Die verschiedenen Kapitel berücksichtigen alle Aspekte,
Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security iss
Anybody can start building simple apps for the Android platform, and this book will show you how! Recently updated to include Android Jelly Bean, Android Apps for Absolute Beginners, Second Edition takes you through the process of getting your first Android apps up and running using plain English and practical examples.
This book cuts through the fog of jargon and mystery that surrounds Android apps development, and gives you simple, step-by-step instructions to ge
Nach der Einführung in die Komponenten eines Icinga-Umgebung, den wichtigsten Begriffen, der Installation und der Bedienoberfläche Icinga Web 2 folgt sogleich der Praktische Einstieg in die Überwachung mit Icinga. Anhand ei
Every system designer knows that securing the electronic commerce ecosystem is a nightmare. Each of us puts vital business and personal information at risk every time we use a computer network to make a bank transaction, pay a bill, buy something, or communicate online.
In this book, security experts Hadi Nahari and Ron Krutz provide real security solutions. They show how to analyze an
Introduction xxvii
Part I Understanding the Digital Transformation Challenges 1
Chapter 1 The Digital Economy’s Challenges, Opportunities, and Relevance of AWS 3
Understanding the Digital Economy’s Impacts 4
Surviving Disruptions Are Your Business’s Primary Challenge 4
Understanding the Digital Economy’s Opportunities 4
Surviving the Disruptions: The AWS Solutions 5
The AWS Universal Architecture: Simplifying AWS Understanding 5<
Avoid becoming the next ransomware victim by taking practical steps today
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day.
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT
Con un linguaggio funzionale e scevro da tecnicismi, questa guida ti accompagnerà lungo le fasi principali di un progetto ISO 27001 per garantirne il successo – dalla fase iniziale fino alla certificazione finale:
AN ENTERTAINING AND ENGAGING WALKTHROUGH OF AMAZON WEB SERVICES’ CLOUD OFFERINGS
In The Illustrated AWS Cloud: A Guide to Help You on Your Cloud Practitioner Journey, a team of veteran tech educators and artists delivers a vivid and visual guide to Amazon Web Services (AWS) cloud concepts. The authors focus on the roles and responsibilities of AWS cloud practitioners, walking readers through the choice of the best AWS services for individual and specific use cases.
You’ll
Chapter 1: Cloud Foundations.- Chapter 2: Why Cloud.- Chapter 3: The Genealogy of Cloud Computing.- Chapter 4: IBM.- Chapter 5: Oracle .- Chapter 6: Microsoft.- Chapter 7: Amazon.- Chapter 8: Google.- Chapter 9: Cloud Vendor Profiles.- Chapter 10: Cloud Technology.- Chapter 11: Securing the Cloud.- Chapter 12: Cloud Economy.- Chapter 13: Working with the Cloud.- Chapter 14: Adopting the Cloud.-
The #1 beginning guide to networking
Learn how to set up a secure network with this bestselling guide, fully updated to cover Windows 10 and Windows Server 2019. Both beginning and experienced network administrators can use the step-by-step instruct
Introduction xi
1 Artificial Social Intelligence 1
2 Social Engineering and Psychological Exploitation 19
3 A History of Technology and Social Engineering 53
4 A History of Language Modeling 83
5 Consciousness, Sentience, and Understanding 127
6 The Imitation Game 151
7 Weaponizing Social Intelligence 175
8 Weaponizing Technical Intelligence 215
9 Multimodal Manipulation 239
10 The Future 257
11 The Quest for Resolut
Bedrohungen von Unternehmen durc
Das Praxisbuch erläutert anschaulich anhand konkreter Fälle, wie Analogien für die Prognose und Erhöhung der Akzeptanz neuer Produkte und Projekte genutzt werden können. Der Leser erhält eine „Schritt für Schritt Anleitung“ zur Methodenanwendung mit zahlreichen Hinweisen und Best-Practice Beispielen.
Die Autoren erläutern allgemein verständlich die Teilschritte der Methode: Zunächst werden die kritischen Phänomene identifiziert. Analogieschlüsse ausgewählter Vergleichsfälle werden auf d
If your company does business on the Internet, your risks are growing exponentially. Worms, viruses, cracker attacks, mechanical failures, and natural disasters create a climate that compromises performance as well as security. Traditional solutions are too limited to address these risks. You need a strategy designed for today, and this book will help you build one.
Walking through example applications, you will learn the vocabulary necessary to solve real-world problems and how to present your content on the televi
Introduction xix
Chapter 1 Introduction to Networking 1
Comparing Logical and Physical Networks 1
Networking Home Computers 2
Networking Small Offices and Home Offices 4
Understanding Local Area Networks 6
Comparing Workgroups and Domains 7
Exploring the Benefits of Domains and Domain Controllers 9
Networking Large Off
Become a Certified Cloud Security Professional
The CCSP® certification is one of the most sought-after credentials in IT security. It’s also tough to achieve. This trusted resource gives you detailed, easy-to-follow explanations of each of the six knowledge domains you’ll encounter on the CCSP exam. In classic Dummies fashion, this book is chock full of tips and hacks for succeeding on the exam. Plus, you’ll get two practice tests and 100+ flashcards online, so you can sa