Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems
As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems
Advanced Methods of Pharmacokinetic and Pharmocodynamic Systems
Analysis Volume 3 is vital to professionals and academicians
working in drug development and bioengineering. Both basic and
clinical scientists will benefit from this work.
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.
IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.
Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform
Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.
Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s. As more and more companies and educational institutions plan to adopt a cloud-based IT infrastructure, today's job market requires IT professionals who understand cloud computing and have hands-on experience developing cloud-based networks. Cloud Computing Networking: Theory, Practice, and Development covers the key networking and system administration concepts as well as the vital hands-on skills you need to master cloud technology. This book is designed to help you quickly get started in deploying cloud services for a real-world business. It provides detailed step-by-step instructions for creating a fully functioning cloud-based IT infrastructure using the Microsoft Azure cloud platform. In this environment, you can develop cloud services collaboratively or individually. The book enhances your hands-on skills through numerous lab activities. In these lab activities, you will learn to Implement the following services in a cloud environment: Active Directory, DHCP, DNS, and Certificate Services Configure Windows Server so it can route IP traffic Implement IP Security Policy and Windows Firewall with Advanced Security tools Create a point-to-site connection between Microsoft Azure and a local computer Create a site-to-site connection between Microsoft Azure and an on-premises network Develop a hybrid cloud that integrates Microsoft Azure with a private cloud created on a local network Cloud Computing Networking: Theory, Practice, and Development includes numerous examples, figures, and screen shots to help you understand the information. Each chapter concludes with a summary of the major topics and a set of review questions. With this book, you will soon have the critical knowledge and skills to develop and manage cloud-based networks.
Provides a structured look, at the unique characteristic for smart sensor networks to resolving the issues of many real-world applications in a broad range of areas such as Smart Healthcare, Engineering, Scientific Research, Social Media, Industrial Automation and more Offers a systematic look at the unique characteristics of AI based wireless sensor networks through their usage in a broad range of areas Delivers recent trends and core concepts in both analytics and application in smart sensor networks using AI Explores the development and application of AI and evolutionary computing as applied to wireless sensor networks Focuses on stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation result and an application-oriented approach.
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.
This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate. The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs."
Teams working in a crisis are operating in a high turbulence environment. Blue Shark Teams thrive in a crisis. They swim through turbulence and glide to project success. This book reveals the concepts and practical insight on how to create and lead Blue Shark Teams. The Blue Shark Model of Leading High-Performance Teams is based on Daniel Goleman's emotional intelligence model and Bruce Tuckman's team-building model (forming, storming, norming, performing, and adjourning). This book shows how to apply these models to large companies, small-to-medium size businesses, and projects during a crisis. It explains how managers can develop their leadership style and lead high-performance teams. A real-life case study, which was a success story during the COVID-19 pandemic, is discussed to elaborate the team-building and emotional intelligence models. The lessons learned from this case study can be applied to any crisis in any industry across the spectrum, including healthcare, IT, telecom, construction, manufacturing, oil and gas, airlines, financial services, retail, public sector, and consulting. The book arms executives and managers with the concepts and techniques to lead and manage projects, teams, and companies during turbulent and volatile times. If you are a CEO, CIO, CTO, or CXO of a Fortune 500 company, a mid-to-small size Business Owner, a Project Manager, or a Senior Executive facing a crisis, then this book is for you. It describes real-life case studies and projects that shows how the theoretical frameworks and models developed by leading researchers can be applied successfully to companies and projects, especially during a crisis and pandemic such as COVID-19.
Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.
How do you detangle a monolithic system and migrate it to a microservice architecture? How do you do it while maintaining business-as-usual? As a companion to Sam Newman's extremely popular Building Microservices, this new book details a proven method for transitioning an existing monolithic system to a microservice architecture. With many illustrative examples, insightful migration patterns, and a bevy of practical advice to transition your monolith enterprise into a microservice operation, this practical guide covers multiple scenarios and strategies for a successful migration, from initial planning all the way through application and database decomposition. You'll learn several tried and tested patterns and techniques that you can use as you migrate your existing architecture. Ideal for organizations looking to transition to microservices, rather than rebuild Helps companies determine whether to migrate, when to migrate, and where to begin Addresses communication, integration, and the migration of legacy systems Discusses multiple migration patterns and where they apply Provides database migration examples, along with synchronization strategies Explores application decomposition, including several architectural refactoring patterns Delves into details of database decomposition, including the impact of breaking referential and transactional integrity, new failure modes, and more
Everything you need to know about Windows 11 in a single, visual book Teach Yourself VISUALLY Windows 11 collects all the resources you need to master the day-to-day use of Microsoft's new operating system and delivers them in a single resource. Fully illustrated, step-by-step instructions are combined with crystal-clear screenshots to walk you through the basic and advanced functions of Windows 11. Teach Yourself VISUALLY Windows 11 offers the best visual learning techniques with comprehensive source material about the interface and substance of Windows 11, as well as: Stepwise guidance on working with files, digital pictures, and media Instructions for customizing Windows 11 and sharing your computer with family members Tutorials on installing and repairing applications, system maintenance, and computer security The fastest, easiest way for visual learners to get a grip on Windows 11, Teach Yourself VISUALLY Windows 11 is the best way to go from newbie to expert in no time at all.
Focused on practical matters: this book will not cover Shiny concepts, but practical tools and methodologies to use for production. Based on experience: this book will be a formalization of several years of experience building Shiny applications. Original content: this book will present new methodology and tooling, not just do a review of what already exists.
Originally published in 1995 Time and Logic examines understanding and application of temporal logic, presented in computational terms. The emphasis in the book is on presenting a broad range of approaches to computational applications. The techniques used will also be applicable in many cases to formalisms beyond temporal logic alone, and it is hoped that adaptation to many different logics of program will be facilitated. Throughout, the authors have kept implementation-orientated solutions in mind. The book begins with an introduction to the basic ideas of temporal logic. Successive chapters examine particular aspects of the temporal theoretical computing domain, relating their applications to familiar areas of research, such as stochastic process theory, automata theory, established proof systems, model checking, relational logic and classical predicate logic. This is an essential addition to the library of all theoretical computer scientists. It is an authoritative work which will meet the needs both of those familiar with the field and newcomers to it.
The healthcare industry is on the cutting edge of voice-user interface (VUI) design and making great progress to improve patient care through developing technologies, literally transforming the voice of the industry. The advantages of VUI extend far beyond simple conveniences for patients or a healthcare employee's saved phone call. VUI has a profound impact on care improvement. Just like a person, a well-designed VUI can use tone of voice, inflection and other elements in conversation to shape behaviors or calm nerves. With VUI, physicians and patients become empowered to make informed decisions about healthcare. The use of voice technology across smart speakers, IoT, clinical and home devices, and wearables for improving the patient experience and clinical outcomes was recently identified as one of most significant emerging technologies in healthcare. Smart speakers are the #1 selling consumer item in the world and major competition is heating up between Amazon Alexa, Apple Siri, Microsoft Cortana, Google Voice Assistant, and a host of other specialty platforms specific to healthcare. From Orbita and Macadamia to voice-enabled robotics from Pillo, Intuitive, Vivify, and RealView Imaging, voice technology is pervasive across the gamut of levels of devices. Voice technology is not just pervasive in smart speakers and smart phones - it is finding its way into wearables, vehicles, homes, and even consumer and clinical medical devices. We even have smart jewelry emerging with health, wellness, and safety features built in. Best of all, this trend spans intergenerational health and wellness that goes beyond clinical care into long term health and wellbeing and the potential for increased patient engagement. In this book, the editors review information from the top thought-leaders in this space and examine real-world case studies of the outcomes and potential of voice technology in healthcare. Topics include a market survey, clinical use cases, home health use cases, health and wellness topics - fitness, nutrition, and wellbeing; next generation fitness facilities; voice and wearables in smart, connected communities; voice technology in social companions/robots; voice technology in the future surgical suites; a roadmap for the future from top technology; standards in voice technology; and the future of voice technology and artificial intelligence.
The U.S. healthcare system is in "complete chaos-disarray." Medical costs have increased significantly over the past 6 years with 70% increase for deductibles and 24% or more for health insurance premiums. All the while, workers earnings have either not increased or if they did, the pay raises were for less than the increase in the cost of medical care. The situation is unsustainable and the public wants the system fixed. This book offers ways of fixing the problems in healthcare. HEALTHCARE's OUT SICK - PREDICTING A CURE - Solutions that WORK !!!! first defines the "healthcare in crisis" problem. Through real patient experiences, the book describes the difficulties of getting through the maze of complexity among the plethora of "silo providers" which make up the industry. The heart of the book provides readers with a comprehensive solution that can work, a disruption that is necessary to provide Americans the medical care they need without the US public and healthcare providers and payors going into bankruptcy, insolvency or closure. This book delves into digitized medicine, payor and provider reimbursement models, and value-based healthcare delivery. It also includes a philosophy or mode of thinking and operation for the solutions that are needed for diagnosis-effective, cost-effective, and time-efficient healthcare delivery, of which digitized medicine, value-based care, and payor reimbursement modes are just some of the factors. The authors propose that the real solution involves having the patient at the center of the issues and changing from an archaic gold standard way of thinking to a "Predictive Analytic thinking" where one gets at the real truth by doing "real science" that in the end becomes effective not only for the population but for the individual person. This all leads to real person-centered and person-directed medicine and healthcare delivery.
This book gives examples from healthcare institutions that are using IT automation and innovation to drive change and provides guidance on the strategic direction of HIT over the next five years. Improving the delivery of healthcare through HIT is vital for both the economic success of healthcare organizations and the care of the patient, but most EMR systems do not have an integrated and architected approach. This book provides a detailed approach on how to leverage IT for transformation. It also shows how to build upon the experiences of other industries and helps foster innovation by providing a vision of where technology can be an enabler.
Recent computer-based tools for project planning and management focus on user-friendliness and interconnectivity. However, these programs function on the Critical Path Method, or CPM, which was created in the 1950s. These programs, which involve simplistic models and methods, ignore the fact that the underlying computations on which they function have become woefully inadequate for the complex projects of today. The product of nearly a decade of work, The Dynamic Progress Method: Using Advanced Simulation to Improve Project Planning and Management provides an overview of the research conducted while illustrating some of the issues with current approaches. It presents the Dynamic Progress Method (DPM), an innovative simulation-based approach to project management. It also includes instructions on how to use the accompanying DPM-based simulation tool pmBLOX to plan, manage, and analyze projects. This groundbreaking book is a must-have resource for project planning and management. It introduces a new and better way of planning, estimating, and managing projects that corrects some of the fundamental flaws of the CPM. It brings the computational integrity of planning simulations up to speed with modern needs, making it useful not only to current project managers but also to students who will become project managers.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.
Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework. |
You may like...
Henry V - The Quarto (Sos)
William Shakespeare, Graham Holderness, …
Hardcover
R5,134
Discovery Miles 51 340
Theatre, Magic and Philosophy - William…
Gabriela agnea Horvath
Paperback
R1,322
Discovery Miles 13 220
Asian Interventions in Global…
Poonam Trivedi, Paromita Chakravarti, …
Paperback
|