IT-Governance, das vorausschauende, strukturierte strategische Planen und Steuern der IT, IT-Risikomanagement, das Beherrschen auch neuartiger IT-Risiken und IT-Compliance, das Beachten und Umsetzen relevanter Vorgaben gewinnen insbesondere im Zeitalter der digitalen Transformation zunehmend an Bedeutung.
This book constitutes revised papers from the International Workshops held at the 18th International Conference on Business Process Management, BPM 2020, during September 13-18, 2020.
This book constitutes late breaking papers from the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020.
This book describes how equipping buildings with smart meters is essential to improve the prediction of energy costs within smart grids and to help end-users optimize their energy consumption.
This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems.
This book provides insight and expert advice on the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for the growing Internet of Things (IoT) in our connected world.
This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation's society and economy, and assesses the resilience of these networks to intentional attacks.
This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a task that humans perform routinely and effortlessly in our daily lives - still poses great challenges, especially in unconstrained conditions.
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world.
The CompTIA Linux+ Certification"e; book - the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification.
The book deals with the effective operation of the rules related to biomedical research and pays attention to the activities of the national legislatures of the 27 Member States in the field of scientific research.
The book deals with the effective operation of the rules related to biomedical research and pays attention to the activities of the national legislatures of the 27 Member States in the field of scientific research.
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems.
Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool.
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders).
Master the art of designing, developing, and operating secure infrastructures on Google CloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
Master designing, developing, and operating secure infrastructures on Google cloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
This book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member States, but to do so in an interdisciplinary manner, involving scholars from diverse backgrounds - ranging from legal experts to ICT and engineering professionals.
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic.
This book has unique features that set it apart from conventional books on the prevention of system failures in that it provides a method that views human activities from a meta-methodological perspective based upon an inter-disciplinary understanding of human activities.
Called "e;the leader in the Snort IDS book arms race"e; by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.
Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network.
This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks.
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standardsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesFamiliarize yourself with the clauses and control references of ISO/IEC 27001:2022Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022Book DescriptionISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes.
Shaping a World of Respect: Guarding the Innocence of YouthEmbark on a transformative journey with Smart Boundaries: Safe Children A Parents Handbook, your essential guide to cultivating an environment where innocence thrives and awareness grows.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies.