Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
The global shift toward delivering services online requires organizations to evolve from using traditional paper files and storage to more modern electronic methods.
The book provides a comprehensive examination of the integration of IoT technology into various industries and its impact on daily life, with a focus on the most recent advancements in the field.
This book provides insights into how to approach and utilise data science tools, technologies, and methodologies related to artificial intelligence (AI) in industrial contexts.
This book provides insights into how to approach and utilise data science tools, technologies, and methodologies related to artificial intelligence (AI) in industrial contexts.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.
The Age of Decentralization talks about various decentralization technologies including Web3, decentralized identity, and decentralized storage, and how they can be incorporated in traditional tech architectures to improve technical and business performance.
This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies.
This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies.
Census data is widely used by practitioners to understand demographic change, allocate resources, address inequalities, and make sound business decisions.
Census data is widely used by practitioners to understand demographic change, allocate resources, address inequalities, and make sound business decisions.
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsKey FeaturesUnderstand how to identify and manage business drivers during transitionsExplore Microsoft Identity and Access Management as a Service (IDaaS) solutionOver 40 playbooks to support your learning process with practical guidelinesBook DescriptionMicrosoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management.
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal.
Become an expert at managing enterprise identity infrastructure by leveraging Active DirectoryKey FeaturesExplore the new features in Active Directory Domain ServiceManage your Active Directory services for Windows Server 2016 effectivelyAutomate administrative tasks in Active Directory using PowerShell Core 6.
Become a certified Azure Architect and learn how to design effective solutions that span compute, security, networking, and developmentKey FeaturesDiscover how you can design and architect powerful and cost-effective solutions on Microsoft AzurePrepare to achieve AZ-303 certification with the help of mock tests and practice questionsEnhance your computing, networking, storage, and security skills to design modern cloud-based solutionsBook DescriptionFrom designing solutions on Azure to configuring and managing virtual networks, the AZ-303 certification validates your knowledge and skills for all this and much more.
Affecting every sector and country in the world, digital technology is changing the way citizens engage in society, companies conduct business, and governments deliver public services.
Affecting every sector and country in the world, digital technology is changing the way citizens engage in society, companies conduct business, and governments deliver public services.