Hardcover. Condizione: New. Hardcover. Publisher overstock, may contain remainder mark on edge.
Condizione: New.
Condizione: As New. Unread book in perfect condition.
EUR 76,99
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: As New. Unread book in perfect condition.
EUR 92,36
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Hardcover. Condizione: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less.
Condizione: New.
HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
Condizione: New.
EUR 119,96
Quantità: 1 disponibili
Aggiungi al carrelloHRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
EUR 119,77
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New.
EUR 122,07
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Condizione: New. pp. 300.
EUR 136,45
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 1st edition. 426 pages. 9.00x6.25x1.00 inches. In Stock.
EUR 90,34
Quantità: 1 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts.The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced.This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics.
EUR 149,22
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 300.
EUR 122,04
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. Razvan Beuran is researcher with the National Institute of Information and Communications Technology, Hokuriku Research Center, Ishikawa, Japan. He received the joint Ph.D. degree in Electrical Engineering and Computer Science from Poli.
EUR 134,00
Quantità: 1 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Introduction to Network Emulation | Razvan Beuran | Buch | Einband - fest (Hardcover) | Englisch | 2012 | Jenny Stanford Publishing | EAN 9789814310918 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Lingua: Inglese
Editore: Pan Stanford Publishing Pte Ltd Nov 2012, 2012
ISBN 10: 9814310913 ISBN 13: 9789814310918
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 150,70
Quantità: 1 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Neuware - Emulation is a hybrid experimentation technique intended to bridge the gap between simulation and real-world testing. The key idea of emulation is to reproduce in real time and in a controlled manner the essential functionality of a system, so that it can interact with other real systems that can thus be evaluated. This book describes the technique of network emulation and compares it with the other experimental approaches: the scholarly analytical modeling, the popular network simulation, and the demanding real-world testing. To emphasize the practical aspects related to emulation, this book presents a large number of examples of network emulators on the market, as well as provides an in-depth analysis of a case study, the wireless network emulation testbed called QOMB.
Lingua: Francese
Editore: Presses Académiques Francophones, 2012
ISBN 10: 383817299X ISBN 13: 9783838172996
Da: moluna, Greven, Germania
EUR 70,87
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Francese
Editore: Presses Académiques Francophones, 2012
ISBN 10: 383817299X ISBN 13: 9783838172996
Da: preigu, Osnabrück, Germania
EUR 74,15
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Mesure de la qualité dans les réseaux informatiques | Une démarche pour mesurer et corréler les divers types de qualité au niveau du réseau et des utilisateurs | Razvan Beuran | Taschenbuch | 308 S. | Französisch | 2012 | Presses Académiques Francophones | EAN 9783838172996 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 70,24
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: new. Questo è un articolo print on demand.
Lingua: Inglese
Editore: Springer, Springer Apr 2025, 2025
ISBN 10: 9819605547 ISBN 13: 9789819605545
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 85,59
Quantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts.The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced.This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics. 340 pp. Englisch.
Da: moluna, Greven, Germania
EUR 72,89
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt.
Da: Majestic Books, Hounslow, Regno Unito
EUR 122,81
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 9819605547 ISBN 13: 9789819605545
Da: CitiRetail, Stevenage, Regno Unito
EUR 91,05
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: new. Hardcover. This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts.The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced.This book is addressed first to cybersecurity education and training practitioners and professionals, both in the academia and industry, who will gain knowledge about how to organize and conduct meaningful and effective cybersecurity training activities. In addition, researchers and postgraduate students will gain insights into the state-of-the-art research in the field of cybersecurity training so that they can broaden their research area and find new research topics. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Da: Majestic Books, Hounslow, Regno Unito
EUR 129,81
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 300 This item is printed on demand.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 123,45
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND.
Da: preigu, Osnabrück, Germania
EUR 75,65
Quantità: 5 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Cybersecurity Education and Training | Razvan Beuran | Buch | xvi | Englisch | 2025 | Springer | EAN 9789819605545 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu Print on Demand.