. Readers will discover how to close information asymmetry gaps, manage the affect heuristic, and develop a communication style that builds trust and fosters informed decision-making. Whether you’re a CISO, an aspiring CISO, or a technical expert aiming to improve your business communication, ... Unknown localization key: "more"

Objev podobné jako A Cybersecurity Leader's Journey - Edward Marchewka

Philosophy of Cybersecurity - Artur Kurasinski, Lukasz Olejnik

Technology and digitization are a great social good. But they also involve risks and threats. Cybersecurity is not just a matter of data or computer security; cybersecurity is about the security of society.Why "Philosophy"? To understand how to reason and think about threats and cybersecurity in today’s and tomorrow’s world, this book is necessary to equip readers with awareness. Philosophy of Cybersecurity is about the user’s perspective, but also about system issues.This is a book for everyone—a wide audience. Experts, academic lecturers, as well as students of technical fields such as computer science and social sciences will find the content interesting. This includes areas like international relations, diplomacy, strategy, and security studies. Cybersecurity is also a matter of state strategy and policy.The clarity and selection of broad material presented here may make this book the first book on cybersecurity you’ll understand.It considers such detailed basics as, for example, what a good password is and, more importantly, why it is considered so today. But the book is also about systemic issues, such as healthcare cybersecurity (challenges, why is it so difficult to secure, could people die as a result of cyberattacks?), critical infrastructure (can a cyberattack destroy elements of a power ... Unknown localization key: "more"

Objev podobné jako Philosophy of Cybersecurity - Artur Kurasinski, Lukasz Olejnik

Nine Lives and Counting - Duane Chapman

Go behind-the-scenes with Duane "Dog" Chapman, star of the hit reality show Dog the Bounty Hunter and two-time New York Times bestselling author, as he shares new stories about his faith in Jesus, family, and the discovery of God''s grace at work throughout his life. From being in a motorcycle gang, to being incarcerated, and then becoming a widely-know TV personality, Duane''s life has been anything but ordinary. But, through every success and failure, the one constant has been his faith in God. For the first time, Daune is sharing how his faith has brought him through life''s greatest difficulties, giving him renewed purpose and meaning.In Nine Lives and Counting Duane offers fresh insight into some of his well-known life events, and he also gives you access to previously untold stories. You will hear about:memories of the painful events that shaped Duane''s childhood,the impact of his relationship with his praying mother,the surprising hope he found in prison,triumphs and failures from his days as a single dad,new previously untold stories of bounty hunting,the tragic loss of his beloved wife Beth to cancer,the unexpected blessing of finding his new wife Francie,the work he and Francie are doing to preach and share about ... Unknown localization key: "more"

Objev podobné jako Nine Lives and Counting - Duane Chapman

Optimal Spending on Cybersecurity Measures - Tara Kissoon

The aim of this book is to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third-party arrangements, and emphasizes that organisations retain accountability for business activities, functions and services outsourced to a third party.Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standards and applicable Laws. This can be used by various stakeholders who are involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organizationÂ’s risk management decision-making process to demonstrate the mechanisms in place to fund cybersecurity measures and demonstrates the application of the process showcasing three case studies. This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimize cybersecurity risks. Features:Aims to strengthen the readerÂ’s understanding of industry governance, risk and compliance practices.Incorporates an innovative approach to assess business risk management.Explores the strategic decisions made by organizations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements.

Objev podobné jako Optimal Spending on Cybersecurity Measures - Tara Kissoon

Cybersecurity Blue Team Toolkit - Nadean H. Tanner

A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner’s wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, ... Unknown localization key: "more"

Objev podobné jako Cybersecurity Blue Team Toolkit - Nadean H. Tanner

Python for Cybersecurity

Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and executionPersistence, privilege escalation, defense evasion, and credential accessDiscovery, lateral movement, collection, and command and controlExfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.

Objev podobné jako Python for Cybersecurity

SOLO NEW YORK Duane Hybrid 15,6", šedá (UBN310-10)

Brašna na notebook do velikosti 15.6", polyester Brašna SOLO NEW YORK Duane Hybrid je ideálním řešením pro pohodlnou a bezpečnou přepravu notebooků do velikosti až 15,6". Při používání brašny oceníte skryté polstrované popruhy, díky kterým ji lze během krátké chvíle přeměnit na batoh. K dispozici je rovněž praktický odnímatelný ramenní popruh, takže lze brašnu nosit přes rameno. Díky velkému vnitřnímu prostoru brašna SOLO NEW YORK Duane Hybrid bez problému pojme vedle notebooku také tablet či mobilní telefon. K dispozici jsou rovněž 2 přední kapsy na zip, které jsou určeny pro pohodlné umístění dalšího příslušenství. Klíčové vlastnosti brašny na notebook SOLO NEW YORK Duane HybridBrašna je určena pro notebooky o velikosti do 15,6"Velký vnitřní prostor umožní umístění tabletu i mobilního telefonuPraktický odnímatelný ramenní popruhBrašna na notebook SOLO NEW YORK Duane Hybrid v šedé barvě2 přední kapsy na zip pro umístění dalšího...

Objev podobné jako SOLO NEW YORK Duane Hybrid 15,6", šedá (UBN310-10)

You Have the Right to Remain Innocent - James Duane

An urgent, compact manifesto that will teach you how to protect your rights, your freedom, and your future when talking to police.Law professor James J. Duane became a viral sensation thanks to a 2008 lecture outlining the reasons why you should never agree to answer questions from the police—especially if you are innocent and wish to stay out of trouble with the law. In this timely, relevant, and pragmatic new book, he expands on that presentation, offering a vigorous defense of every citizen’s constitutionally protected right to avoid self-incrimination. Getting a lawyer is not only the best policy, Professor Duane argues, it’s also the advice law-enforcement professionals give their own kids.Using actual case histories of innocent men and women exonerated after decades in prison because of information they voluntarily gave to police, Professor Duane demonstrates the critical importance of a constitutional right not well or widely understood by the average American. Reflecting the most recent attitudes of the Supreme Court, Professor Duane argues that it is now even easier for police to use your own words against you. This lively and informative guide explains what everyone needs to know to protect themselves and those they love.

Objev podobné jako You Have the Right to Remain Innocent - James Duane

Optimal Spending on Cybersecurity Measures - Tara Kissoon

The aim of this book is to demonstrate the use of business- driven risk assessments to meet the requirements within privacy laws. This book introduces the cyber risk investment model and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of privacy and data protection laws. This can be used by various stakeholders involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organizationÂ’s risk management decision- making process to demonstrate the mechanisms in place to fund cybersecurity measures to meet privacy laws and demonstrates the application of the process using two case studies: CatchMyData and Rapid Cloud Migration. This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimize cybersecurity risks. FeaturesAims to strengthen the readerÂ’s understanding of industry governance, risk and compliance practicesIncorporates an innovative approach to assess business risk managementExplores the strategic decisions made by organizations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements

Objev podobné jako Optimal Spending on Cybersecurity Measures - Tara Kissoon

Cybersecurity First Principles: A Reboot of Strategy and Tactics - Rick Howard

The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles. The author convincingly lays out the arguments for the absolute cybersecurity first principle and then discusses the strategies and tactics required to achieve it. In the book, you'll explore: Infosec history from the 1960s until the early 2020s and why it has largely failedWhat the infosec community should be trying to achieve insteadThe arguments for the absolute and atomic cybersecurity first principleThe strategies and tactics to adopt that will have the greatest impact in pursuing the ultimate first principleCase studies through a first principle lens of the 2015 OPM hack, the 2016 DNC Hack, the 2019 Colonial Pipeline hack, and the Netflix Chaos Monkey resilience programA top to bottom explanation of how to calculate cyber risk for two different kinds of companies This book is perfect for cybersecurity professionals at all levels: business executives and senior security professionals, mid-level practitioner veterans, newbies coming out of school as ... Unknown localization key: "more"

Objev podobné jako Cybersecurity First Principles: A Reboot of Strategy and Tactics - Rick Howard

Cybersecurity Audit Essentials - Armend Salihu

In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets. It bridges the gap between theoretical understanding and real-world application, equipping readers with the tools, techniques, and insights to conduct effective cybersecurity audits confidently. The guide takes readers through every stage of the audit process—from planning and scoping to execution, reporting, and follow-up—offering actionable advice at each step. It unpacks the core principles of cybersecurity auditing, such as risk assessment, compliance frameworks, and leveraging advanced tools and technologies. Readers will gain the skills to identify vulnerabilities, evaluate the effectiveness of security measures, and ensure compliance with regulatory requirements. What You Will Learn:Detailed explanations of various audit types, such as: internal, external, compliance, risk-based, and specialized, tailored to meet diverse organizational needs. Step-by-step instructions, checklists, and real-world examples to help readers avoid common pitfalls and adopt proven best practices. Insights into using cutting-edge technologies, including automated audit platforms, SIEM systems, and vulnerability scanners, to enhance audit effectiveness. Clear guidance on navigating key frameworks like GDPR, NIST, ISO 27001, and more, ensuring adherence to industry standards. Tips for prioritizing risk mitigation, crafting impactful audit ... Unknown localization key: "more"

Objev podobné jako Cybersecurity Audit Essentials - Armend Salihu

Exam Ref SC-100 Microsoft Cybersecurity Architect - Sarah Young, Yuri Diogenes, Gladys Rodriguez, Mark Simos

Prepare for Microsoft Exam SC-100 and demonstrate your real-world mastery of skills and knowledge needed to design and evolve cybersecurity strategy for all aspects of enterprise architecture. Designed for experienced IT professionals, this Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certfied: Cybersecurity Architect Expert level. Focus on the expertise measured by these objectives: Design a Zero Trust strategy and architecture Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies Design a strategy for data and applications Recommend security best practices and priorities This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have advanced security engineering experience and knowledge and experience with hybrid and cloud implementations About the Exam Exam SC-100 focuses on the knowledge needed to build overall security strategy and architecture; design strategies for security operations, identity security, and regulatory compliance; evaluate security posture; recommend technical strategies to manage risk; design strategies to secure server endpoints, client endpoints, and SaaS, PaaS, and IaaS services; specify application security requirements; design data security strategy; recommend security best practices based on Microsoft Cybersecurity Reference Architecture and Azure Security Benchmarks; use the Cloud ... Unknown localization key: "more"

Objev podobné jako Exam Ref SC-100 Microsoft Cybersecurity Architect - Sarah Young, Yuri Diogenes, Gladys Rodriguez, Mark Simos

Optimal Spending on Cybersecurity Measures - Tara Kissoon

Optimal Spending on Cybersecurity Measures: AI and GovernanceThe aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data. All aspects of AI, machine learning models, continuous learning, generalization, predictive and descriptive analytic are dependent on massive data sets. The more diverse and comprehensive the data, the better an AI can perform. Therefore, AI systems require vast amounts of personal data, and should this data be accessed by unauthorized individuals or organizations, it will lead to a privacy breach which may result in personal harm to citizens, i.e. identity theft. This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standards and applicable Laws. This can be used by various stakeholders who are involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organization’s risk management decision-making process to demonstrate the mechanisms in place to fund cybersecurity measures and demonstrates the application of the process showcasing two case studies. Features:· Aims to strengthen the reader’s understanding of industry governance, ... Unknown localization key: "more"

Objev podobné jako Optimal Spending on Cybersecurity Measures - Tara Kissoon

Rozkládací sedací souprava DUAN U Tempo Kondela

ROZKLÁDACÍ SEDACÍ SOUPRAVA DUAN U Přineste do svého domova styl a komfort s rohovou sedací soupravou DUAN U, která skvěle doplní každý obývací pokoj! Díky jejímu univerzálnímu designu si jednoduše vyberete, jestli bude mít roh na levé nebo pravé straně, takže se dokonale přizpůsobí vašemu prostoru. MAXIMÁLNÍ KOMFORT A FUNKČNOST Sedačka nabízí praktický úložný prostor, kam jednoduše schováte přikrývky, polštáře či sezónní dekorace, čímž ušetříte místo a udržíte domov uklizený. Navíc je vybavena rozkládací funkcí, takže ji jednoduše přeměníte na pohodlné lůžko pro hosty. Součástí jsou měkké polštáře, které zajistí příjemnou oporu při relaxaci. KVALITNÍ MATERIÁLY Čalouněná je látkou Riviera ve třech barevných variantách, které vašemu interiéru dodá svěží a trendy vzhled. Výplň sedačky tvoří PUR pěna T28, která zajišťuje pružnost a pohodlné sezení. Ať už chcete strávit večer u oblíbeného seriálu nebo s knihou v ruce, sedačka DUAN U vám vytvoří ideální místo k odpočinku. zelená šedá hnědá Výběr barvy zvolte ve variantě produktu. Pokud Vámi vybraná varianta není ve výběru, je dočasně nedostupná. TECHNICKÉ PARAMETRY Materiál:látka / dřevo / PUR pěnaRozměry:šířka: 289 cmhloubka: 140 cmvýška: 72 cmšířka sedu: 131 cmhloubka sedu: 45 / 65 cmvýška sedu: 39 cmšířka otomanu: 69 cmvýška nožiček: 2,5 cmplocha na spaní (ŠxD): 115x265 ... Unknown localization key: "more"

Objev podobné jako Rozkládací sedací souprava DUAN U Tempo Kondela

Rozkládací sedací souprava DUAN U Tempo Kondela

ROZKLÁDACÍ SEDACÍ SOUPRAVA DUAN U Přineste do svého domova styl a komfort s rohovou sedací soupravou DUAN U, která skvěle doplní každý obývací pokoj! Díky jejímu univerzálnímu designu si jednoduše vyberete, jestli bude mít roh na levé nebo pravé straně, takže se dokonale přizpůsobí vašemu prostoru. MAXIMÁLNÍ KOMFORT A FUNKČNOST Sedačka nabízí praktický úložný prostor, kam jednoduše schováte přikrývky, polštáře či sezónní dekorace, čímž ušetříte místo a udržíte domov uklizený. Navíc je vybavena rozkládací funkcí, takže ji jednoduše přeměníte na pohodlné lůžko pro hosty. Součástí jsou měkké polštáře, které zajistí příjemnou oporu při relaxaci. KVALITNÍ MATERIÁLY Čalouněná je látkou Riviera ve třech barevných variantách, které vašemu interiéru dodá svěží a trendy vzhled. Výplň sedačky tvoří PUR pěna T28, která zajišťuje pružnost a pohodlné sezení. Ať už chcete strávit večer u oblíbeného seriálu nebo s knihou v ruce, sedačka DUAN U vám vytvoří ideální místo k odpočinku. zelená šedá hnědá Výběr barvy zvolte ve variantě produktu. Pokud Vámi vybraná varianta není ve výběru, je dočasně nedostupná. TECHNICKÉ PARAMETRY Materiál:látka / dřevo / PUR pěnaRozměry:šířka: 289 cmhloubka: 140 cmvýška: 72 cmšířka sedu: 131 cmhloubka sedu: 45 / 65 cmvýška sedu: 39 cmšířka otomanu: 69 cmvýška nožiček: 2,5 cmplocha na spaní (ŠxD): 115x265 ... Unknown localization key: "more"

Objev podobné jako Rozkládací sedací souprava DUAN U Tempo Kondela

Rozkládací sedací souprava DUAN L Tempo Kondela

ROZKLÁDACÍ SEDACÍ SOUPRAVA DUAN L Přineste do svého domova styl a komfort s rohovou sedací soupravou DUAN ROH, která skvěle doplní každý obývací pokoj! Díky jejímu univerzálnímu designu si jednoduše vyberete, jestli bude mít roh na levé nebo pravé straně, takže se dokonale přizpůsobí vašemu prostoru. MAXIMÁLNÍ KOMFORT A FUNKČNOST Sedačka nabízí praktický úložný prostor, kam jednoduše schováte přikrývky, polštáře či sezónní dekorace, čímž ušetříte místo a udržíte domov uklizený. Navíc je vybavena rozkládací funkcí, takže ji jednoduše přeměníte na pohodlné lůžko pro hosty. Součástí jsou měkké polštáře, které zajistí příjemnou oporu při relaxaci. KVALITNÍ MATERIÁLY Čalouněná je látkou Riviera ve třech barevných variantách, které vašemu interiéru dodá svěží a trendy vzhled. Výplň sedačky tvoří PUR pěna T28, která zajišťuje pružnost a pohodlné sezení. Ať už chcete strávit večer u oblíbeného seriálu nebo s knihou v ruce, sedačka DUAN ROH vám vytvoří ideální místo k odpočinku. petrolejová šedá hořčicová Výběr barvy zvolte ve variantě produktu. Pokud Vámi vybraná varianta není ve výběru, je dočasně nedostupná. TECHNICKÉ PARAMETRY Materiál:látka / dřevo / PUR pěnaRozměry:šířka: 226 cmhloubka: 140 cmvýška: 73 cmšířka sedu: 131 cmhloubka sedu: 45 / 65 cmvýška sedu: 39 cmšířka otomanu: 68 cmvýška nožiček: 2,5 cmplocha na spaní (ŠxD): 119x199 ... Unknown localization key: "more"

Objev podobné jako Rozkládací sedací souprava DUAN L Tempo Kondela

Rozkládací sedací souprava DUAN L Tempo Kondela

ROZKLÁDACÍ SEDACÍ SOUPRAVA DUAN L Přineste do svého domova styl a komfort s rohovou sedací soupravou DUAN ROH, která skvěle doplní každý obývací pokoj! Díky jejímu univerzálnímu designu si jednoduše vyberete, jestli bude mít roh na levé nebo pravé straně, takže se dokonale přizpůsobí vašemu prostoru. MAXIMÁLNÍ KOMFORT A FUNKČNOST Sedačka nabízí praktický úložný prostor, kam jednoduše schováte přikrývky, polštáře či sezónní dekorace, čímž ušetříte místo a udržíte domov uklizený. Navíc je vybavena rozkládací funkcí, takže ji jednoduše přeměníte na pohodlné lůžko pro hosty. Součástí jsou měkké polštáře, které zajistí příjemnou oporu při relaxaci. KVALITNÍ MATERIÁLY Čalouněná je látkou Riviera ve třech barevných variantách, které vašemu interiéru dodá svěží a trendy vzhled. Výplň sedačky tvoří PUR pěna T28, která zajišťuje pružnost a pohodlné sezení. Ať už chcete strávit večer u oblíbeného seriálu nebo s knihou v ruce, sedačka DUAN ROH vám vytvoří ideální místo k odpočinku. petrolejová šedá hořčicová Výběr barvy zvolte ve variantě produktu. Pokud Vámi vybraná varianta není ve výběru, je dočasně nedostupná. TECHNICKÉ PARAMETRY Materiál:látka / dřevo / PUR pěnaRozměry:šířka: 226 cmhloubka: 140 cmvýška: 73 cmšířka sedu: 131 cmhloubka sedu: 45 / 65 cmvýška sedu: 39 cmšířka otomanu: 68 cmvýška nožiček: 2,5 cmplocha na spaní (ŠxD): 119x199 ... Unknown localization key: "more"

Objev podobné jako Rozkládací sedací souprava DUAN L Tempo Kondela

Rozkládací sedací souprava DUAN L Tempo Kondela

ROZKLÁDACÍ SEDACÍ SOUPRAVA DUAN L Přineste do svého domova styl a komfort s rohovou sedací soupravou DUAN ROH, která skvěle doplní každý obývací pokoj! Díky jejímu univerzálnímu designu si jednoduše vyberete, jestli bude mít roh na levé nebo pravé straně, takže se dokonale přizpůsobí vašemu prostoru. MAXIMÁLNÍ KOMFORT A FUNKČNOST Sedačka nabízí praktický úložný prostor, kam jednoduše schováte přikrývky, polštáře či sezónní dekorace, čímž ušetříte místo a udržíte domov uklizený. Navíc je vybavena rozkládací funkcí, takže ji jednoduše přeměníte na pohodlné lůžko pro hosty. Součástí jsou měkké polštáře, které zajistí příjemnou oporu při relaxaci. KVALITNÍ MATERIÁLY Čalouněná je látkou Riviera ve třech barevných variantách, které vašemu interiéru dodá svěží a trendy vzhled. Výplň sedačky tvoří PUR pěna T28, která zajišťuje pružnost a pohodlné sezení. Ať už chcete strávit večer u oblíbeného seriálu nebo s knihou v ruce, sedačka DUAN ROH vám vytvoří ideální místo k odpočinku. petrolejová šedá hořčicová Výběr barvy zvolte ve variantě produktu. Pokud Vámi vybraná varianta není ve výběru, je dočasně nedostupná. TECHNICKÉ PARAMETRY Materiál:látka / dřevo / PUR pěnaRozměry:šířka: 226 cmhloubka: 140 cmvýška: 73 cmšířka sedu: 131 cmhloubka sedu: 45 / 65 cmvýška sedu: 39 cmšířka otomanu: 68 cmvýška nožiček: 2,5 cmplocha na spaní (ŠxD): 119x199 ... Unknown localization key: "more"

Objev podobné jako Rozkládací sedací souprava DUAN L Tempo Kondela

Cybersecurity - Harvard Business Review, Boris Groysberg, Roman V. Yampolskiy, Alex Blau, Andrew Burt

No data is completely safe.Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone''s responsibility, from the boardroom to the break room.Cybersecurity: The Insights You Need from Harvard Business Review brings you today''s most essential thinking on cybersecurity, from outlining the challenges to exploring the solutions, and provides you with the critical information you need to prepare your company for the inevitable hack. The lessons in this book will help you get everyone in your organization on the same page when it comes to protecting your most valuable assets.Business is changing. Will you adapt or be left behind?Get up to speed and deepen your understanding of the topics that are shaping your company''s future with the Insights You Need from Harvard Business Review series. Featuring HBR''s smartest thinking on fast-moving issues--blockchain, cybersecurity, AI, and more--each book provides the foundational introduction and practical case studies your ... Unknown localization key: "more"

Objev podobné jako Cybersecurity - Harvard Business Review, Boris Groysberg, Roman V. Yampolskiy, Alex Blau, Andrew Burt

Emerging ICT Technologies and Cybersecurity - Al-Sakib Khan Pathan, Sadia Ismat, Kutub Thakur

This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally connected world, cybersecurity is one of the most important issues today. We have witnessed tremendous advancements over the last two decades in various fields of networking, connectivity, electronics, and the technologies that make use of those platforms and devices. Many emerging technologies are also showing promise for future use in the cybersecurity area. Hence, it is important to understand some basics of the technologies and concepts that are making their impacts today and those which may show stronger influence in the near future. The book begins with an introduction to ICT and its advancements, then talks about Artificial Intelligence (AI), Machine Learning (ML), and Blockchain Technologies. It then goes on to cover wireless technology, Internet of Things (IoT), Distributed Cloud Computing, Quantum Computing, Virtual Reality, and other futuristic technologies that would be directly related to Cyberspace and Cybersecurity.This textbook is written in a step-by-step manner, with easily accessible information for both general readers and experts in the field. It is suitable to be used as a textbook for undergraduate and graduate courses ... Unknown localization key: "more"

Objev podobné jako Emerging ICT Technologies and Cybersecurity - Al-Sakib Khan Pathan, Sadia Ismat, Kutub Thakur

Medical Device Cybersecurity for Engineers and Manufacturers, Second Edition - Axel Wirth, Jason Smith, Christopher Gates

Medical Device Cybersecurity for Engineers and Manufacturers, Second Edition removes the mystery from cybersecurity engineering and regulatory processes and practices, showing medical device manufacturers how to produce and maintain devices that meet evolving regulatory expectations and reduce cybersecurity risks to business and patients. It represents a complete guide for medical device manufacturers seeking to implement lifecycle processes that secure their premarket and postmarket activities.  This step-by-step guide educates manufacturers about the implementation of security best practices in accordance with industry standards and expectations, advising the reader about everything from high-level concepts to real-world solutions and tools. It focuses on the security aspects of every lifecycle phase of the product, including concept, design, implementation, supply chain, manufacturing, postmarket maintenance, and end of life. It details the practices, processes, and outputs necessary to create a secure medical device capable of gaining regulatory approval and meeting market entry requirements.  Reflecting rapid industry developments, regulatory changes, and technology advances, this new edition equips manufacturers with the knowledge to produce secure products that meet regulatory and market requirements while anticipating threats from sophisticated cyber adversaries. It's an indispensable resource for a wide range of professionals involved in medical device manufacturing, including engineering management, ... Unknown localization key: "more"

Objev podobné jako Medical Device Cybersecurity for Engineers and Manufacturers, Second Edition - Axel Wirth, Jason Smith, Christopher Gates

Cybersecurity For Dummies - Joseph Steinberg

Get the know-how you need to safeguard your data against cyber attacks Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security—shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information from the latest cyber threats. This book helps you build stronger defenses, with detailed instructions on how to protect your computer, your online data, and your mobile devices. Learn how to set up the right security measures and prevent breaches—as well as what to do if your information or systems are compromised. Learn about the different types of cyberattacks and how to defend against themBeef up your data security for hybrid work environments and cloud storageKeep your family members safe against deepfake and other social engineering attacksMake sure you have a plan to respond quickly and limit damage in the event of a breach Ideal for businesses and individuals who want to be cyber-secure. Cybersecurity For Dummies is also a great primer for anyone interested in pursuing a career in ... Unknown localization key: "more"

Objev podobné jako Cybersecurity For Dummies - Joseph Steinberg

How Cybersecurity Really Works - Sam Grubb

Cybersecurity for Beginners is an engaging, informal introduction to the field of cybersecurity. Readers learn how attackers operate, as well as how to defend individuals and organisations against online attacks. An accessible introduction to the field of cybersecurity, requiring no prior technical knowledge. Readers learn how ''black hat'' (criminal) hackers select targets, trick victims into divulging private information, deploy malware, steal passwords, steal data, pirate WiFi, and escape detection. Readers also learn strategies for defending against online attacks.

Objev podobné jako How Cybersecurity Really Works - Sam Grubb

Cybersecurity Essentials - Charles J. Brooks, Philip A., Jr. Craig, Donald Short, Christopher Grow

An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.

Objev podobné jako Cybersecurity Essentials - Charles J. Brooks, Philip A., Jr. Craig, Donald Short, Christopher Grow

Mastering Cybersecurity - Akashdeep Bhardwaj

In todayÂ’s ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes.Volume 1: The first volume starts with the fundamentals and hands-on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isnÂ’t just about identifying weaknesses; itÂ’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. YouÂ’ll also learn live hunting for vulnerable devices and systems on the Internet.Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of open-source intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, ... Unknown localization key: "more"

Objev podobné jako Mastering Cybersecurity - Akashdeep Bhardwaj

Marvel classic novels - Spider-Man: The Venom Factor Omnibus - Diane Duane

Rediscover the classic Spider-Man Venom trilogy by Diane Duane, now as a brand-new omnibus collecting all three novels. THIS TRIPLE THREAT GIVES SPIDER-MAN THE FIGHT OF HIS LIFE.Collecting all three of Diane Duane''s fan-favorite Spider-Man novels in a brand-new omnibus, featuring The Venom Factor, The Lizard Sanction, and The Octopus Agenda.Venom is out of control, seemingly murdering one of the innocents he swore to protect. Has Venom lost his mind, or is there another suspect?The Lizard is rampaging through the Everglades in search of a cure. While Spider-Man tries to stop him causing any more destruction, Venom appears hell-bent on killing the Lizard. What do these two have in common, and does it have something to do with the mysterious group of mercenaries in the area?Doctor Octopus is stockpiling nuclear bombs and has masterminded a plan to rain havoc down across the globe. Spider-Man and Venom must put aside their differences and team up to defeat Doc Ock before he devastates the planet.Doctor Octopus is stockpiling nuclear bombs and has masterminded a plan to rain havoc down across the globe. Spider-Man and Venom must put aside their differences and team up to defeat Doc Ock before he devastates the planet.

Objev podobné jako Marvel classic novels - Spider-Man: The Venom Factor Omnibus - Diane Duane

You Can Run But You Can't Hide - Duane Chapman

''In Dog We Trust''. The autobiography of cult hero Duane ''Dog'' Chapman, the world''s most successful bounty hunter.Duane ''Dog'' Chapman entertains and inspires millions on DOG THE BOUNTY HUNTER, his top-rated TV show, but there is more to his story. From troubled beginnings and tragedy to triumph and transformation, he reveals all in this no-holds-barred memoir.Dog spent the early years of his life on the wrong side of the law. In YOU CAN RUN BUT YOU CAN''T HIDE, he offers an inside look at his days as a gang member, his dark years of addiction and abuse, and how serving eighteen months in prison for a murder he says he didn''t commit helped him recommit to his faith.The proprietor of Da Kine Bail Bonds in Hawaii, he also shares stories of some of his most dangerous and exciting bounty hunts, and the reasons why he brings such passion and commitment to his chosen profession.An incredible story of a man who, against all odds, turned his life around and went from ex-con to American icon.

Objev podobné jako You Can Run But You Can't Hide - Duane Chapman

Data Engineering for Cybersecurity - James Bonifield

When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization''s computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating ''data pipelines'' that support cybersecurity, data analytics, and automation needs alike. You''ll how to: Implement core logging strategies using free tools such as Elastic stack; Transform data to fit your needs, and configure your tools to send it back and forth; Secure your logging infrastructure by encrypting connections using TLS and SSH; Handle version control and backups with Git, and improve your efficiency with caching. By the end, you''ll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.

Objev podobné jako Data Engineering for Cybersecurity - James Bonifield

Public and Private Governance of Cybersecurity

As the Internet increasingly affects how we live and work, the challenges posed by borderless cybersecurity threats remain largely unaddressed. This book examines cybersecurity challenges, governance responses to them, and their limitations, engaging an interdisciplinary approach combining legal and international relations disciplines.

Objev podobné jako Public and Private Governance of Cybersecurity

The Psychology of Cybersecurity - Tarnveer Singh, Sarah Y. Zheng

This book takes a fresh look at the psychology of cybersecurity and IT management, discussing the role of cognitive bias and human factors on poor decisions. The book considers the psychology and motivations of those involved with cybersecurity both as cyber attackers and cyber defenders.

Objev podobné jako The Psychology of Cybersecurity - Tarnveer Singh, Sarah Y. Zheng

Živý vesmír - Duane Elgin

Věda tradičně tvrdí, že vesmír byl vytvořen z netečné hmoty a prázdného prostoru. Duane Elgin shromažďuje mimořádné důkazy z kosmologie, biologie a fyziky o tom, že vesmír není mrtvý, ale naopak výjimečně živý, což je podle něj v souladu se všemi většími světovými duchovními tradicemi. Elgin zkoumá, jak tento pohled radikálně proměňuje koncept nás samých, naše místo v kosmu a evoluční trajektorii lidského rodu. Pohled na vesmír jako neživý systém nás dovedl k přebujelému materialismu a globální devastaci životního prostředí. Máme-li transformovat planetární krize, pak musíme překonat paradigma separace a využívání zdrojů a naučit se žít na Zemi trvale udržitelným způsobem, ve vzájemné harmonii a v souznění s živým vesmírem.

Objev podobné jako Živý vesmír - Duane Elgin

Residing with Nature - Duan Tran, Grant Kirkpatrick

A highly anticipated monograph of recent houses by a leading California architecture and landscape firm that celebrates sophisticated modern living and represents the pinnacle of the California Dream.Residing with Nature features one-of-a-kind homes, crafted in sensuous materials and dramatically sited to enhance views, sunlight, and nature in California, Nevada, and Colorado. Grant Kirkpatrick and Duan Tran of KAA Design share their process for creating personal environments that are tailor-made to each client’s unique lifestyle and setting. All the designs inform a dynamic connection to nature that links indoors and outdoors, an extraordinary attention to craftsmanship, an enduring use of local materials, a striking balance between geometry and whimsy, and an exhilarating sense of levitation.KAA Design’s stunning houses exemplify why so many look to California as the mode of sophisticated modern living. Their houses are inspired by early California modernism and Asian traditions—and an homage to the work of architects like Rudolf Schindler who used a sophisticated, natural material palette. The Strand in Manhattan Beach rises out of a berm of seagrasses; the Tree House is nestled amidst an array of mature cork oaks, rare Torrey pines, and fragrant Southern magnolias, responding to the client’s longstanding connection to the site and ... Unknown localization key: "more"

Objev podobné jako Residing with Nature - Duan Tran, Grant Kirkpatrick

California Bear - Duane Swierczynski

A witty new thriller from a "great storyteller" (Michael Connelly), California Bear follows four unlikely vigilantes whose decision to take justice into their own hands pits them against the villain behind California''s coldest case."Fresh, exciting, and brilliantly unpredictable." -James PattersonNONE OF YOU ARE SAFE"KILLER": Jack Queen has been exonerated and freed from prison thanks to retired LAPD officer Cato Hightower. But when guilt gnaws at Jack, he admits: "I actually did it." To which Hightower responds: "Yeah, no kidding." You see, the ex-cop has a special job in mind for the ex-con...THE GIRL DETECTIVE: Fifteen-year-old Matilda Finnerty has been handed a potential death sentence in the form of a leukemia diagnosis. But that''s not going to stop her from tackling the most important mystery of her life: Is her father guilty of murder?GENE JEANIE: Jeanie Hightower mends family trees for a living, but the genealogist is unable to repair her own marriage. And her soon-to-be ex may have entangled her in a scheme that has drawn the bloody wrath of...THE BEAR: A prolific serial killer who disappeared forty years ago, who is only now emerging from hibernation when the conditions are just right. And this time, the California Bear is ... Unknown localization key: "more"

Objev podobné jako California Bear - Duane Swierczynski

The Heart-Shaped Tin - Bee Wilson

‘Extraordinary’ TELEGRAPH ????? 'Bee Wilson is one of my favourite writers and this may be her best book' CHRIS VAN TULLEKEN This strikingly original account from award-winning food writer Bee Wilson charts how everyday objects take on deeply personal meanings in all our lives. One ordinary day, the tin in which Bee Wilson baked her wedding cake fell to the ground at her feet. This should have been unremarkable, except that her marriage had just ended. Unsettled by her own feelings about the heart-shaped tin, Wilson begins a search for others who have attached strong and even magical meanings to kitchen objects. She meets people who deal with grief or pain by projecting emotions onto certain objects, whether it is a beloved parent’s salt shaker, a cracked pasta bowl or an inherited china dinner service. Remembering her own mother, a dementia sufferer, she explores the ways that both of them have been haunted by deciding which kitchen utensils to hold on to and which to get rid of when you think you are losing your mind. Looking to different continents, cultures and civilisations to investigate the full scope of this phenomenon, Wilson blends her own experiences with a series of ... Unknown localization key: "more"

Objev podobné jako The Heart-Shaped Tin - Bee Wilson

CyberSecurity (978-80-88168-31-7)

Kniha - autor Jan Kolouch, 560 stran, česky, brožovaná bez přebalu lesklá Kniha CyberSecurity se primárně věnuje problematice kybernetické bezpečnosti. Prezentovány jsou základní principy, které by každá osoba, která využívá informační a komunikační technologie, měla respektovat a případně si je měla modifikovat v závislosti na činnosti či účelu, za kterým tyto technologie využívá. Zároveň však kniha obsahuje i dílčí výklad některých právních norem, které s problematikou kybernetické bezpečnosti bezprostředně souvisejí. Relativně samostatnou část knihy představuje komentář k zákonu č. 181/2014 Sb., o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti). Vedle teoretické a právní části je součástí knihy i praktická část, využitelná zejména IT odborníky, kteří se chtějí vzdělat i v problematice kybernetické bezpečnosti. Z knihy je také možné načerpat informace o činnosti bezpečnostních týmů typu CERT, CSIRT v...

Objev podobné jako CyberSecurity (978-80-88168-31-7)

CyberSecurity (978-80-881-6831-7)

Elektronická kniha - ze série Edice CZ,NIC, autor Pavel Bašta, 556 stran, česky Kniha CyberSecurity se primárně věnuje problematice kybernetické bezpečnosti. Prezentovány jsou základní principy, které by každá osoba, která využívá informační a komunikační technologie, měla respektovat a případně si je měla modifikovat v závislosti na činnosti či účelu, za kterým tyto technologie využívá. Zároveň však kniha obsahuje i dílčí výklad některých právních norem, které s problematikou kybernetické bezpečnosti bezprostředně souvisejí. Relativně samostatnou část knihy představuje komentář k zákonu č. 181/2014 Sb., o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti). Vedle teoretické a právní části je součástí knihy i praktická část, využitelná zejména IT odborníky, kteří se chtějí vzdělat i v problematice kybernetické bezpečnosti. Z knihy je také možné načerpat informace o činnosti bezpečnostních týmů typu CERT, CSIRT v...

Objev podobné jako CyberSecurity (978-80-881-6831-7)

CyberSecurity - kolektiv autorů, Jan Kolouch, Pavel Bašta

Kniha CyberSecurity se primárně věnuje problematice kybernetické bezpečnosti. Prezentovány jsou základní principy, které by každá osoba, která využívá informační a komunikační technologie, měla respektovat a případně si je měla modifikovat v závislosti na činnosti či účelu, za kterým tyto technologie využívá. Zároveň však kniha obsahuje i dílčí výklad některých právních norem, které s problematikou kybernetické bezpečnosti bezprostředně souvisejí. Relativně samostatnou část knihy představuje komentář k zákonu č. 181/2014 Sb., o kybernetické bezpečnosti a o změně souvisejících zákonů (zákon o kybernetické bezpečnosti). Vedle teoretické a právní části je součástí knihy i praktická část, využitelná zejména IT odborníky, kteří se chtějí vzdělat i v problematice kybernetické bezpečnosti. Z knihy je také možné načerpat informace o činnosti bezpečnostních týmů typu CERT, CSIRT v kyberprostoru, jejich možnostech a limitech.

Objev podobné jako CyberSecurity - kolektiv autorů, Jan Kolouch, Pavel Bašta

Digital Resilience, Cybersecurity and Supply Chains - Tarnveer Singh

In the digital era, the pace of technological advancement is unprecedented, and the interconnectivity of systems and processes has reached unprecedented levels. While this interconnectivity has brought about numerous benefits, it has also introduced new risks and vulnerabilities that can potentially disrupt operations, compromise data integrity, and threaten business continuity. In today''s rapidly evolving digital landscape, organisations must prioritise resilience to thrive. Digital resilience encompasses the ability to adapt, recover, and maintain operations in the face of cyber threats, operational disruptions, and supply chain challenges. As we navigate the complexities of the digital age, cultivating resilience is paramount to safeguarding our digital assets, ensuring business continuity, and fostering long-term success. Digital Resilience, Cybersecurity and Supply Chains considers the intricacies of digital resilience, its various facets, including cyber resilience, operational resilience, and supply chain resilience. Executives and business students need to understand the key challenges organisations face in building resilience and provide actionable strategies, tools, and technologies to enhance our digital resilience capabilities. This book examines real-world case studies of organisations that have successfully navigated the complexities of the digital age, providing inspiration for readersÂ’ own resilience journeys.

Objev podobné jako Digital Resilience, Cybersecurity and Supply Chains - Tarnveer Singh

Transforming Cybersecurity with Machine Learning - Kutub Thakur, Al-Sakib Khan Pathan

This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape

Objev podobné jako Transforming Cybersecurity with Machine Learning - Kutub Thakur, Al-Sakib Khan Pathan

I Am Brian Wilson - Brian Wilson

They say there are no second acts in American lives, and third acts are almost unheard of. That''s part of what makes Brian Wilson''s story so astonishing. As co-founder member of the Beach Boys in the 1960s, Wilson created some of the most ground-breaking and timeless popular music ever recorded. With intricate harmonies, symphonic structures, and wide-eyed lyrics that explored life''s most transcendent joys and deepest sorrows, songs like ''In My Room'', ''God Only Knows'' and''Good Vibrations'' forever expanded the possibilities of pop songwriting. Derailed in the 1970s by mental illness, drug use, and the shifting fortunes of the band, Wilson came back again and again over the next few decades, surviving and - finally - thriving. I Am Brian Wilson reveals as never before the man who fought his way back to stability and creative relevance, who became a mesmerizing live artist, who forced himself to reckon with his own complex legacy and completed Smile, the legendary unfinished Beach Boys record that had become synonymous with both his genius and its destabilization. Wilson''s story, told in his own voice and in his own way, unforgettably illuminates the man behind the music, working through the turbulence and discord to achieve, ... Unknown localization key: "more"

Objev podobné jako I Am Brian Wilson - Brian Wilson

Portrait of the Spy as a Young Man - Edward Wilson

A thrilling SOE spy novel by a former special forces officer who is 'poised to inherit the mantle of John le Carré' 'Edward Wilson seems poised to inherit the mantle of John le Carré' Irish Independent 'More George Smiley than James Bond, Catesby will delight those readers looking for less blood and more intelligence in their spy thrillers' Publishers Weekly Cambridge, 1941. A teenage William Catesby leaves his studies to join the war effort. Parachuted into Occupied France as an SOE officer, he witnesses remarkable feats of bravery during the French Resistance. Yet he is also privy to infighting and betrayal - some of the Maquisards are more concerned with controlling the peace than fighting the war. Double agents and informers abound, and with torture a certainty if he is taken, Catesby knows there is no one he can trust. Passed from safe house to safe house, with the Abwehr on his tail, he is drawn towards Lyon, a city of backstreets and blind alleys. His mission is simple: thwart an act of treachery that could shape the future of France. 'Edward Wilson's excellent Portrait of the Spy as a Young Man draws on his own special forces training' Independent ... Unknown localization key: "more"

Objev podobné jako Portrait of the Spy as a Young Man - Edward Wilson

WILSON JUNIOR RACKETBAG červená (97512545075)

Sportovní taška na Badminton, Squash a Tenis - hmotnost tašky 0,8 kg, k nošení přes rameno, k nošení v ruce Přemýšlíte nad tím, jak pohodlně přenášet všechno své sportovní vybavení? Tak pro vás bude ideální sportovní taška Wilson. Své věci v ní mohou přenášet i děti. Při vybírání té perfektní tašky se nesmí zapomínat na její rozměry, které v případě této tašky dělají 30,5 × 67,5 × 10 cm. Oceníte ji i v případě, že děláte badminton, squash a tenis. Červená a šedá barva tašky ještě vylepší váš sportovní outfit. Díky popruhům můžete tašku nosit jak v ruce, tak přes rameno. Sportovní taška Wilson se značí nízkou hmotností, tedy 0,8 kg. Horní madlo přispívá ke snadné manipulaci s taškou. K zavírání tašky slouží zip. Do výbavy sportovní tašky Wilson spadá popruhy na ramena a vnější kapsa. Nejdůležitější přednosti sportovní tašky WILSON JUNIOR RACKETBAG červená Sportovní taška Wilson se hodí pro přenášení vašeho sportovního vybavení Její hmotnost odpovídá 0,8 kg Je...

Objev podobné jako WILSON JUNIOR RACKETBAG červená (97512545075)