Descriptors
Documents disponibles dans cette catégorie (454)
Add the result to your basket Make a suggestion Refine your search
Books
Nous adoptons un comportement différent selon que nous nous trouvons dans la vie réelle ou dans un espace virtuel. Pourtant, dans les deux cas, les menaces et les risques sont souvent identiques. 90% des cyberattaques sont des escroqueries ou de[...]
ISBN (or other code): 978-2-343-07611-9 Article on page: 322 p. Descriptors: Class number: 005.8 Tags: Computer networks--Security measures ; Computer networks--Law and legislation ; Data protection--Law and legislation ; Cyberspace--Security measures Languages: French Books
Deux ouvrages consacrés à la sécurité informatique, pour apprendre à résister aux attaques extérieures. Ces deux livres de la collection Epsilon offrent au lecteur un maximum d'informations sur la sécurité informatique et comment résister aux at[...]
Edition statement: 2nd ed. ISBN (or other code): 978-2-7460-9554-0 Article on page: 381 p. Descriptors: Class number: 005.8 Tags: Computer networks--Security measures--Computer programs ; Computer security ; Hackers ; Data protection ; Operating systems (Computers) Languages: French Books
Organizations large and small are adopting Apache Hadoop to deal with huge application datasets. This guide provides you with the key for unlocking the wealth this data holds. It demonstrates how to use Hadoop to build reliable, scalable, distri[...]
Edition statement: 4th ed. ISBN (or other code): 978-1-4919-0163-2 Article on page: XXV, 727 p. Descriptors: Class number: 005.74 Tags: Electronic data processing--Distributed processing ; File organization (Computer science) ; Apache Hadoop (Computer file) Languages: English Books
Hans Delfs ; Helmut Knebl | Wien : Springer Nature | Information security and cryptography, ISSN 1619-7100 | 2015The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identific[...]
Edition statement: 3rd ed. ISBN (or other code): 978-3-662-47973-5 Article on page: XX, 508 p. Descriptors: Class number: 005.82 Tags: Computer security ; Cryptography ; Computer networks--Security measures ; Data encryption (Computer science) ; Coding theory Languages: English Books
"Faced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestsell[...]
Edition statement: 6th ed. ISBN (or other code): 978-0-7494-7405-8 Article on page: X, 348 p. Descriptors: Class number: 005.8 Tags: Computer security ; Data protection ; Business enterprises--Computer networks--Security measures Languages: English Books
Use Knockout.js to design and build dynamic client-side web applications that are extremely responsive and easy to maintain. This example-driven book shows you how to use this lightweight JavaScript framework and its Model-View-ViewModel (MVVM) [...]
ISBN (or other code): 978-1-4919-1431-1 Article on page: XI, 86 p. Descriptors: Class number: 005.3/76 Tags: JavaScript (Computer Program Language) Languages: English Books
Linux Forensics is the most comprehensive and up-to-date resource for those wishing to quickly and efficiently perform forensics on Linux systems. It is also a great asset for anyone that would like to better understand Linux internals. Linux Fo[...]
ISBN (or other code): 978-1-5150-3763-7 Article on page: XXIV, 345 p. Descriptors: Class number: 005.432 Tags: Python (Computer program language) ; Operating systems (Computers) ; Linux (E) Languages: English Books
About This Book •Make the most of Lucene by understanding its philosophy and leveraging the data searching capability of your application •Explore techniques to design scalable and succinct search applications •Packed with clear, step-by-step re[...]
ISBN (or other code): 978-1-78216-228-5 Article on page: IX, 200 p. Descriptors: Class number: 005.7565 Tags: Web search engines ; Lucene (Electronic resource) Languages: English Books
Ce livre s'adresse aux développeurs souhaitant découvrir et maîtriser le framework JavaScript Node. La maîtrise du développement en JavaScript ainsi que de bonnes connaissances sur les outils en ligne de commande sont nécessaires afin de tirer l[...]
ISBN (or other code): 978-2-409-00029-4 Article on page: 231 p. Descriptors: Class number: 005.133 Tags: JavaScript (Computer Program Language) ; Node.js (Computer program language) Languages: French Books
As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, begin[...]
Edition statement: 4th ed. ISBN (or other code): 978-1-4822-6275-9 Article on page: XXVI, 1278 p. Descriptors: Class number: 005.8 Tags: Electronic data processing personnel--Certification ; Computer security--Examinations--Study guides Languages: English Books
The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices. Two modes for 802.11i for two different g[...]
ISBN (or other code): 978-0-12-802222-1 Article on page: XVI, 52 p. Descriptors: Class number: 005.71376 Tags: Computer security--Software ; Computers--Networking ; Data encryption (Computer science) Languages: English Books
Fredrik Seehusen ; Michael Felderer ; Jürgen Grossmann ; Marc-florian Wendland ; Object management group technical meeting | Wien : Springer Nature | Lecture notes in computer science, ISSN 0302-9743 | 2015This book constitutes the thoroughly refereed conference proceedings of the Third International Workshop on Risk Assessment and Risk-driven Testing, RISK 2015, held in conjunction with the OMG Technical Meeting in Berlin, Germany, in June 2015. [...]
ISBN (or other code): 978-3-319-26415-8 Article on page: 119 p. Descriptors: 2.05 Scientific approach > Scientific methods > Evaluation > Évaluation du risque
Class number: 005.8 Tags: Computer security ; Risk assessment Languages: English Books
Claude Aubry ; François Beauregard | Malakoff Cedex [France] : Dunod | InfoPro. Études, développement, intégration | 2015Cet ouvrage s’adresse à tous ceux qui souhaitent s’initier à Scrum. Ceux qui possèdent déjà une expérience « agile » y trouveront de quoi revoir et approfondir leurs connaissances. Les rôles emblématiques de ScrumMaster et de Product Owner sont [...]
Edition statement: 4th ed. ISBN (or other code): 978-2-10-073874-8 Article on page: XVII, 308 p. Descriptors: Class number: 005.1 Tags: Project management ; Computer software--Development Languages: French Books
The revolutionary project management system that transformed how the tech industry works, now translated and explained for the broader business world. For those who believe that there must be a more efficient way for people to get things done, S[...]
ISBN (or other code): 978-1-84794-110-7 Article on page: VIII, 248 p. Descriptors: Class number: 005.1068 Tags: Business planning ; Project management ; Time management ; Scrum (Computer software development) Languages: English Books
Marion Agé ; Nicolas Crocfer ; Robert Crocfer ; David Dumas ; Collectif ; Acissi | Editions ENI | Epsilon | 2015Deux ouvrages consacrés à la sécurité informatique, pour apprendre à résister aux attaques extérieures. Ces deux livres de la collection Epsilon offrent au lecteur un maximum d'informations sur la sécurité informatique et comment résister aux at[...]
Edition statement: 2nd ed. ISBN (or other code): 978-2-7460-9265-5 Article on page: 881 p. Descriptors: Class number: 005.8 Tags: Computer networks--Security measures--Computer programs ; Computer security ; Hackers ; Data protection ; Operating systems (Computers) Languages: French