Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
"Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering" is an authoritative and comprehensive guide that delves deep i...Savoir plus
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications syst...Savoir plus
Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on the...Savoir plus
Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Secu...Savoir plus
Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by...Savoir plus
Improving State Voter Registration Databases outlines several actions that are needed to help make voter registration databases capable of sharing inf...Savoir plus
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implicat...Savoir plus
In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigoro...Savoir plus
Many election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections....Savoir plus
The focus of Software for Dependable Systems is a set of fundamental principles that underlie software system dependability and that suggest a differe...Savoir plus
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompass...Savoir plus
Cyber-physical systems (CPS) are "engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and ph...Savoir plus
We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in ...Savoir plus
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cybersp...Savoir plus
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help ...Savoir plus
The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class ...Savoir plus
Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. ...Savoir plus
Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making considers approaches to increasing the professionalization of the...Savoir plus
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other natio...Savoir plus
Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures -- transportation, information and telecommunications s...Savoir plus
Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean...Savoir plus