Catalog Search Results
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires
...Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth disruptive computing paradigm after mainframes, PCs, the Internet, and mobile/social networking.
Author Melanie Swan, Founder of the
...19) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
A groundbreaking guide to forging trusting, mutually beneficial B2B relationships
Companies that have entered into B2B alliances may simultaneously be one and another's customers, suppliers, allies, and competitors. But in today's turbo-charged e-environment, how do companies take full advantage of the many benefits of B2B alliances while avoiding the obvious dangers of allowing potential competitors intimate access to their
Didn't find it?
Can't find what you are looking for? Try our Purchase Requests System. Submit Request