Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Defence in Depth is a critical concept in the field of cybersecurity, one that emphasizes a strategic layering of security measures to safeguard an or...Savoir plus
A celebrated theorist examines the conditions of work, employment, and unemployment in neoliberalism's flexible and precarious labor market. In Experi...Savoir plus
Cyber security involves the practices, technologies, and processes designed to protect networks, devices, programs, and data from unauthorized access,...Savoir plus
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help ...Savoir plus
Artificial Intelligence (AI) is a multidisciplinary field that simulates human intelligence through machines, enabling them to perform tasks that norm...Savoir plus
As Cyber Security AI continues to refine its methodologies and applications, professionals in the field are encouraged to stay informed of emerging te...Savoir plus
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help ...Savoir plus
This book serves as a comprehensive guide to the critical field of cyber security, designed for readers who seek to understand the complexities and im...Savoir plus
This book provides a comprehensive guide to the ISO 27001:2022 standards, focusing on the critical aspects of Information Security Management Systems ...Savoir plus
Practical help for managing distressing voice hearing experiences Have you ever heard someone talking to you, but when you turned around no one was th...Savoir plus
Advanced Persistent Threats (APTs) are complex, sophisticated cyber threats that infiltrate networks with the specific aim of stealing data or comprom...Savoir plus
This book provides a comprehensive guide to Cyber Security Supplier Assurance, addressing the critical role that supplier relationships play in safegu...Savoir plus
It perhaps seems impossible that any images of the Beatles remain unseen, but this fascinating book accompanied by a DVD of rare 8mm footage provides ...Savoir plus
Cyber security is essential in today's digital world, where organizations increasingly rely on technology to store and manage sensitive information. T...Savoir plus
Practical help for managing distressing voice hearing experiences Have you ever heard someone talking to you, but when you turned around no one was th...Savoir plus
An invaluable guide to dealing with distressing voices from leading experts Hearing voices can be highly distressing and impact our health, well-being...Savoir plus
This book provides a comprehensive exploration of cyber security frameworks, detailing their significance, structure, and implementation within variou...Savoir plus
The importance of cyber security cannot be overstated. With widespread use of the Internet, cyber threats are becoming increasingly sophisticated, mak...Savoir plus
This book provides a comprehensive exploration of risk management in the context of cyber security. It begins with foundational definitions and histor...Savoir plus
The Internet of Things, or IoT, refers to the network of interconnected devices that communicate and exchange data with one another over the internet....Savoir plus
This book provides an in-depth exploration of cyber resilience, a critical discipline in today's interconnected digital landscape. It covers essential...Savoir plus
The digital landscape in 2025 is characterized by a range of escalating threats that present significant challenges for both businesses and individual...Savoir plus
Cyber Security Operations is fundamentally about establishing a strategic and tactical framework for the management and protection of information asse...Savoir plus
An invaluable guide to dealing with distressing voices from leading experts Hearing voices can be highly distressing and impact our health, well-being...Savoir plus