Towards an Extra Layer of Security: Two-F...
80円 The buzz in the web market is two-factor authentication (also known as TFA, 2FA, two-step verification, multi-factor authentication). Many users hold multiple accounts on multiple websites, and most of them use the same password for multiple accounts. If their password is hacked on one website, t...
Towards an Extra Layer of Security: Activ...
80円 In the first part of this article, last month, we learnt what two-factor authentication (TFA) is and its three types. Now, let us see how we can activate TFA for various websites and applications. As secure as TFA is, unfortunately till date, you cannot use it everywhere on the web. However, most...
Towards an Extra Layer of Security: The C...
80円 By now, we know what two-factor authentication (TFA) is and how it can be an extremely useful security tool. In this concluding part of the article, we will discuss the advantages and disadvantages of TFA, along with various tokens/services available in the market for activating TFA.
Trustworthy Computing and Services
6,076円 This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered ...
The Concise Guide to SSL/TLS for DevOps
752円 This book, 'A Concise Guide to SSL/TLS for DevOps' is an introduction to SSL & TLS in application and operational environments and as such is a more technical in depth study than is typically the case in the Executive and Management series. This book aims to cover the theory and practice of SSL i...
A Practical Guide Wireshark Forensics
550円 A practical guide to capturing and analyzing network traffic using Wireshark. This book shows real world network traffic analysis and shows the techniques that DevOp teams need to use to detect malicious behavior. Additionally it shows how DevOps can translate packet captures into valuable inform...
Detection of Intrusions and Malware, and ...
6,076円 This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. ...
Data and Applications Security and Privac...
6,076円 This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and se...
All About Computers and Internet Today
752円 Hi Everyone, We have created this e-magazine for any IT experts out there to contribute and express on any IT knowledge in our article sections. Well this is our first issue of the month. We hope the IT community and the readers will benefit from all the articles we have checked and chosen for th...
Digital-Forensics and Watermarking
6,076円 This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully re...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!