Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for cybersecurity

Warning: file_put_contents(cache/omni_d71981fb1e2180959d64ba1238df9968.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of UNMANNED AERIAL SYSTEM CYBERSECURITY RISK MANAGEMENT DECISION MATRIX FOR TACTICAL OPERATORS
Internet Archive

UNMANNED AERIAL SYSTEM CYBERSECURITY RISK MANAGEMENT DECISION MATRIX FOR TACTICAL OPERATORS

By Lattimore, Gary L.

The Department of Defense (DoD) does not have a defined cybersecurity operational risk management process for unmanned aerial systems (UASs). The DoD acknowledged this discrepancy and suspended all co...

View Book →
Cover of Intel Trusted Execution Technology for Server Platforms
dBooks

Intel Trusted Execution Technology for Server Platforms

By William Futral, James Greene

A Guide to More Secure Datacenters...

View Book →
Cover of Building the Infrastructure for Cloud Security
dBooks

Building the Infrastructure for Cloud Security

By Raghu Yeluri, Enrique Castro-Leon

A Solutions view...

View Book →
Cover of RubyFu
dBooks

RubyFu

By RubyFu

...

View Book →
Cover of The Ethics of Cybersecurity
dBooks

The Ethics of Cybersecurity

By Markus Christen, Bert Gordijn, Michele Loi

...

View Book →
Cover of Cybersecurity Ethics
Open Library

Cybersecurity Ethics

By Mary Manjikian

First published in 2017...

View Book →
Cover of Security Infrastructure Technology for Integrated Utilization of Big Data
dBooks

Security Infrastructure Technology for Integrated Utilization of Big Data

By Atsuko Miyaji, Tomoaki Mimoto

Applied to the Living Safety and Medical Fields...

View Book →
Cover of ERIC ED580862: Invest to Improve: The Cybersecurity Talent Deficit
Internet Archive

ERIC ED580862: Invest to Improve: The Cybersecurity Talent Deficit

By ERIC

"Invest to Improve: The Cybersecurity Talent Deficit" provides recommendations for cybersecurity stakeholders--employers, government agencies, and higher education institutions--to enable regional par...

View Book →
Cover of Hacking the Xbox
dBooks

Hacking the Xbox

By Andrew Huang

An Introduction to Reverse Engineering...

View Book →
Cover of A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers
Internet Archive

A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers

By Luís T. A. N. Brandão, Nicolas Christin, George Danezis

The National Cybersecurity Center of Excellence (NCCoE) (in the United States) has published on October 19, 2015, a white paper on "privacy-enhanced identity brokers." We present here a reply to their...

View Book →
Cover of Managing Risk and Information Security
dBooks

Managing Risk and Information Security

By Malcolm Harkins

Protect to Enable...

View Book →
Cover of Python for Cybersecurity
Open Library

Python for Cybersecurity

By Edrick Goad

First published in 2021...

View Book →
Cover of IronNet Cybersecurity, Inc.
Internet Archive

IronNet Cybersecurity, Inc.

By Unknown Author

This item represents a case in PACER, the U.S. Government's website for federal case data. If you wish to see the entire case, please consult PACER directly....

View Book →
Cover of Cybersecurity Essentials
Open Library

Cybersecurity Essentials

By Charles J. Brooks, Christopher Grow, Philip Craig, Donald Sh

First published in 2018...

View Book →
Cover of Cybersecurity for Dummies
Open Library

Cybersecurity for Dummies

By Dummies, Steinberg, Joseph

First published in 2019...

View Book →
Cover of DQS SUCCESS True Heavy Redacted
Internet Archive

DQS SUCCESS True Heavy Redacted

By Barrett KGK Maioho

This document serves as a case study and public record demonstrating the efficacy of the Disqualifier Sniper (DQS) framework, a proprietary, semi-automated methodology for auditing the behavioral inte...

View Book →
Cover of Hacking Secret Ciphers with Python
dBooks

Hacking Secret Ciphers with Python

By Al Sweigart

A beginner's guide to cryptography and computer programming with Python...

View Book →
Cover of Hacking Exposed Web Applications
dBooks

Hacking Exposed Web Applications

By Joel Scambray, Mike Shema

...

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of NASA Technical Reports Server (NTRS) 20150023587: Applying a Space-Based Security Recovery Scheme fo
Internet Archive

NASA Technical Reports Server (NTRS) 20150023587: Applying a Space-Based Security Recovery Scheme fo

By NASA Technical Reports Server (NTRS)

Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communicatio...

View Book →
Cover of Computer Viruses For Dummies
Internet Archive

Computer Viruses For Dummies

By For Dummies

Explains what computer viruses and malware are. Covers how systems get infected. Teaches prevention and protection methods. Explains antivirus tools. Covers phishing and scam awareness. Focuses on saf...

View Book →
Cover of Security in Computer and Information Sciences
dBooks

Security in Computer and Information Sciences

By Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokrati

First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...

View Book →
Cover of Cybersecurity a Detail Insight into Indian Small Businesses
Internet Archive

Cybersecurity a Detail Insight into Indian Small Businesses

By Dhanya K | Dr. Ajoy S Joseph

This study examines the vital significance of cybersecurity for Indian small businesses. Small enterprises are essential to the growth of Indias economy as it embraces Industry 4.0 and develops its di...

View Book →
Cover of Cybersecurity for Beginners
Open Library

Cybersecurity for Beginners

By Raef Meeuwisse

First published in 2015...

View Book →
Cover of Counterterrorism and Cybersecurity
Open Library

Counterterrorism and Cybersecurity

By Newton Lee

First published in 2013...

View Book →
Cover of DTIC AD1044987: Improving Federal Cybersecurity Governance Through Data-Driven Decision Making and E
Internet Archive

DTIC AD1044987: Improving Federal Cybersecurity Governance Through Data-Driven Decision Making and E

By Defense Technical Information Center

Although efforts are underway through Information Security Continuous Monitoring initiatives to improve situational awareness and risk mitigation at the operational level, the federal government must ...

View Book →
Cover of A Practical Guide to TPM 2.0
dBooks

A Practical Guide to TPM 2.0

By Will Arthur, David Challener, Kenneth Goldman

Using the New Trusted Platform Module in the New Age of Security...

View Book →
Cover of Rational Cybersecurity for Business
dBooks

Rational Cybersecurity for Business

By Dan Blum

The Security Leaders' Guide to Business Alignment...

View Book →
Cover of OPC-MCR - TOR Deanonymise (2011)
Internet Archive

OPC-MCR - TOR Deanonymise (2011)

By Various Authors

Digital forensics research collection...

View Book →
Cover of Cybersecurity
Open Library

Cybersecurity

By S. R. Westcott, Jean Riescher Westcott

First published in 1900...

View Book →
Cover of Defense against the Black Arts
dBooks

Defense against the Black Arts

By Jesse Varsalone, Matthew McFadden, Sean Morrissey, Michael S

How Hackers Do What They Do and How to Protect against It...

View Book →
Cover of Feb. 2017 House CAO 'Urgent' Cybersecurity Memo
Internet Archive

Feb. 2017 House CAO 'Urgent' Cybersecurity Memo

By Unknown Author

Available on Internet Archive....

View Book →
Cover of Cybersecurity Law
Open Library

Cybersecurity Law

By Jeff Kosseff

First published in 2017...

View Book →
Cover of Demystifying Internet of Things Security
dBooks

Demystifying Internet of Things Security

By Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler

Successful IoT Device/Edge and Platform Security Deployment...

View Book →
Cover of Of groundhogs, criminals and hackers
Internet Archive

Of groundhogs, criminals and hackers

By Jim Carroll

An article by Jim Carroll for CA Magazine (Canadain Chartered Accountants) (Now Pivot Magazine). Jim Carroll discusses the necessity of proactive defense mechanisms in both law enforcement and financi...

View Book →
Cover of DETECT ANOMALIES AND STRENGTHEN CYBERSECURITY IN IOT NETWORKS USING HIGH-LEVEL DEEP LEARNING TECHNIQ
Internet Archive

DETECT ANOMALIES AND STRENGTHEN CYBERSECURITY IN IOT NETWORKS USING HIGH-LEVEL DEEP LEARNING TECHNIQ

By Khalid Murad Abdullah

Specifically, we have worked on applying advanced deep learning techniques to improve cybersecurity in IoT networks and efficiently identify anomalies. First, we collect and prepare the data from the ...

View Book →
Cover of Deepseek The Non Chinese Eight Ball That Always Supports Israel
Internet Archive

Deepseek The Non Chinese Eight Ball That Always Supports Israel

By @superzar_pro

This presentation demonstrates that DeepSeek AI is not an independent Chinese AI, but rather a dual-purpose intelligence asset deeply intertwined with Western and Israeli surveillance ecosystems. Thro...

View Book →
Cover of A Graduate Course in Applied Cryptography
dBooks

A Graduate Course in Applied Cryptography

By Dan Boneh, Victor Shoup

The indispensable tool used to protect information in computing systems...

View Book →
Cover of User Behaviors Influence On Cybersecurity Strategy Effectiveness
Internet Archive

User Behaviors Influence On Cybersecurity Strategy Effectiveness

By Unknown Author

Most of past research in the area of information systems’ security has primarily focused on the technical dimension without paying attention to the human factors. The traditional conception of ...

View Book →
Cover of Cybersecurity : the Beginner's Guide
Open Library

Cybersecurity : the Beginner's Guide

By Erdal Ozkaya

First published in 2019...

View Book →
Cover of cybersecurity act final adoption pr 10042019 cbd3
Internet Archive

cybersecurity act final adoption pr 10042019 cbd3

By Yann Finger

Available on Internet Archive....

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of Configuring Microsoft SharePoint Hybrid Capabilities
dBooks

Configuring Microsoft SharePoint Hybrid Capabilities

By Jeremy Taylor, Neil Hodgkinson, Manas Biswas

...

View Book →
Cover of Diabetes Tagebuch
Open Library

Diabetes Tagebuch

By Karl Simpson

First published in 2020...

View Book →
Cover of The Privacy Engineer's Manifesto
dBooks

The Privacy Engineer's Manifesto

By Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Getting from Policy to Code to QA to Value...

View Book →
Cover of Defend Dissent
dBooks

Defend Dissent

By Glencora Borradaile

Digital Suppression and Cryptographic Defense of Social Movements...

View Book →
Cover of Cybersecurity I - Master Series
Open Library

Cybersecurity I - Master Series

By Coinifide, Howard Poston

First published in 2020...

View Book →