This two-volume set constitutes the refereed proceedings of the 13th International Conference on Telematics and Computing , WITCOM 2024, which took place in Mazatlan, Mexico, during November 4-8, 2024.
The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats.
This book gathers outstanding research papers presented at the International Conference on Frontiers in Computing and Systems (COMSYS 2020), held on January 13-15, 2019 at Jalpaiguri Government Engineering College, West Bengal, India and jointly organized by the Department of Computer Science & Engineering and Department of Electronics & Communication Engineering.
This is a technical overview of the field of adversarial machine learning which has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation.
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals "e;Effective SOX programs enlist the entire organization to build and monitor a compliant control environment.
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.
This book constitutes the refereed proceedings of the 19th International Conference on Information Security Practice and Experience, ISPEC 2024, held in Wuhan, China, during October 25-27, 2024.
This book examines the requirements, risks, and solutions to improve the security and quality of complex cyber-physical systems (C-CPS), such as production systems, power plants, and airplanes, in order to ascertain whether it is possible to protect engineering organizations against cyber threats and to ensure engineering project quality.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2024), held at London Metropolitan University, London, UK, during June 2024.
In today's fast-paced digital landscape, organizations face an ever-increasing volume of data that holds immense potential for driving business success.
This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, which was supposed to be held in Quy Nhon, Vietnam, in November 2020, but the conference was held virtually due to the COVID-19 pandemic.
Find and fix security vulnerabilities in your web applications with Burp SuiteKey FeaturesSet up and optimize Burp Suite to maximize its effectiveness in web application security testingExplore how Burp Suite can be used to execute various OWASP test casesGet to grips with the essential features and functionalities of Burp SuitePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWith its many features, easy-to-use interface, and fl exibility, Burp Suite is the top choice for professionals looking to strengthen web application and API security.
Discover network vulnerabilities and threats to design effective network security strategiesKey FeaturesPlunge into scanning techniques using the most popular toolsEffective vulnerability assessment techniques to safeguard network infrastructureExplore the Nmap Scripting Engine (NSE) and the features used for port and vulnerability scanningBook DescriptionNetwork scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited.
Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format.
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data.
This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12-14, 2023The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions.
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.
The book presents select proceedings of the 3rd International Conference on "e;Artificial-Business Analytics, Quantum and Machine Learning: Trends, Perspectives, and Prospects"e; (Com-IT-Con 2023) held at the Manav Rachna University in July 2023.
This book presents selected papers from the 19th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 11th International Conference on Orange Technology, Applications, and Tools, held on December 5-7, 2023, in Daegu, South Korea.
This fully updated, money-saving collection covers every objective on the CompTIA Security+ exam SY0-501 and contains bonus contentThis up-to-date test preparation bundle covers every objective on the latest version of the CompTIA Security+ exam.
Securing the Connected World: Exploring Emerging Threats and Innovative Solutions offers a detailed examination of the growing challenges and cutting-edge solutions in the realms of IoT (Internet of Things) and IoD (Internet of Drones).
The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia.
This book constitutes the proceedings of the 30th International Conference on Parallel and Distributed Processing Techniques, PDPTA 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.
This book is the 2nd volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024.
This book constitutes the refereed proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021.
This book constitutes the refereed proceedings of the 17th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2021, held as a virtual event, in August 2021.
The book is a collection of the best-selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications (ICMISC 2023) held in September 2023 at the CMR Institute of Technology, Hyderabad, Telangana, India.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2023, held in Poznan, Poland, in June 2023.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018.
Learn how to attack and defend the world s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security.
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*.