Lancer votre recherche de document sur le web et trouver tous les livres correspondants

Top 20

20 Nouveautés


Résultats pour


(Temps écoulé : 0.7805)
Liens Sponsorislés

1 Introduction to Artificial Intelligence for Security Professionals - Cylance Data Science Team
Auteur : Cylance Data Science Team
Genre : Ordinateurs
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve you ability to thrive in a data driven world. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” And make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today.

2 Cloud Security Starter Kit – Overview - Jeff Vance
Auteur : Jeff Vance
Genre : Ordinateurs
Security continues to be the number one obstacle to cloud adoption. Yet, despite widespread security concerns, cloud computing is taking off. The question now is not “will my organization move to the cloud?” Rather, it is “when?” 
This is the first story of a series of stories where Cloudbook will explore how to get started with cloud security. What are the bare essentials? How do you merge traditional controls with advanced technologies like DLP (Data Loss Prevention) and risk scoring? How will you convince auditors that your cloud projects are as secure as your on-premise ones?
3 Liens Sponsorislés

4 Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges. In this IBM Redbooks® publication, we provide IT security professionals wi

5 Security for Linux on System z - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful. This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve. The base for a secure system is tightly related to the way the architecture and virtualization has been

6 Continuous Security Monitoring for DevOps - UpGuard Inc
Auteur : UpGuard Inc
Genre : Management et direction
Fending off cyber attacks and maintaining security may be business as usual for enterprise IT, but vigilant organizations in recent years have been boosting their security measures in response to both increasing cyber crime and heightened control requirements from regulatory bodies.

7 Making the Cloud Secure for Your Enterprise - Ellen Rubin
Auteur : Ellen Rubin
Genre : Informatique et Internet
Many companies would like to take advantage of cloud computing, but concerns about possible security breaches and loss of data hold them back. For cloud computing to gain traction in the enterprise, IT and security executives need to be certain that their company’s applications and data are safe. But when security is partly out of enterprise control, it becomes impossible to know if sensitive information has been accessed or compromised. 

This microbook provides insights into how to approach security in the cloud.

8 Rencontre explosive - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Victime d’un kidnapping en Colombie, Elektra Winthrop est une jeune femme pleine de caractère. Arrachée aux mains de ses ravisseurs par un commando d’anciens militaires, elle s’éprend du chef de l’équipe.Leur relation va s’avérer pour le moins tendue. Elle le trouve très arrogant. Il la considère comme une enfant gâtée.Après une nuit torride, elle croit l’avoir conquis. Mais au petit matin, il a disparu.

Sa réapparition six mois plus tard ne sera pas sans surprise.

9 Blogue-Out - Jean-Hugues Roy
Auteur : Jean-Hugues Roy
Genre : Politique et actualité
Il y a 10 ans, les artisans de l'information de Radio-Canada au Québec et à Moncton (Nouveau-Brunswick) étaient mis en lock-out pendant deux mois. Au jour le jour, un site web d'un genre encore nouveau pour 2002, a fait la chronique du conflit. Relire Blogue-out en 2012, c'est redécouvrir la précarité érigée en système, c'est se souvenir du sens de la solidarité, c'est replonger dans la complexité d'un conflit de travail, où tout n'est ni blanc, ni noir.

10 Network Intrusion Prevention Design Guide: Using IBM Security Network IPS - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization. The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By c

11 Long Lost - Harlan Coben
Auteur : Harlan Coben
Genre : Policier et suspense
A woman from the past brings a whole lot of trouble... A brilliant Myron Bolitar novel from the SUNDAY TIMES bestselling author of SIX YEARS.

Myron is summoned to Paris at the behest of an old lover, Terese. She is in unspecified trouble and needs his help. When he gets there, he discovers that her husband has been murdered and she is the main suspect. The interesting thing is that more than one blood-type has been discovered at the scene - and the other blood can only be attributed to her daughter. But she died 10 years before.

As Myron and Terese try to find out exactly what's going on, they uncover more and more questions. Did the daughter really die? Did Terese's husband have a further child with someone else?

But the truth is something no one expected...

12 Bodyguards: How to Protect Others - Security Planning - Michael J. Franklin
Auteur : Michael J. Franklin
Genre : Éducation
This book combines Parts 2.1, 2.2 and 2.3. The topics go into great detail and address the topics of professional conduct, etiquette, manners, verbal and written communication skills, the advanced planning requirements, the different kinds of threats bodyguards are exposed to. It teaches the reader how to complete threat profiling, threat analysis, understanding threat, and the threat modelling processes that all professional bodyguard’s need know and understand to be effective.

Security Advance Planning (SAP) is about 90 percent of what bodyguards do. This book covers in comprehensive detail the advanced planning requirements that most bodyguards are regularly expected to do in the course of their duties.

It’s designed to help bodyguards, security personnel and others who work with or manage bodyguards to better understand the threat profiling, threat analysis,

13 Maximum Security - Robert Muchamore
Auteur : Robert Muchamore
Genre : Policier et mystère
Over the years, CHERUB has put plenty of criminals behind bars. Now, for the first time ever, they've got to break one out ...

Under American law, kids convicted of serious crimes can be sentenced as adults. Two hundred and eighty of these child criminals live in the sunbaked desert prison of Arizona Max. In one of the most dangerous CHERUB missions ever, James Adams has to go undercover inside Arizona Max, befriend an inmate and then bust him out.

CHERUB kids are trained professionals, working in everyday situations. Their essential advantage: adults never suspect that children are spying on them.

For official purposes, these children do not exist.

14 Then She Was Gone - Lisa Jewell
Auteur : Lisa Jewell
Genre : Policier et suspense

OVER 1,000 5* REVIEWS – this is why readers love this book:

'Grips to the point of OBSESSION'

'My life STOPPED while I read this book'

'My heart was THUMPING in my chest'

'This is EDGE OF YOUR SEAT reading'

'This book left me BREATHLESS'

'Cancel all plans and BUY THIS BOOK'


She was fifteen, her mother's golden girl.
She had her whole life ahead of her.
And then, in the blink of an eye, Ellie was gone.

Ten years on, Laurel has never given up hope of finding Ellie. And then she meets a charming and charismatic stranger who sweeps her off her feet.

But what reall

15 Escort girl - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Crystal Sherman, jeune étudiante en journalisme, arrondit sa bourse d'études en accompagnant de riches messieurs à des soirées. Lors de l'un de ces dîners, elle est témoin d'un meurtre perpétré par Randall Scott, Sénateur des Etats-Unis et candidat à la Maison Blanche ! En cavale pour échapper aux hommes de main du Sénateur, elle va bénéficier de l'aide de l'équipe de Greyson Security et tomber amoureuse du frère de sa colocataire qui travaille pour l'agence. Poursuites, enlèvements... sa petite vie tranquille tourne vite au cauchemar.

Jusqu’où est prêt à aller Scott pour s’assurer du silence de la jeune femme ?

16 The Girl Who Takes an Eye for an Eye - David Lagercrantz & George Goulding
Auteur : David Lagercrantz & George Goulding
Genre : Policier et suspense

Lisbeth Salander is an unstoppable force:

Sentenced to two months in Flodberga women's prison for saving a young boy's life by any means necessary, Salander refuses to say anything in her own defence. She has more important things on her mind.

Mikael Blomkvist makes the long trip to visit every week - and receives a lead to follow for his pains. For him, it looks to be an important expose for Millennium. For her, it could unlock the facts of her childhood.

Even from a corrupt prison system run largely by the inmates, Salander will stand up for what she believes in, whatever the cost. And she will seek the truth that is somehow connected with her childhood memory, of a woman with a blazing birthmark on her neck - that looked as if it had been burned by a dragon's fire . . . <

17 Cyber Security - Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li & Yu Zhou
Auteur : Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li & Yu Zhou
Genre : Ordinateurs
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security.

18 Digital Fortress - Dan Brown
Auteur : Dan Brown
Genre : Policier et suspense


When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls in its head cryptographer, Susan Fletcher, a brilliant, beautiful mathematician. What she uncovers sends shock waves through the corridors of power. The NSA is being held hostage - not by guns or bombs, but by a code so complex that if released would cripple U.S. intelligence.

Caught in an accelerating tempest of secrecy and lies, Fletcher battles to save the agency she believes in. Betrayed on all sides, she finds herself fighting not only for her country but for her life, and in the end, for the life of the man she loves..

19 Un nouveau départ - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Katherine Greyson, la petite sœur de Charles, patron de Greyson Security, a toujours eu le chic pour se fourrer dans les ennuis.
Lorsque son petit ami Brandon conclut un marché avec le caïd de la pègre new yorkaise, Franco Di Baptista, afin de régler sa dette auprès de lui, elle s’enfuit et tente d’aller retrouver son frère.
Rattrapée en chemin par les sbires de Di Baptista, elle est vendue aux enchères à un richissime Prince arabe comme esclave sexuelle.
Enfermée dans son palais comme ses autres possessions féminines, elle tombe amoureuse de son geôlier.

Enfin délivrée par les hommes de son frère, elle se retrouve confrontée à un dilemme : oublier le Prince ou accepter de vivre avec lui.

20 The Forgotten - David Baldacci
Auteur : David Baldacci
Genre : Policier et suspense
The second title in David Baldacci's best-selling series, The Forgotten is a fast-paced action thriller, featuring the hero of Zero Day John Puller.

Criminal investigator John Puller is drawn closer to home when his aunt is found dead in her house in Paradise, Florida. The local police have ruled the death as an accident, but Puller finds evidence to suggest that she may well have been murdered.

On the surface the town lives up to its name, but as Puller digs deeper he realizes that this town and its inhabitants are more akin to Hell than Paradise. His belief is confirmed as evidence of strange and inexplicable events come to light. And when Puller learns the truth about what is happening in this once sleepy town, he knows that his discoveries will impact far wider than Paradise.

21 Permanent Record - Edward Snowden
Auteur : Edward Snowden
Genre : Biographies et mémoires

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway subu

22 IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security serv

23 The Start-up of You - Ben Casnocha & Reid Hoffman
Auteur : Ben Casnocha & Reid Hoffman
Genre : Éducation
From the co-founder and chairman of LinkedIn and author Ben Casnocha comes a revolutionary new book on how to apply the strategies of successful entrepreneurship to your career: in other words, how to run the 'start-up of you'.

In a world where wages are virtually stagnant, creative disruption is rocking every industry, global competition for jobs is fierce, and job security is a thing of the past, we're all on our own when it comes to our careers. In the face of such uncertainty, the key to success is to think and act like an entrepreneur: to be nimble and self-reliant, to be innovative, and to know how to network and stand out from the crowd. And this is precisely what Hoffman and Casnocha show you how to do in a book that is both inspirational and supremely practical.

Just as LinkedIn is the one online community that no professional can afford not to belong to

24 Pitch Black - Elise Noble
Auteur : Elise Noble
Genre : Thriller
Even a Diamond can be shattered…

After the owner of a security company is murdered, his sharp-edged wife goes on the run. Forced to abandon everything she holds dear—her home, her friends, her job in special ops—she builds a new life for herself in England. As Ashlyn Hale, she meets Luke, a handsome local who makes her realise just how lonely she is.

Yet, even in the sleepy village of Lower Foxford, the dark side of life dogs Diamond’s trail when the unthinkable strikes. Forced out of hiding, she races against time to save those she cares about. But is it too little, too late? 

Diamond isn’t polite. She’s got a filthy mouth to go with her dirty mind, and she doesn’t hold back. If you like your books a little milder, you may prefer the clean version of Pitch Black (no on-the-page sex and no swearing). Although one story arc

25 The Clash of Civilizations and the Remaking of World Order - Samuel P. Huntington
Auteur : Samuel P. Huntington
Genre : Politique étrangère et relations internationales
The classic study of post-Cold War international relations, more relevant than ever in the post-9/11 world, with a new foreword by Zbigniew Brzezinski.

Since its initial publication, The Clash of Civilizations and the Remaking of World Order has become a classic work of international relations and one of the most influential books ever written about foreign affairs. An insightful and powerful analysis of the forces driving global politics, it is as indispensable to our understanding of American foreign policy today as the day it was published. As former National Security Adviser Zbigniew Brzezinski says in his new foreword to the book, it “has earned a place on the shelf of only about a dozen or so truly enduring works that provide the quintessential insights necessary for a broad understanding of world affairs in our time.”

Samuel Huntington explains ho

26 Africa and the Mediterranean - Andrea Dessì, Dario Cristiani, Wolfgang Mühlberger & Giorgio Musso
Auteur : Andrea Dessì, Dario Cristiani, Wolfgang Mühlberger & Giorgio Musso
Genre : Politique et actualité
This study takes stock of the current security dynamics across the Southern Mediterranean and African Sahel since the advent of the Arab uprisings. In so doing, it widens the scope of analysis from a purely North African focus to a more in-depth understanding of the profound links connecting the Mediterranean, Africa, and the wider Arab world. By focusing on three specific components — the African Sahel region, post-Gaddafi Libya, and Egypt’s African policy under the Muslim Brotherhood — the study sheds light on the deeply intertwined nature of the security threats that have arisen across this area and the impossibility of decoupling events occurring in the Maghreb from those taking place further south in the African Sahel region.

27 The Girl Who Kicked the Hornets' Nest - Stieg Larsson
Auteur : Stieg Larsson
Genre : Policier et suspense
Lisbeth Salander returns to take her revenge in the most explosive novel of the series - 100 million copies of the Girl With the Dragon Tattoo series sold worldwide

"Complex, satisfying, clever, moral . . . a grown-up novel for grown-up readers . . . Rightly a publishing phenomenon all over the world" Kate Mosse

Salander is plotting her revenge - against the man who tried to kill her, and against the government institutions that very nearly destroyed her life. But it is not going to be a straightforward campaign. After taking a bullet to the head, Salander is under close supervision in Intensive Care, and is set to face trial for three murders and one attempted murder on her eventual release.

With the help of journalist Mikael Blomkvist and his researchers at Millennium magazine, Salander

28 A Practical Guide to TPM 2.0 - Will Arthur & David Challener
Auteur : Will Arthur & David Challener
Genre : Ordinateurs
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code.

The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The auth

29 The Girl Who Played with Fire - Stieg Larsson
Auteur : Stieg Larsson
Genre : Policier et suspense
Lisbeth Salander is a wanted woman. Two Millennium journalists about to expose the truth about sex trafficking in Sweden are murdered, and Salander's prints are on the weapon. Her history of unpredictable and vengeful behaviour makes her an official danger to society - but no-one can find her.

Mikael Blomkvist, editor-in-chief of Millennium, does not believe the police. Using all his magazine staff and resources to prove Salander's innocence, Blomkvist also uncovers her terrible past, spent in criminally corrupt institutions. Yet Salander is more avenging angel than helpless victim. She may be an expert at staying out of sight - but she has ways of tracking down her most elusive enemies.

30 The Family Upstairs - Lisa Jewell
Auteur : Lisa Jewell
Genre : Policier et suspense
'I swear I didn’t breathe the whole time I was reading it. Gripping, pacy, brilliantly twisty.’ CLARE MACKINTOSH

‘Creepy, intricate and utterly immersive: an excellent holiday read.' GUARDIAN

‘A twisty and engrossing story of betrayal and redemption.’ IAN RANKIN


In a large house in London’s fashionable Chelsea, a baby is awake in her cot. Well-fed and cared for, she is happily waiting for someone to pick her up.

In the kitchen lie three decomposing corpses. Close to them is a hastily scrawled note.

They’ve been dead for several days.

Who has been looking after the baby?

And where did they go?

Two entangled families.

31 iPhone Security for Everyone - Oliver Ng
Auteur : Oliver Ng
Genre : Ouvrages de référence
This guide is filled with some awesome videos demonstrating how to set up some basic security settings on your iPhone in the terrible case that you lose your device.  It's never a fun situation, but there are steps you can take to keep your data better protected.

Imagine all those photos, videos and apps that the one who finds your iPhone will get to play with!  Nobody wants a stranger playing around with their phone.

Enjoy some easy to use tips to keeping your iPhone data safe from curious hands.

32 Blockchain Revolution - Don Tapscott & Alex Tapscott
Auteur : Don Tapscott & Alex Tapscott
Genre : Secteurs et professions

'Blockchain Revolution is a highly readable introduction to a bamboozling but increasingly important field' - Guardian

Blockchain is the ingeniously simple technology that powers Bitcoin. But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.

In Blockchain Revolution, Don and Alex Tapscott reveal:

· how this game-changing technology will shape the future of the world economy
· how it will improve everything from hea

33 The Beautiful Things That Heaven Bears - Dinaw Mengestu
Auteur : Dinaw Mengestu
Genre : Lettres
Seventeen years ago, Sepha Stephanos fled the Ethiopian Revolution for a new start in the United States. Now he finds himself running a failing grocery store in a poor African-American section of Washington, D.C., his only companions two fellow African immigrants who share his bitter nostalgia and longing for his home continent. Years ago and worlds away Sepha could never have imagined a life of such isolation. As his environment begins to change, hope comes in the form of a friendship with new neighbors Judith and Naomi, a white woman and her biracial daughter. But when a series of racial incidents disturbs the community, Sepha may lose everything all over again.

Watch a QuickTime interview with Dinaw Mengestu about this book.

34 Slater's Revenge - Claudia Shelton
Auteur : Claudia Shelton
Genre : Romans et littérature
After all these years, OPAQUE agent Josh Slater is finally closing in on the crime boss who bought his father for a bank account. But that entails returning to his hometown to protect his boss’s niece — the only women he ever loved.

Sexy, gorgeous Mackenzie Baudin also happens to be at the top of the organized crime’s hit list. He knows he can never reveal the real reason why he was forced to leave her behind years ago, but he’ll do whatever it takes to gain her trust.

Each book in the Shades of Leverage series is STANDALONE:
* Slater's Revenge
* Dangerous Lies

35 Security Vs. Convenience - Michael Reeves
Auteur : Michael Reeves
Genre : Ordinateurs
The inter workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these book help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical manager, computer security novices, and systems administrators looking to broaden their knowledge.

Security vs. Convenience tackles the ever prominent balance between securing a network and its information and the business needs for which the network exists.

36 Munich - Robert Harris
Auteur : Robert Harris
Genre : Histoire
Now available: THE SECOND SLEEP, Robert Harris's latest novel

Hitler is determined to start a war. Chamberlain is desperate to preserve the peace.

They will meet in a city which forever afterwards will be notorious for what is about to take place.

As Chamberlain’s plane judders over the channel and the Fuhrer’s train steams south, two young men travel with their leaders. Former friends from a more peaceful time, they are now on opposing sides.

As Britain’s darkest hour approaches, the fate of millions could depend on them - and the secrets they’re hiding.

Spying. Betrayal. Murder. Is any price too high for peace?

‘A brilliantly constructed spy novel’ Observer

‘Grips from start to finish … Superb’ Mail on S

37 Beginner's Guide to Information Security - Limor Elbaz
Auteur : Limor Elbaz
Genre : Ordinateurs
The Beginner’s Guide to Information Security offers insight and resources to help readers embark on a career in one of the 21st century’s most important—and potentially lucrative—fields. Maybe you want to move into information security from IT, say, from a developer or system administrator role. Or maybe you just graduated with your bachelor’s or master’s degree. Whatever your education or prior experience, this book can offer you a great start, with advice from real people who are working in the InfoSec field. 
It starts off with some chapters that cover ways to learn about information security, maybe pick up a certification or two, find out about job opportunities, and then, hopefully, snag a job. The Beginner’s Guide also delves deeper into InfoSec topics, helping readers master key skills like knowing how to protect a network, respond to a security i

38 Destined for War - Graham Allison
Auteur : Graham Allison
Genre : Science politique
“Allison is one of the keenest observers of international affairs around.”— JOE BIDEN, former vice president of the United States
China and the United States are heading toward a war neither wants. The reason is Thucydides’s Trap: when a rising power threatens to displace a ruling one, violence is the likeliest result. Over the past five hundred years, these conditions have occurred sixteen times; war broke out in twelve. Today, as an unstoppable China approaches an immovable America, and both Xi Jinping and Donald Trump promise to make their countries “great again,” the seventeenth case looks grim. A trade conflict, cyberattack, Korean c

39 Macroeconomics, Agriculture, and Food Security - Eugenio Díaz-Bonilla
Auteur : Eugenio Díaz-Bonilla
Genre : Économie
Why write a book on macroeconomic policies and their links to agriculture and food security in developing countries? The food price spikes of the years just prior to 2010 and the economic, political, and social dislocations they generated refocused the attention of policymakers and development practitioners on the agricultural sector and food security concerns. But even without those traumatic events, the importance of agriculture for developing countries—and for an adequate functioning of the world economy— cannot be denied. First, although declining over time, primary agriculture still represents important percentages of developing countries’ overall domestic production, exports, and employment. If agroindustrial, transportation, commercial, and other related activities are also counted, then the economic and social importance of agriculture-based sectors increases significantly.

40 The Wizard of Lies - Diana B. Henriques
Auteur : Diana B. Henriques
Genre : Investissement
The inside story of Bernie Madoff and his $65 billion Ponzi scheme, with surprising and shocking new details from Madoff himself.

Who is Bernie Madoff, and how did he pull off the biggest Ponzi scheme in history?

These questions have fascinated people ever since the news broke about the respected New York financier who swindled his friends, relatives, and other investors out of $65 billion through a fraud that lasted for decades. Many have speculated about what might have happened or what must have happened, but no reporter has been able to get the full story -- until now.

In The Wizard of Lies, Diana B. Henriques of The New York Times -- who has led the paper's coverage of the Madoff scandal since the day the story broke -- has written the definitive book on the man and his scheme, drawing on unprecedented access and more than one hu

41 Red Tiger - Sean Black
Auteur : Sean Black
Genre : Policier et suspense
At first it looks like Emily Yan, the daughter of an ultra-wealthy Chinese businessman, is the unlucky victim of a carjacking gone wrong. But when her father is unable to contact either her or her hard-partying younger brother Charlie, he calls in ex-military bodyguard Ryan Lock and his partner, retired US Marine Ty Johnson, to find his children.
Lock and Ty soon find themselves plunged into a unpredictable spiral of violence where every new victim brings with them more questions than answers.
With the family refusing to involve Los Angeles law enforcement, it’s down to Lock and Ty to track down Emily and her brother. Standing in their way is a merciless killer known only as the Red Tiger.

42 Code Warriors - Stephen Budiansky
Auteur : Stephen Budiansky
Genre : Science politique
A sweeping, in-depth history of NSA, whose famous “cult of silence” has left the agency shrouded in mystery for decades
The National Security Agency was born out of the legendary codebreaking programs of World War II that cracked the famed Enigma machine and other German and Japanese codes, thereby turning the tide of Allied victory. In the postwar years, as the United States developed a new enemy in the Soviet Union, our intelligence community found itself targeting not soldiers on the battlefield, but suspected spies, foreign leaders, and even American citizens. Throughout the second half of the twentieth century, NSA played a vital, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond.

In Code Warriors, Stephen Budiansky—a longtime expert in cr

43 The Puzzle Palace - V. James Bamford
Auteur : V. James Bamford
Genre : Militaire
It is the most secret agency within the United States Government. For many years, the government denied that it even existed (and, according to a Washington joke, the initials NSA stood for “No Such Agency”). It was established not by law but by a top secret presidential memorandum that has been seen by only a very few officials. Yet it is many times larger than the CIA, spends many billions of dollars more per year, and its director is possibly the most powerful official in the American intelligence community. It is the National Security Agency.

In the three decades since President Truman secretly created the agency in 1952, the NSA has managed to elude publicity to an extraordinary degree. Now, in the first book ever written on the National Security Agency, James Bamford traces its origins, details its inner workings, and explores its farflung operations.


44 Security and Privacy For Microsoft® Office 2010 Users - Mitch Tulloch
Auteur : Mitch Tulloch
Genre : Ordinateurs
This title is also available as a free eBook.

Take control&mdash;and put the built-in security and privacy features in Microsoft Office to work! Whether downloading documents, publishing a presentation, or collaborating online&mdash;this guide offers concise, how-to guidance and best practices to help protect your documents and your ideas.

Get practical, proactive guidance for using the security and privacy management features in Office 2010 and Office 365Walk through everyday scenarios, and discover everyday techniques that help you take charge Understand common risks and learn best practices you can apply right away

45 Enterprise Security Architecture Using IBM Tivoli Security Solutions - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges. This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Ti

46 House of Spies - Daniel Silva
Auteur : Daniel Silva
Genre : Policier et suspense
A Kirkus Best Book of the Year

#1 NYT Bestseller

#1 USA Bestseller

#1 WSJ Bestseller

From the #1 New York Times bestselling author of The Black Widow comes the thrilling new summer blockbuster featuring legendary spy, assassin and art restorer Gabriel Allon.

A heart-stopping tale of suspense, Daniel Silva’s runaway bestseller, The Black Widow, was one of 2016’s biggest novels. Now, in House of Spies, Gabriel Allon is back and out for revenge – determined to hunt down the world’s most dangerous terrorist, a shadowy ISIS mastermind known only as Saladin.  

Four months after the deadliest attack on the American homeland since 9/11, terrorists leave a trail of carnage through London’s glittering West End. The attack is a brilliant feat of

47 Kickstart Security: macOS Mojave - Austin Lasota
Auteur : Austin Lasota
Genre : Administration des systèmes
Kickstart Security: macOS Mojave, covers generalized topics regarding the security of Macs in a touch and go fashion. The foundations are set, and relevant bricks laid out to build up your knowledge. The Kickstart Security series values brevity, focusing on the info you need to start securing Macs as fast as possible.

48 The Practical Guide To Mac Security - Gary Rosenzweig
Auteur : Gary Rosenzweig
Genre : Ordinateurs
Learn how to protect your Mac and yourself in an online world. The Practical Guide to Mac Security teaches you how to stay safe online. Learn how to create and use strong passwords to prevent your accounts from being hacked. Find out if you need antivirus software and how you can protect your Mac against malware. Read about scams and cons that try to trick you into granting access to your Mac or installing malware. Learn how to back up your Mac and protect your files and data from disasters.
This book is a guide for the practical Mac user. This is for those who want to buy things online, share over social media and travel with their Mac while maintaining a decent level of security. I’ll show you common sense techniques for staying safe online. The idea is not to build a wall around you, but to learn how to look out for problems and avoid common security pitfalls.

49 The Other Woman - Daniel Silva
Auteur : Daniel Silva
Genre : Policier et suspense
#1 New York Times Bestseller

#1 USA Today  Bestseller

#1 Wall Street Journal Bestseller

A Kirkus Best Book of 2018

A Real Book Spy Best Thriller of 2018

From Daniel Silva, the #1 New York Times–bestselling author, comes a modern masterpiece of espionage, love, and betrayal

She was his best-kept secret …

In an isolated village in the mountains of Andalusia, a mysterious Frenchwoman begins work on a dangerous memoir. It is the story of a man she once loved in the Beirut of old, and a child taken from her in treason’s name. The woman is the keeper of the Kremlin’s most closely guarded secret. Long ago, the KGB inserted a mole into the heart of the West—a mole who stands on the doorstep of ultimate power.

Only one man can unravel the conspiracy: Gabriel Allon, the legendary

50 Goldfinger - Ian Fleming
Auteur : Ian Fleming
Genre : Policier et suspense

‘You’re stale, tired of having to be tough. You want a change. You’ve seen too much death’

In Fleming’s seventh 007 novel, a private assignment sets Bond on the trail of an enigmatic criminal mastermind – Auric Goldfinger. But greed and power have created a deadly opponent who will stop at nothing to get what he wants.
Suggestions Relatives :