Notice: Undefined property: stdClass::$formattedPrice in /home/ebooks-gratuits/public_html/sources/getbingweb.php on line 166
Security -

Lancer votre recherche de document sur le web et trouver tous les livres correspondants

Top 20

20 Nouveautés


Résultats pour


(Temps écoulé : 2.9660)
Liens Sponsorislés

1 Code of Honor - Smartypants Romance
Auteur : Smartypants Romance
Genre : Thriller
A painting, a panic room, a thief, and her lover … whose job is to catch her. 

There are three things you need to know about Anna. 
1) She’s a bounty hunter with adrenaline junkie habits, 
2) She’s the “awkward” twin, and 
3) She’s a thief – kind of. 

Darius designs security systems for Cipher Security, and the strange and remarkable woman he met the night the painting was stolen is as intriguing a mystery as his hunt for the thief is. 

But the lady has no filter, and she knows she can’t lie to the man who looks like a Disney Prince and kisses like fairytales are true, so she runs from the one person who may actually see her as the heroine of her own story.

Code of Honor is book #2 in the Cipher Security series. It is a full-length romantic suspense novel, and can be read as a

2 Cloud Security Starter Kit – Overview - Jeff Vance
Auteur : Jeff Vance
Genre : Ordinateurs
Security continues to be the number one obstacle to cloud adoption. Yet, despite widespread security concerns, cloud computing is taking off. The question now is not “will my organization move to the cloud?” Rather, it is “when?” 
This is the first story of a series of stories where Cloudbook will explore how to get started with cloud security. What are the bare essentials? How do you merge traditional controls with advanced technologies like DLP (Data Loss Prevention) and risk scoring? How will you convince auditors that your cloud projects are as secure as your on-premise ones?


3 Rencontre explosive - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Victime d’un kidnapping en Colombie, Elektra Winthrop est une jeune femme pleine de caractère. Arrachée aux mains de ses ravisseurs par un commando d’anciens militaires, elle s’éprend du chef de l’équipe.Leur relation va s’avérer pour le moins tendue. Elle le trouve très arrogant. Il la considère comme une enfant gâtée.Après une nuit torride, elle croit l’avoir conquis. Mais au petit matin, il a disparu.

Sa réapparition six mois plus tard ne sera pas sans surprise.

7,99 €

4 Security for Linux on System z - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful. This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve. The base for a secure system is tightly related to the way the architecture and virtualization has been

5 Liens Sponsorislés

6 Making the Cloud Secure for Your Enterprise - Ellen Rubin
Auteur : Ellen Rubin
Genre : Informatique et Internet
Many companies would like to take advantage of cloud computing, but concerns about possible security breaches and loss of data hold them back. For cloud computing to gain traction in the enterprise, IT and security executives need to be certain that their company’s applications and data are safe. But when security is partly out of enterprise control, it becomes impossible to know if sensitive information has been accessed or compromised. 

This microbook provides insights into how to approach security in the cloud.


7 IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information an


8 L'envers du décor - Sean Black
Auteur : Sean Black
Genre : Roman noir

Tout juste de retour de leur mission d’infiltration dans la prison de Pelican Bay Supermax, au nord de la Californie, l’agent de protection rapprochée Ryan Lock et son associé Ty Johnson se retrouvent à Los Angeles pour assurer la sécurité d’une actrice d’Hollywood. La jeune femme craint en effet les représailles d’un petit ami violent, lui aussi star du grand écran, qui refuse d’accepter la fin de leur relation. Or comme Lock ne le sait que trop bien, et comme Ty va le découvrir, protéger quelqu’un envers et contre tout peut se révéler plus difficile qu’il n’y parait, et le danger peut surgir sous des formes auxquelles on ne s’attendait pas. 

Cette nouvelle, d’environ 15 000 mots, peut tout à fait être lue indépendamment des autres livres de la série Ryan Lock, de même que chacun des romans. Pour les lecteurs s

2,99 €

9 Escort girl - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Crystal Sherman, jeune étudiante en journalisme, arrondit sa bourse d'études en accompagnant de riches messieurs à des soirées. Lors de l'un de ces dîners, elle est témoin d'un meurtre perpétré par Randall Scott, Sénateur des Etats-Unis et candidat à la Maison Blanche ! En cavale pour échapper aux hommes de main du Sénateur, elle va bénéficier de l'aide de l'équipe de Greyson Security et tomber amoureuse du frère de sa colocataire qui travaille pour l'agence. Poursuites, enlèvements... sa petite vie tranquille tourne vite au cauchemar.

Jusqu’où est prêt à aller Scott pour s’assurer du silence de la jeune femme ?

7,99 €

10 The Forgotten - David Baldacci
Auteur : David Baldacci
Genre : Policier et suspense
The second title in David Baldacci's best-selling series, The Forgotten is a fast-paced action thriller, featuring the hero of Zero Day John Puller.

Criminal investigator John Puller is drawn closer to home when his aunt is found dead in her house in Paradise, Florida. The local police have ruled the death as an accident, but Puller finds evidence to suggest that she may well have been murdered.

On the surface the town lives up to its name, but as Puller digs deeper he realizes that this town and its inhabitants are more akin to Hell than Paradise. His belief is confirmed as evidence of strange and inexplicable events come to light. And when Puller learns the truth about what is happening in this once sleepy town, he knows that his discoveries will impact far wider than Paradise.

5,99 €

11 Network Intrusion Prevention Design Guide: Using IBM Security Network IPS - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization. The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By c


12 Introduction to Artificial Intelligence for Security Professionals - Cylance Data Science Team
Auteur : Cylance Data Science Team
Genre : Ordinateurs
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve you ability to thrive in a data driven world. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” And make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today.


13 Blogue-Out - Jean-Hugues Roy
Auteur : Jean-Hugues Roy
Genre : Politique et actualité
Il y a 10 ans, les artisans de l'information de Radio-Canada au Québec et à Moncton (Nouveau-Brunswick) étaient mis en lock-out pendant deux mois. Au jour le jour, un site web d'un genre encore nouveau pour 2002, a fait la chronique du conflit. Relire Blogue-out en 2012, c'est redécouvrir la précarité érigée en système, c'est se souvenir du sens de la solidarité, c'est replonger dans la complexité d'un conflit de travail, où tout n'est ni blanc, ni noir.


14 Un nouveau départ - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Katherine Greyson, la petite sœur de Charles, patron de Greyson Security, a toujours eu le chic pour se fourrer dans les ennuis.
Lorsque son petit ami Brandon conclut un marché avec le caïd de la pègre new yorkaise, Franco Di Baptista, afin de régler sa dette auprès de lui, elle s’enfuit et tente d’aller retrouver son frère.
Rattrapée en chemin par les sbires de Di Baptista, elle est vendue aux enchères à un richissime Prince arabe comme esclave sexuelle.
Enfermée dans son palais comme ses autres possessions féminines, elle tombe amoureuse de son geôlier.

Enfin délivrée par les hommes de son frère, elle se retrouve confrontée à un dilemme : oublier le Prince ou accepter de vivre avec lui.

7,99 €

15 The State of Risk-Based Security Management - Tripwire Inc
Auteur : Tripwire Inc
Genre : Réseau
Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of RBSM in the US. Discover the study’s key findings:

- Although organizations profess a strong commitment to RBSM, they’re taking little action

- Those organizations with a formal approach to RBSM tend to walk the talk

- Most organizations implement the appropriate preventive controls, but neglect to implement sufficient detective controls

- Position level of the respondent in the organization affects how threats rank on their "Security Fright Index"

- How perceptions of RBSM differ in the US, the UK, Germany and the Netherlands


16 Cyber Security - Jack Whitehill
Auteur : Jack Whitehill
Genre : Ordinateurs
In this ebook, you'll find helpful tips on internet security, norton internet security, how to secure your online business with internet security, what you need to know about etrust internet security suite and much more.


2,49 €

17 IoT Security - Madhusanka Liyanage, An Braeken, Pardeep kumar & Mika Ylianttila
Auteur : Madhusanka Liyanage, An Braeken, Pardeep kumar & Mika Ylianttila
Genre : Ingénierie
An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. 

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods fo

104,99 €

18 Maximum Security - Robert Muchamore
Auteur : Robert Muchamore
Genre : Policier et mystère
Over the years, CHERUB has put plenty of criminals behind bars. Now, for the first time ever, they've got to break one out ...

Under American law, kids convicted of serious crimes can be sentenced as adults. Two hundred and eighty of these child criminals live in the sunbaked desert prison of Arizona Max. In one of the most dangerous CHERUB missions ever, James Adams has to go undercover inside Arizona Max, befriend an inmate and then bust him out.

CHERUB kids are trained professionals, working in everyday situations. Their essential advantage: adults never suspect that children are spying on them.

For official purposes, these children do not exist.

5,49 €

19 The Family Upstairs - Lisa Jewell
Auteur : Lisa Jewell
Genre : Policier et suspense
'I swear I didn’t breathe the whole time I was reading it. Gripping, pacy, brilliantly twisty.’ CLARE MACKINTOSH

‘Creepy, intricate and utterly immersive: an excellent holiday read.' GUARDIAN

‘A twisty and engrossing story of betrayal and redemption.’ IAN RANKIN


In a large house in London’s fashionable Chelsea, a baby is awake in her cot. Well-fed and cared for, she is happily waiting for someone to pick her up.

In the kitchen lie three decomposing corpses. Close to them is a hastily scrawled note.

They’ve been dead for several days.

Who has been looking after the baby?

And where did they go?

Two entangled families.
8,49 €

20 The Girl Who Takes an Eye for an Eye - David Lagercrantz & George Goulding
Auteur : David Lagercrantz & George Goulding
Genre : Policier et suspense

Lisbeth Salander is an unstoppable force:

Sentenced to two months in Flodberga women's prison for saving a young boy's life by any means necessary, Salander refuses to say anything in her own defence. She has more important things on her mind.

Mikael Blomkvist makes the long trip to visit every week - and receives a lead to follow for his pains. For him, it looks to be an important expose for Millennium. For her, it could unlock the facts of her childhood.

Even from a corrupt prison system run largely by the inmates, Salander will stand up for what she believes in, whatever the cost. And she will seek the truth that is somehow connected with her childhood memory, of a woman with a blazing birthmark on her neck - that looked as if it had been burned by a dragon's fire . . . <

5,49 €

21 Rise and Kill First - Ronen Bergman
Auteur : Ronen Bergman
Genre : Moyen-Orient
NEW YORK TIMES BESTSELLER • The first definitive history of the Mossad, Shin Bet, and the IDF’s targeted killing programs, hailed by The New York Times as “an exceptional work, a humane book about an incendiary subject.”


NAMED ONE OF THE BEST BOOKS OF THE YEAR BY The Economist • The New York Times Book Review BBC History Magazine Mother Jones • Kirkus Reviews

The Talmud says: “If someone comes to kill you, rise up and kill him first.” This instinct to take every measure, even the most aggressive, to defend the Jewish people is hardwir

10,99 €

22 Permanent Record - Edward Snowden
Auteur : Edward Snowden
Genre : Biographies et mémoires

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway subu

8,99 €

23 IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security serv


24 The Start-up of You - Ben Casnocha & Reid Hoffman
Auteur : Ben Casnocha & Reid Hoffman
Genre : Carrière
From the co-founder and chairman of LinkedIn and author Ben Casnocha comes a revolutionary new book on how to apply the strategies of successful entrepreneurship to your career: in other words, how to run the 'start-up of you'.

In a world where wages are virtually stagnant, creative disruption is rocking every industry, global competition for jobs is fierce, and job security is a thing of the past, we're all on our own when it comes to our careers. In the face of such uncertainty, the key to success is to think and act like an entrepreneur: to be nimble and self-reliant, to be innovative, and to know how to network and stand out from the crowd. And this is precisely what Hoffman and Casnocha show you how to do in a book that is both inspirational and supremely practical.

Just as LinkedIn is the one online community that no professional can afford not to belong to

9,49 €

25 Security and Privacy For Microsoft® Office 2010 Users - Mitch Tulloch
Auteur : Mitch Tulloch
Genre : Ordinateurs
This title is also available as a free eBook.

Take control&mdash;and put the built-in security and privacy features in Microsoft Office to work! Whether downloading documents, publishing a presentation, or collaborating online&mdash;this guide offers concise, how-to guidance and best practices to help protect your documents and your ideas.

Get practical, proactive guidance for using the security and privacy management features in Office 2010 and Office 365Walk through everyday scenarios, and discover everyday techniques that help you take charge Understand common risks and learn best practices you can apply right away


26 The Sixth Man - David Baldacci
Auteur : David Baldacci
Genre : Policier et suspense
The fifth book in the heart-stopping King and Maxwell series, The Sixth Man by David Baldacci will keep pulses racing as Sean King and Michelle Maxwell face their greatest challenge yet.

When alleged serial killer Edgar Roy is locked away in Cutter's Rock psychiatric unit, private investigators Sean King and Michelle Maxwell are called in by Roy's lawyer, Ted Bergin, to examine the case further. But the investigation is derailed before it begins when Bergin is found murdered in his car on the highway.

A sinister trail of terrifying events begins to unfold as King and Maxwell attempt to determine Roy's guilt or innocence. When the FBI becomes involved, it fast becomes apparent that there's much more to this case than meets the eye. As they dig deeper into Roy's past and learn about his phenomenal ability, they are bombarded with obstacles, half-truths, and de

5,99 €

27 The Girl Who Kicked the Hornets' Nest - Stieg Larsson
Auteur : Stieg Larsson
Genre : Policier et suspense
The third book in the Millennium series featuring Lisbeth Salander - the global publishing phenomenon

Salander is plotting her revenge - against the man who tried to kill her, and against the government institutions that very nearly destroyed her life. But it is not going to be a straightforward campaign. After taking a bullet to the head, Salander is under close supervision in Intensive Care, and is set to face trial for three murders and one attempted murder on her eventual release.

With the help of journalist Mikael Blomkvist and his researchers at Millennium magazine, Salander must not only prove her innocence, but identify and denounce the corrupt politicians that have allowed the vulnerable to become victims of abuse and violence. Once a victim herself, Salander is now ready to fight back.

Stieg Lar

5,99 €

28 IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalabl


29 Sago Palm - Hiroshi Ehara, Yukio Toyoda & Dennis V. Johnson
Auteur : Hiroshi Ehara, Yukio Toyoda & Dennis V. Johnson
Genre : Agriculture
This book is open access under a CC BY 4.0 license.

This book addresses a wide variety of events and technologies concerning the sago palm, ranging from its botanical characteristics, culture and use to social conditions in the places where it is grown, in order to provide a record of research findings and to benefit society. It discusses various subjects, including the sago palm and related species; differentiation of species of starch-producing palm; habitat, morphological, physiological and growth characteristics; culture and management; productivity of carbon dioxide; starch extraction and manufacture; characteristics and utilization of starch; and cultural anthropological and folkloristic aspects.

Problems such as food shortages due to increasing populations, global warming and climate change, and decr


30 The Rust Programming Language (Covers Rust 2018) - Steve Klabnik & Carol Nichols
Auteur : Steve Klabnik & Carol Nichols
Genre : Logiciels
The official book on the Rust programming language, written by the Rust development team at the Mozilla Foundation, fully updated for Rust 2018.

The Rust Programming Language is the official, definitive guide to Rust, a hugely popular, community-supported programming language. This is the second edition of the improved version of the free online Rust book, so well-loved in the Rust community that it is simply referred to as "the Book".
Programmers love Rust because it allows them to write powerful code efficiently, without the risk of crashes and errors common in languages like C and C++. This book will show readers how to use Rust's robust type system to keep programs memory-safe and speedy, and make the most of the Cargo package manager that brings the pieces of a program together. The reader will learn all about Rust's ownership rules, which lie

22,99 €

31 King and Maxwell - David Baldacci
Auteur : David Baldacci
Genre : Policier et suspense
Former Secret Service Agents turned private investigators, Sean King and Michelle Maxwell, return in their most surprising, personal and dangerous case to date. King and Maxwell is the explosive finale to David Baldacci's phenomenal series.

King and Maxwell encounter teenager Tyler Wingo when he has just received the tragic news that his soldier father has been killed in Afghanistan. But then Tyler receives an email from his father . . . after his supposed death.

Sean and Michelle are hired to solve the mystery, and their investigation leads to deeper, even more troubling questions. Could Tyler's father really still be alive? Was his mission all that it seemed? Has Tyler's life been a lie, and could he be the next target?

It's clear that King and Maxwell have stumbled upon something even more sinister when those in power seem intent o

4,99 €

32 iPhone Security for Everyone - Oliver Ng
Auteur : Oliver Ng
Genre : Ouvrages de référence
This guide is filled with some awesome videos demonstrating how to set up some basic security settings on your iPhone in the terrible case that you lose your device.  It's never a fun situation, but there are steps you can take to keep your data better protected.

Imagine all those photos, videos and apps that the one who finds your iPhone will get to play with!  Nobody wants a stranger playing around with their phone.

Enjoy some easy to use tips to keeping your iPhone data safe from curious hands.


33 Blockchain Revolution - Don Tapscott & Alex Tapscott
Auteur : Don Tapscott & Alex Tapscott
Genre : Secteurs et professions

'Blockchain Revolution is a highly readable introduction to a bamboozling but increasingly important field' - Guardian

Blockchain is the ingeniously simple technology that powers Bitcoin. But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.

In Blockchain Revolution, Don and Alex Tapscott reveal:

· how this game-changing technology will shape the future of the world economy
· how it will improve everything from hea

9,49 €

34 Linux Server Security - Chris Binnie
Auteur : Chris Binnie
Genre : Réseau
Learn how to attack and defend the world’s most popular web server platform

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.

The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker’s tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your s

38,99 €

35 Attacking Network Protocols - James Forshaw
Auteur : James Forshaw
Genre : Ordinateurs
Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities.

You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. 

Learn how to:
- Capture, manipulate, and replay packets
- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol
- Discover and exploit

27,99 €

36 Building the Infrastructure for Cloud Security - Raghuram Yeluri & Enrique Castro-Leon
Auteur : Raghuram Yeluri & Enrique Castro-Leon
Genre : Ordinateurs
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical
applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:
Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, e


37 Ghost Fleet - P. W. Singer & August Cole
Auteur : P. W. Singer & August Cole
Genre : Policier et suspense
"A novel that reads like science fiction but bristles with rich detail about how the next World War could be fought." —Vice

“A modern-day successor to tomes such as The Hunt for Red October from the late Tom Clancy.” –USA Today
What Will World War III Look Like?
Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbor; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilize for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book—no m

8,49 €

38 Security Vs. Convenience - Michael Reeves
Auteur : Michael Reeves
Genre : Ordinateurs
The inter workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these book help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical manager, computer security novices, and systems administrators looking to broaden their knowledge.

Security vs. Convenience tackles the ever prominent balance between securing a network and its information and the business needs for which the network exists.


39 Attraction colombienne - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
À la minute où il apprend que Daniel Gray ex-employé et traitre a quitté son paradis pour la Colombie, Charles Greyson lance une opération destinée à aller le récupérer.

Devenu chef de la sécurité d’un homme richissime et sans scrupules, Gray n’a pas l’intention de se laisser ramener aux Etats-Unis. Cette mission pas sans danger va bouleverser la vie de Greyson. Sa rencontre avec une belle Colombienne va mettre à mal ses convictions de célibataire endurci.

Exposée à la vengeance de son patron, la jeune femme va devoir faire un choix. Mourir ou quitter son pays.
L’attirance qu’elle éprouve pour cet Américain sûr de lui sera-t-elle une raison suffisante pour tout abandonner ?

7,99 €

40 Munich - Robert Harris
Auteur : Robert Harris
Genre : Histoire
Now available: THE SECOND SLEEP, Robert Harris's latest novel

Hitler is determined to start a war. Chamberlain is desperate to preserve the peace.

They will meet in a city which forever afterwards will be notorious for what is about to take place.

As Chamberlain’s plane judders over the channel and the Fuhrer’s train steams south, two young men travel with their leaders. Former friends from a more peaceful time, they are now on opposing sides.

As Britain’s darkest hour approaches, the fate of millions could depend on them - and the secrets they’re hiding.

Spying. Betrayal. Murder. Is any price too high for peace?

‘A brilliantly constructed spy novel’ Observer

‘Grips from start to finish … Superb’ Mail on S

8,49 €

41 Beginner's Guide to Information Security - Limor Elbaz
Auteur : Limor Elbaz
Genre : Ordinateurs
The Beginner’s Guide to Information Security offers insight and resources to help readers embark on a career in one of the 21st century’s most important—and potentially lucrative—fields. Maybe you want to move into information security from IT, say, from a developer or system administrator role. Or maybe you just graduated with your bachelor’s or master’s degree. Whatever your education or prior experience, this book can offer you a great start, with advice from real people who are working in the InfoSec field. 
It starts off with some chapters that cover ways to learn about information security, maybe pick up a certification or two, find out about job opportunities, and then, hopefully, snag a job. The Beginner’s Guide also delves deeper into InfoSec topics, helping readers master key skills like knowing how to protect a network, respond to a security i


42 Destined for War - Graham Allison
Auteur : Graham Allison
Genre : Science politique
“Allison is one of the keenest observers of international affairs around.”— JOE BIDEN, former vice president of the United States
China and the United States are heading toward a war neither wants. The reason is Thucydides’s Trap: when a rising power threatens to displace a ruling one, violence is the likeliest result. Over the past five hundred years, these conditions have occurred sixteen times; war broke out in twelve. Today, as an unstoppable China approaches an immovable America, and both Xi Jinping and Donald Trump promise to make their countries “great again,” the seventeenth case looks grim. A trade conflict, cyberattack, Korean c

8,49 €

43 Macroeconomics, Agriculture, and Food Security - Eugenio Díaz-Bonilla
Auteur : Eugenio Díaz-Bonilla
Genre : Économie
Why write a book on macroeconomic policies and their links to agriculture and food security in developing countries? The food price spikes of the years just prior to 2010 and the economic, political, and social dislocations they generated refocused the attention of policymakers and development practitioners on the agricultural sector and food security concerns. But even without those traumatic events, the importance of agriculture for developing countries—and for an adequate functioning of the world economy— cannot be denied. First, although declining over time, primary agriculture still represents important percentages of developing countries’ overall domestic production, exports, and employment. If agroindustrial, transportation, commercial, and other related activities are also counted, then the economic and social importance of agriculture-based sectors increases significantly.


44 Accidental Heroes - Danielle Steel
Auteur : Danielle Steel
Genre : Policier et suspense
Accidental Heroes is a heart-stopping thriller about ordinary men and women who embark on a journey they will never forget.

On a beautiful May morning at New York’s JFK Airport, a routine plane departs for San Francisco. Security agent Bernice Adams finds a postcard of the Golden Gate Bridge bearing an ambiguous message. Who left the postcard behind, which flight is that person on, and what exactly does the message mean? Her supervisor dismisses her concerns but she is compelled to contact Homeland Security.

As the flight takes off each of the passengers is looking forward to reaching San Francisco, whether it’s for a family reunion, a wedding, or a new way of life. But as it emerges, there’s someone on the flight planning something terrible and these strangers’ lives entwine as they come together to help to avert a tragedy at the

5,99 €

45 Enterprise Security Architecture Using IBM Tivoli Security Solutions - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges. This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Ti


46 Lowborn - Kerry Hudson
Auteur : Kerry Hudson
Genre : Biographies et mémoires
A powerful, personal agenda-changing exploration of poverty in today’s Britain.

‘One of the most important books of the year’ Guardian

'When every day of your life you have been told you have nothing of value to offer, that you are worth nothing to society, can you ever escape that sense of being ‘lowborn’ no matter how far you’ve come?’

Kerry Hudson is proudly working class but she was never proudly poor. The poverty she grew up in was all-encompassing, grinding and often dehumanising. Always on the move with her single mother, Kerry attended nine primary schools and five secondaries, living in B&Bs and council flats. She scores eight out of ten on the Adverse Childhood Experiences measure of childhood trauma.

Twenty years later, Kerry’s life is unrecognisable. She’s a prizewinning novelist who

11,99 €

47 House of Spies - Daniel Silva
Auteur : Daniel Silva
Genre : Policier et suspense
A Kirkus Best Book of the Year

#1 NYT Bestseller

#1 USA Bestseller

#1 WSJ Bestseller

From the #1 New York Times bestselling author of The Black Widow comes the thrilling new summer blockbuster featuring legendary spy, assassin and art restorer Gabriel Allon.

A heart-stopping tale of suspense, Daniel Silva’s runaway bestseller, The Black Widow, was one of 2016’s biggest novels. Now, in House of Spies, Gabriel Allon is back and out for revenge – determined to hunt down the world’s most dangerous terrorist, a shadowy ISIS mastermind known only as Saladin.  

Four months after the deadliest attack on the American homeland since 9/11, terrorists leave a trail of carnage through London’s glittering West End. The attack is a brilliant feat of

6,49 €

48 Kickstart Security: macOS Mojave - Austin Lasota
Auteur : Austin Lasota
Genre : Administration des systèmes
Kickstart Security: macOS Mojave, covers generalized topics regarding the security of Macs in a touch and go fashion. The foundations are set, and relevant bricks laid out to build up your knowledge. The Kickstart Security series values brevity, focusing on the info you need to start securing Macs as fast as possible.


49 The Other Woman - Daniel Silva
Auteur : Daniel Silva
Genre : Policier et suspense
#1 New York Times Bestseller

#1 USA Today  Bestseller

#1 Wall Street Journal Bestseller

A Kirkus Best Book of 2018

A Real Book Spy Best Thriller of 2018

From Daniel Silva, the #1 New York Times–bestselling author, comes a modern masterpiece of espionage, love, and betrayal

She was his best-kept secret …

In an isolated village in the mountains of Andalusia, a mysterious Frenchwoman begins work on a dangerous memoir. It is the story of a man she once loved in the Beirut of old, and a child taken from her in treason’s name. The woman is the keeper of the Kremlin’s most closely guarded secret. Long ago, the KGB inserted a mole into the heart of the West—a mole who stands on the doorstep of ultimate power.

Only one man can unravel the conspiracy: Gabriel Allon, the legendary

8,99 €

50 Cloud Security Standards Standard Requirements - Gerardus Blokdyk
Auteur : Gerardus Blokdyk
Genre : Entreprise et management
What is the best design framework for Cloud Security Standards organization now that, in a post industrial-age if the top-down, command and control model is no longer relevant? Are there any constraints known that bear on the ability to perform Cloud Security Standards work? How is the team addressing them? How do you improve Cloud Security Standards service perception, and satisfaction? Are assumptions made in Cloud Security Standards stated explicitly? Who will be responsible for making the decisions to include or exclude requested changes once Cloud Security Standards is underway?

This easy Cloud Security Standards self-assessment will make you the established Cloud Security Standards domain auditor by revealing just what you need to know to be fluent and ready for any Cloud Security Standards challenge.

How do I reduce the effort in the Cloud Security

62,99 €
Suggestions Relatives :