Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjailija

David Wheeler

Kirjat ja teokset yhdessä paikassa: 46 kirjaa, julkaisuja vuosilta 1987-2023, suosituimpien joukossa Domestick Privacies. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

46 kirjaa

Kirjojen julkaisuhaarukka 1987-2023.

The IoT Architect's Guide to Attainable Security and Privacy

The IoT Architect's Guide to Attainable Security and Privacy

Damilare D. Fagbemi; David Wheeler; JC Wheeler

TAYLOR FRANCIS LTD
2023
nidottu
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining."Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."— Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."— Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express"If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."— Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
E as in Echo

E as in Echo

David Wheeler

Gatekeeper Press
2021
sidottu
The series of vignettes in Carol's memoire will offer her experiences of achievement and growth. From a childhood that started from tragedy and grief to hardship and depredation, Carol rose above her humble beginnings.She was to create five successful business ventures from nothing but diligence and imagination. When these companies were effectively sold Carol began a career in the fundraising industry. Her accomplishment at exceeding expectations. took her from the isolated North country to the great cities of Southern Ontario. It was there in Toronto that the culmination of her career resulted in her acknowledgement as the leader in her field. These stories will inspire and instruct the reader in how to overcome adversity.
Coping with Climate Change in the Sundarbans

Coping with Climate Change in the Sundarbans

Susmita Dasgupta; David Wheeler; Istiak Sobhan; Sunando Bandyopadhyay; Ainun Nishat; Tapas Paul

World Bank Publications
2021
nidottu
This monograph synthesizes multiyear, multidisciplinary studies that assess the vulnerability of of the Sundarbans and the neighboring communities whose livelihoods depend on its natural resources, and it recommends resilient-smart adaptation measures.
The IoT Architect's Guide to Attainable Security and Privacy

The IoT Architect's Guide to Attainable Security and Privacy

Damilare D. Fagbemi; David Wheeler; JC Wheeler

CRC Press Inc
2019
sidottu
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining."Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."— Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."— Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express"If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."— Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems