Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There a
Computer networks --- Computer security --- Computer crimes --- Réseaux d'ordinateurs --- Sécurité informatique --- Criminalité informatique --- Access control --- Handbooks, manuals, etc. --- Security measures --- Accès --- Contrôle --- Guides, manuels, etc. --- Sécurité --- Mesures --- Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Listing 1 - 1 of 1 |
Sort by
|