Exclusivité web : à partir de 35 euros d’achat, frais de port à 1 centime pour les expéditions vers la France métropolitaine, la Suisse et l’UE avec Colissimo ou GLS
Recherche avancée
Année de parution (36)
Appliquer
Effacer ce filtre
État de parution (7)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Langue (5)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Thème (15)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Support (5)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Auteur
Appliquer
Effacer ce filtre
Trier par...
Pertinence
Date de parution
Auteur
Titre
Prix
Recherche sur le thème Ingénierie des systèmes d'information :
Nous trouvons 3199 ouvrages correspondant à Ingénierie des systèmes d'information
The first-ever introduction to the full range of cybersecurity challenges and solutionsCybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data...
1. Web3 concepts and general introduction; 2. The first principles of Web3; 3. Blockchains: the foundation; 4. The scalability of Web3; 5. The smart contract ecosystem; 6. The tokenomics for Web3...
This book presents a new, innovative cloud federation solution called Federation-as-a-Service (FaaS) and its software platform, SUNFISH. The authors explain the various engineering innovations...
Eine subtile Veränderung, die zu katastrophalen Folgen führt - Hardware-Trojaner stellen zweifellos eine der größten Sicherheitsbedrohungen des modernen Zeitalters dar. Wie kann die Hardware vor...
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits, but also the art of human manipulation. Social engineering attacks...
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of...
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of...
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability managementOrganizations spend tremendous time and resources addressing...
A rigorous new framework for understanding the world of the futureInformation technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an...
Cybercrime and Digital Deviance, 2nd Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance...
Cybercrime and Digital Deviance, 2nd Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance...
Ce livre, structuré en trois parties, revient d'abord sur les notions clés de l'informatique et des données du cyber-espace, puis il en identifie les failles et les menaces auxquelles tendent la...
This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the...
This book deals with formal and practical approaches for early fast modeling and verification of complex digital processor hardware and software using SystemC-based virtual prototypes. As a...
Dans notre société de plus en plus connectée, la cybersécurité a pris une place centrale au point de devenir une absolue nécessité. Attaques contre des institutions publiques, cyberguerre...
The financial sector is witnessing rapid technological innovations, leading to the emergence of Fintech (financial technologies), revolutionizing national and international financial landscapes...
Our lives depend on automotive cybersecurity, protecting us inside and near vehicles. If vehicles go rogue, they can operate against the driver?s will and potentially drive off a cliff or into a...