Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

New Perspectives in Behavioral Cybersecurity, Patterson, Wayne


Варианты приобретения
Цена: 13779.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Англия: Есть  Склад Америка: Есть  
Deprecated: substr(): Passing null to parameter #1 ($string) of type string is deprecated in E:\WWW\html\prod_show.php on line 417

Deprecated: substr(): Passing null to parameter #1 ($string) of type string is deprecated in E:\WWW\html\prod_show.php on line 418

При оформлении заказа до:
Ориентировочная дата поставки:

Добавить в корзину
в Мои желания

Автор: Patterson, Wayne   (Уэйн Паттерсон)
Название:  New Perspectives in Behavioral Cybersecurity
Перевод названия: Уэйн Паттерсон: Новые перспективы поведенческой кибербезопасности
ISBN: 9781032414775
Издательство: Taylor&Francis
Классификация:










ISBN-10: 1032414774
Обложка/Формат: Hardback
Страницы: 192
Вес: 0.41 кг.
Дата издания: 05.09.2023
Иллюстрации: 17 tables, black and white; 39 line drawings, black and white; 27 halftones, black and white; 66 illustrations, black and white
Размер: 161 x 242 x 17
Читательская аудитория: Tertiary education (us: college)
Подзаголовок: Human behavior and decision-making models
Рейтинг:
Поставляется из: Европейский союз


Water Projects and Technologies in Asia

Автор: Woo, Hyoseop
Название: Water Projects and Technologies in Asia
ISBN: 103212038X ISBN-13(EAN): 9781032120386
Издательство: Taylor&Francis
Рейтинг:
Цена: 19906.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book is a collection of highly refined articles on historical water projects and traditional water technologies of international interest in the Asian region, addressing information on past water projects (mostly before the 20th century) in the Asian regions that are technically and culturally of interest and educationally valuable. This book explores historical water projects in these regions, presenting technologies used at the time, including calculation and forecasting methods, measurement, material, labor, methodologies, and even water culture. It is expected that the old Asian wisdom of "reviewing the old and learning the new" would be realized to a certain extent in modern planning and practice of water projects.

This book will enable the reader to understand historical water projects and technologies in the Asian region. It can be used as a one-stop resource to source notable Asian water projects and their relevance to modern-day technology. In this regard, this book is expected to be of interest to a variety of audiences, including the corresponding Asian regions and other international audiences interested in Asian water history from an engineering perspective.

Foundations and Theoretical Perspectives of Distributed Team Cognition

Название: Foundations and Theoretical Perspectives of Distributed Team Cognition
ISBN: 113862554X ISBN-13(EAN): 9781138625549
Издательство: Taylor&Francis
Рейтинг:
Цена: 26796.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book looks at fundamentals, theoretical concepts, and how theory informs perspectives of thinking for distributed team cognition. The chapters yield a broad understanding of the nature of diverse thinking and insights into technologies, foundations, and theoretical perspectives of distributed team cognition.

Cybersecurity in the Electricity Sector: Managing Critical Infrastructure

Автор: Leszczyna Rafal
Название: Cybersecurity in the Electricity Sector: Managing Critical Infrastructure
ISBN: 3030195406 ISBN-13(EAN): 9783030195403
Издательство: Springer
Рейтинг:
Цена: 10366.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment, cost evaluation and comprehensive defence.

Data-Centric Business and Applications: Ict Systems-Theory, Radio-Electronics, Information Technologies and Cybersecurity (Volume 5)

Автор: Radivilova Tamara, Ageyev Dmytro, Kryvinska Natalia
Название: Data-Centric Business and Applications: Ict Systems-Theory, Radio-Electronics, Information Technologies and Cybersecurity (Volume 5)
ISBN: 3030430693 ISBN-13(EAN): 9783030430696
Издательство: Springer
Рейтинг:
Цена: 18294.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Automated Subjective Assessment of Speech Intelligibility under Diotic and Dichotic Listening.- Different Approaches to Studying the Extreme Properties of Signal Functions Synthesized with Splines.- Adaptive Complex Singular Spectrum Analysis with Application to Modern Superresolution Methods.- Practical Application of Clustering Methods in Radar Signals Recognition System.- Optimization of the Quality of Information Support for Consumers of Cooperative Surveillance Systems.- Adaptive Semantic Analysis of Radar Data Using Fuzzy Transform.- Approaches to Building a Chaotic Communication System.- Implementation of Evolutionary Methods of Solving the Travelling Salesman Problem in a Robotic Warehouse.- Study of Approaches to the Management of the Production of Entomophages.- Information Technologies for Analysis and Modeling of Computer Network s Development.- The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments.- Fusion the Coordinate Data of Airborne Objects in the Networks of Surveillance Radar Observation Systems.- Analysis of Influence of Network Architecture Nonuniformity and Traffic Self-similarity Properties to Load Balancing and Average End-to-End Delay.

Cybersecurity in the covid-19 pandemic

Автор: Okereafor, Kenneth
Название: Cybersecurity in the covid-19 pandemic
ISBN: 0367610914 ISBN-13(EAN): 9780367610913
Издательство: Taylor&Francis
Рейтинг:
Цена: 7961.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data.

Hci for Cybersecurity, Privacy and Trust: Second International Conference, Hci-CPT 2020, Held as Part of the 22nd Hci International Conference, Hcii 2

Автор: Moallem Abbas
Название: Hci for Cybersecurity, Privacy and Trust: Second International Conference, Hci-CPT 2020, Held as Part of the 22nd Hci International Conference, Hcii 2
ISBN: 3030503089 ISBN-13(EAN): 9783030503086
Издательство: Springer
Рейтинг:
Цена: 6097.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Human Factors in Cybersecurity.- Privacy and Trust.- Usable Security Approaches.

Cybersecurity Exposed: The Cyber House Rules

Автор: Meeuwisse Raef
Название: Cybersecurity Exposed: The Cyber House Rules
ISBN: 1911452193 ISBN-13(EAN): 9781911452195
Издательство: Неизвестно
Цена: 4596.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Artificial Intelligence and Blockchain for Future Cybersecurity Applications

Автор: Maleh Yassine, Baddi Youssef, Alazab Mamoun
Название: Artificial Intelligence and Blockchain for Future Cybersecurity Applications
ISBN: 3030745740 ISBN-13(EAN): 9783030745745
Издательство: Springer
Цена: 24392.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications.

Process Operational Safety and Cybersecurity: A Feedback Control Approach

Автор: Wu Zhe, Christofides Panagiotis D.
Название: Process Operational Safety and Cybersecurity: A Feedback Control Approach
ISBN: 303071182X ISBN-13(EAN): 9783030711825
Издательство: Springer
Цена: 12196.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book is focused on the development of rigorous, yet practical, methods for the design of advanced process control systems to improve process operational safety and cybersecurity for a wide range of nonlinear process systems.

Advances in Cybersecurity Management

Автор: Daimi Kevin, Peoples Cathryn
Название: Advances in Cybersecurity Management
ISBN: 3030713806 ISBN-13(EAN): 9783030713805
Издательство: Springer
Цена: 7927.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Introduction.- Management Techniques in Cybersecurity.- Information Technology Risk Management.- Impact of Technologies and Techniques on Cybersecurity Management.- Regulatory Techniques and Issues.- International Issues Related to Security Management.- IT Compliance Management.- Security Policy Management.- IT Vendor Risk Management.- Cyber Security Incident Response.- Compliance Requirements for Cyber Security.- Information Continuity Management.- Assets Classification and Control.- Conclusion.

Data Analytics and Decision Support for Cybersecurity

Автор: Iv?n Palomares Carrascosa; Harsha Kumara Kalutarag
Название: Data Analytics and Decision Support for Cybersecurity
ISBN: 3319866249 ISBN-13(EAN): 9783319866246
Издательство: Springer
Рейтинг:
Цена: 15855.00 р.
Наличие на складе: Нет в наличии.

Hci for Cybersecurity, Privacy and Trust: Third International Conference, Hci-CPT 2021, Held as Part of the 23rd Hci International Conference, Hcii 20

Автор: Moallem Abbas
Название: Hci for Cybersecurity, Privacy and Trust: Third International Conference, Hci-CPT 2021, Held as Part of the 23rd Hci International Conference, Hcii 20
ISBN: 3030773914 ISBN-13(EAN): 9783030773915
Издательство: Springer
Цена: 6097.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Usable Security.- Authentication Management of Home IoT Devices.- Emics and Etics of Usable Security: Culturally Specific or Culturally Universal?.- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks.- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review.- Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes.- Risk Assessment of "Ostrich ZIP".- Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users.- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services.- Security and Privacy by Design.- Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience.- A Human Factor Approach to Threat Modeling.- Smart Technologies and Internet of Things Designed for Aging in Place.- Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration.- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces.- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk.- Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior.- Privacy Design Strategies and the GDPR: A Systematic Literature Review.- User Behavior Analysis in Cybersecurity.- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure.- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices.- Perceptions of Security and Privacy in mHealth.- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account.- CyberPin - Challenges on Recognizing Youngest Cyber Talents.- It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness.- Understanding the Last Line of Defense: Human Response to Cybersecurity Events.- Security and Privacy Awareness.- The Effectiveness of Video Messaging Campaigns to Use 2FA.- A Study on Online Businesses' Commitment to Consumer Privacy.- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks.- Social Engineering Attacks: Recent Advances and Challenges.- Brand Validation: Security Indicator to Better Indicate Website Identity.- Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials.- Gaming Apps' and Social Media Partnership: A Privacy Perspective.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия