Buy futurefoundation.eu ?

Products related to Secure:


  • Secure Systems Development with UML
    Secure Systems Development with UML

    Attacks against computer systems can cause considerable economic or physical damage.High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jürjens presents the UML extension UMLsec for secure systems development.It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML.Established rules of security engineering can be encapsulated and hence made available even to developers who are not specialists in security.As one example, Jürjens uncovers a flaw in the Common Electronic Purse Specification, and proposes and verifies a correction. With a clear separation between the general description of his approach and its mathematical foundations, the book is ideally suited both for researchers and graduate students in UML or formal methods and security, and for advanced professionals writing critical applications.

    Price: 99.99 £ | Shipping*: 0.00 £
  • Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology
    Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology

    The wide range of topics that the book covers are organised into sections reflecting a cradle to grave view of how entrepreneurial, innovative, and tech-savvy approaches can advance environmental sustainability in the fashion sector.These sections include: sustainable materials; innovation in design, range planning and product development; sustainable innovations in fashion supply chains; sustainable innovations in fashion retail and marketing; sustainable alternatives for end-of-life and circular economy initiatives; and more sustainable alternative fashion business models.

    Price: 90.50 £ | Shipping*: 0.00 £
  • Deploying Secure Containers for Training and Development
    Deploying Secure Containers for Training and Development

    In the book we will be talking about Deploying Secure Containers for Training and Development.The book covers the technology behind Linux-based containers and what they can be used for.Details on how to use containers in training and development are also provided.

    Price: 27.99 £ | Shipping*: 0.00 £
  • Information Technology for Management : Driving Digital Transformation to Increase Local and Global Performance, Growth and Sustainability
    Information Technology for Management : Driving Digital Transformation to Increase Local and Global Performance, Growth and Sustainability

    Comprehensive coverage of developments in the real world of IT management, provides a realistic and up-to-date view of IT management in the current business environment Information Technology for Management provides students in all disciplines with a solid understanding of IT concepts, terminology, and the critical drivers of business sustainability, performance, and growth.Employing a blended learning approach that presents content visually, textually, and interactively, this acclaimed textbook helps students with different learning styles easily comprehend and retain information.Throughout the text, the authors provide real-world insights on how to support the three essential components of business process improvements: people, processes, and technology.Information Technology for Management integrates a wealth of classroom-tested pedagogical tools, including 82 real-world cases highlighting the successes and failures of IT around the world, interactive exercises and activities, whiteboard animations for each learning objective, high-quality illustrations and images, boxed sections highlighting various job roles in IT management and giving examples of how readers will use IT in their career as a marketing, accounting, finance, human resource management, productions and operations management, strategic management, or information technology professional, or as an entrepreneur, and illustrative innovative uses of information technology.Now in its thirteenth edition, this leading textbook incorporates the latest developments in the field of IT management, based on feedback from practitioners from top-tier companies and organizations.New topics include Network-as-a-Service (NaaS), hybrid cloud, cryptocurrency, intent-based networking, edge analytics, digital twin technology, natural language generation, and many more.New “How will YOU use IT” boxes directly inform students in all majors about how IT will impact their careers.Throughout this edition, greater emphasis is placed on the use and impact of IT on global business, globalization, and sustainability.Equipping readers with the knowledge they need to become better IT professionals and more informed users of IT, Information Technology for Management, Thirteenth Edition, is the perfect textbook for undergraduate and graduate courses on computer information systems or management information systems, general business and IT curriculum, and corporate-in-house-training or executive programs in all industry sectors.

    Price: 146.95 £ | Shipping*: 0.00 £
  • How can one secure jobs in event technology?

    Securing jobs in event technology can be achieved by obtaining relevant education and training in fields such as computer science, information technology, or event management. Building a strong portfolio of technical skills, such as proficiency in software and hardware used in event technology, can also make one more competitive in the job market. Networking with professionals in the event industry and seeking out internships or entry-level positions in event technology can provide valuable experience and connections. Additionally, staying updated on the latest trends and advancements in event technology can help one stand out to potential employers.

  • Is the Samsung Secure Folder secure?

    The Samsung Secure Folder is designed to be a secure and private space on Samsung devices, using a combination of hardware and software security measures to protect the data stored within it. It uses Samsung Knox, a defense-grade security platform, to safeguard the contents of the folder, including documents, photos, and apps, with encryption and authentication methods. While no system can be completely immune to security breaches, the Samsung Secure Folder is considered to be a secure option for users looking to protect their sensitive information on their devices.

  • How do I secure data and game progress when changing phones?

    To secure your data and game progress when changing phones, you can use cloud storage services like Google Drive or iCloud to backup your game data. Many games also offer account systems that allow you to save your progress online. Make sure to link your game account to an email or social media account to easily transfer your progress to your new phone. Additionally, you can use third-party apps specifically designed for transferring data between phones to ensure a smooth transition.

  • Is ProtonMail secure?

    Yes, ProtonMail is considered secure due to its end-to-end encryption, which means that only the sender and recipient can read the emails. Additionally, ProtonMail is based in Switzerland, known for its strong privacy laws. The service also offers features like two-factor authentication to enhance security further. Overall, ProtonMail is a popular choice for those looking for a secure email service.

Similar search terms for Secure:


  • Disaster Resilience and Sustainability : Japan’s Urban Development and Social Capital
    Disaster Resilience and Sustainability : Japan’s Urban Development and Social Capital

    This book examines urban planning and infrastructure development in Japanese cities after the second world war as a way to mitigate the risks of disasters while pursuing sustainable development.It looks at the benefits of social capital and how communities organise to tackle problems during the recovery phase after a disaster.The book also illustrates with case studies to highlight community attitudes which improve recovery outcomes. The book underlines challenges such as ageing and depopulation which Japan would face should the next disaster occur.These demographic shifts are causing difficulties among neighbourhood associations at a time when communities need to effectively support each other.Nakanishi explains why overcoming these societal issues is imperative for sustainability and the need for a comprehensive approach which would integrate smart technology. This book will be of interest to scholars in city development and planning, urban studies and human geography, as well as those interested in building resilient communities.

    Price: 19.99 £ | Shipping*: 3.99 £
  • Pioneering Progress : American Science, Technology, and Innovation Policy
    Pioneering Progress : American Science, Technology, and Innovation Policy


    Price: 48.00 £ | Shipping*: 0.00 £
  • On the Road to Resilience : Ensuring Secure IoV Networks
    On the Road to Resilience : Ensuring Secure IoV Networks

    This book delves into the critical realm of trust management within the Internet of Vehicles (IOV) networks, exploring its multifaceted implications on safety and security which forms part of the intelligent transportation system domain. IoV emerges as a powerful convergence, seamlessly amalgamating the Internet of Things (IoT) and the intelligent transportation systems (ITS).This is crucial not only for safety-critical applications but is also an indispensable resource for non-safety applications and efficient traffic flows.While this paradigm holds numerous advantages, the existence of malicious entities and the potential spread of harmful information within the network not only impairs its performance but also presents a danger to both passengers and pedestrians.Exploring the complexities arising from dynamicity and malicious actors, this book focuses primarily on modern trust management models designed to pinpoint and eradicate threats.This includes tackling the challenges regarding the quantification of trust attributes, corresponding weights of these attributes, and misbehavior detection threshold definition within the dynamic and distributed IoV environment. This will serve as an essential guide for industry professionals and researchers working in the areas of automotive systems and transportation networks.Additionally, it will also be useful as a supplementary text for students enrolled in courses covering cybersecurity, communication networks, and human factors in transportation. Sarah Ali Siddiqui is a CSIRO Early Research Career (CERC) Fellow in the Cyber Security Automation and Orchestration Team, Data61, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Australia.Adnan Mahmood is a Lecturer in Computing – IoT and Networking at the School of Computing, Macquarie University, Sydney, Australia. Quan Z. (Michael) Sheng is a Distinguished Professor and Head of the School of Computing, at Macquarie University, Sydney, Australia. Hajime Suzuki is a Principal Research Scientist at the Cybersecurity & Quantum Systems Group, Software and Computational Systems Research Program, Data61, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Australia. Wei Ni is a Principal Scientist at the Commonwealth Scientific and Industrial Research Organisation, a Technical Expert at Standards Australia, a Conjoint Pro-fessor at the University of New South Wales, an Adjunct Professor at the University of Technology Sydney, and an Honorary Professor at Macquarie University, Sydney, Australia.

    Price: 44.99 £ | Shipping*: 0.00 £
  • Digital Transformation for Business Sustainability and Growth in Emerging Markets
    Digital Transformation for Business Sustainability and Growth in Emerging Markets

    Digital transformation in organisations can improve business agility, operational efficiency, customer service, and contribute to sustainability initiatives.Digital transformation isn’t always easy to implement; organisations can experience resistance to change and a lack of skilled employees. While there is extensive research on digital transformation, there is a lack of research that focuses specifically on emerging markets.Digital Transformation for Business Sustainability and Growth in Emerging Markets explores the rich context of emerging markets, which present unique challenges for digital transformation, including cultural differences, limited access to technology, and regulatory hurdles in emerging markets.The book includes topics like Turbo boosting, industry 4.0, quantum, computing, Generative AI Adoption Sustainable Digitalisation etc and their role in sustainability of the business. Digital Transformation for Business Sustainability and Growth in Emerging Markets addresses the challenges and opportunities afforded by digital transformations to help businesses build a clear strategy, invest in building digital capabilities, and foster a culture of innovation and continuous improvement.

    Price: 85.00 £ | Shipping*: 0.00 £
  • Is email secure?

    Email is not completely secure. While most email providers use encryption to protect the contents of emails while they are in transit, there are still vulnerabilities that can be exploited by hackers. Additionally, emails can be intercepted or accessed by unauthorized parties if the sender or recipient's email account is compromised. To enhance email security, it is recommended to use strong, unique passwords, enable two-factor authentication, and avoid sending sensitive information via email whenever possible.

  • Is WhatsApp secure?

    WhatsApp uses end-to-end encryption to secure messages, meaning only the sender and recipient can read them. This encryption ensures that messages are protected from hackers, governments, and even WhatsApp itself. However, like any technology, there are potential vulnerabilities that could be exploited. Overall, WhatsApp is considered a secure messaging platform, but users should still be cautious about sharing sensitive information.

  • Is iCloud secure?

    iCloud is generally considered to be secure, as it uses encryption to protect user data both in transit and at rest. However, like any online service, there is always a risk of potential security breaches. Users can enhance the security of their iCloud accounts by enabling two-factor authentication and regularly updating their passwords. Overall, while iCloud has security measures in place, it is important for users to take precautions to protect their data.

  • Is Telegram secure?

    Telegram is considered to be a secure messaging platform due to its use of end-to-end encryption for messages, calls, and media shared between users. It also offers features like self-destructing messages and the ability to enable two-step verification for added security. However, like any online platform, users should still exercise caution and be mindful of the information they share to ensure their privacy and security.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.