From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today's collaborative culturesone that works without compromising sensitive company data or slowing business down.
This book is written by two of the leading terrorist experts in the world - Malcolm Nance, NBC News/MSNBC terrorism analyst and Christopher Sampson, cyber-terrorist expert.
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security.
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more.
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual.
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual.
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second.
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second.
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events.
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements.
So far, little effort has been devoted to developing practical approaches on how to develop and deploy AI systems that meet certain standards and principles.
Discover the methodologies and best practices for getting started with Google cloud automation services including Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins to automate deployment of cloud infrastructure and applications.
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi.
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.
In this volume, contributors from academia, industry, and policy explore the inter-connections among economic development, socio-political democracy and defense and security in the context of a profound transformation, spurred by globalization and supported by the rapid development of information and communication technologies (ICT).
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications.
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide.