| |
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...
Editeur :
Springer
Parution :
2020-04-23
PDF, ePub
|
Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit...
Editeur :
Springer Vieweg
Parution :
2020-04-07
PDF, ePub
|
This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...
Editeur :
Springer
Parution :
2020-03-11
PDF, ePub
|
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...
Editeur :
Apress
Parution :
2020-02-25
PDF, ePub
|
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...
Editeur :
Apress
Parution :
2019-12-18
PDF, ePub
|
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...
Editeur :
Apress
Parution :
2019-12-17
PDF, ePub
|
Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and...
Editeur :
SAGE Publications Ltd
Parution :
2019-12-15
PDF
|
Water supply and water management services are among the most critical infrastructures in society, providing safe and affordable drinking water, managing wastewater to avoid floods and environmental pollution, and enabling the reuse and replenishment of scarce water...
Editeur :
SAGE Publications Ltd
Parution :
2019-12-15
PDF
|
This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world.This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an...
Editeur :
Palgrave Pivot
Parution :
2019-11-16
Collection :
Crime Prevention and Security Management
PDF, ePub
|
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...
Editeur :
Springer
Parution :
2019-11-14
Collection :
Advances in Computer Vision and Pattern Recognition
PDF, ePub
|
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...
Editeur :
Apress
Parution :
2019-11-06
PDF, ePub
|
A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...
Editeur :
Sybex
Parution :
2019-10-24
PDF, ePub
|
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.
Cryptography is the lifeblood...
Editeur :
Apress
Parution :
2019-09-27
PDF, ePub
|
The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...
Editeur :
Wiley
Parution :
2019-09-13
PDF, ePub
|
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks....
Editeur :
Springer
Parution :
2019-09-03
PDF, ePub
|
Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical...
Editeur :
SAGE Publications Ltd
Parution :
2019-08-15
PDF
|
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Editeur :
Apress
Parution :
2019-08-13
PDF, ePub
|
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...
Editeur :
Springer
Parution :
2019-06-05
Collection :
Advances in Intelligent Systems and Computing
PDF, ePub
|
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...
Editeur :
Apress
Parution :
2019-03-30
PDF, ePub
|
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...
Editeur :
Apress
Parution :
2019-03-30
PDF, ePub
|