This database offers a diverse array of full-text and indexed content that covers the full spectrum of the applied sciences and computing disciplines—from acoustics to aeronautics, and neural networks to nuclear engineering.
Designed for academic institutions, this database is the leading resource for scholarly research with more full-text journals and more peer-reviewed journals than any other database available. It supports high-level research in the key areas of academic study by providing journals, periodicals, reports, books, and more.
Understand the nitty-gritty of Cybersecurity with ease. Align your security knowledge with industry leading concepts and tools. Acquire required skills and certifications to survive the ever changing market needs. Learn from industry experts to analyse, implement, and maintain a robust environment.
Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
This comprehensive textbook discusses the legal, organizational and ethical aspects of information governance, assurance and security and their relevance to all aspects of information work.
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are growing exponentially.
Additional Resources In Information Systems and Programming
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities.
Introduction to Computer Information Systems gives an introduction to computer information systems and discusses about the computer hardware and software in addition to the subject of remote access and data communication. It talks about the various programing languages in the computer information systems and elaborates on the databases and database management system. Also discussed in the book are the networks, internet, and communication devices, computer information systems for business, the ethical and legal implications of a computer information system and the future of computer information systems, which provide basic insights on the various aspects of computer information systems.
Zygiaris simplifies his teaching method in order to provide an accessible walkthrough of all technological advances of databases in the business environment. Readers learn how to design, develop, and use databases to provide business analytical reports with the three major database management systems: Microsoft Access, Oracle Express and MariaDB (formerly MySQL). This is all delivered through clearly structured, streamlined chapters, all of which link to online videos that demonstrate visually, in step-by-step tutorials, how to implement the processes outlined in the book. All of these features help the non-IT student or manager to understand the importance of databases in the business environment and to learn how to use those databases to solve real-world problems. This book is of particular interest to students of management and to business managers, and it is of keen interest to anyone who works with major business database systems.
The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress.
As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become Now you can set The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress.