Protect your cloud, virtual, and on-premises environments by implementing Veeam's powerful backup and replication technologyKey FeaturesGain in-depth knowledge of CDP and hardened repositories that you can use in your virtual environmentExplore Veeam's monitoring and reporting utility - Veeam ONE - along with Linux proxy enhancementsWork with the new Veeam Disaster Recovery Orchestrator (Orchestrator) for testing failovers and backupsBook DescriptionVeeam is one of the leading modern data protection solutions, making it a necessary skill for anyone responsible for securing virtual environments.
This book presents best selected papers presented at the Second International Conference on Emerging Technologies for Computing, Communication and Smart Cities (ETCCS 2021) held on 21-22 August 2021 at BFCET, Punjab, India.
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012.
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013.
This volume constitutes the proceedings of the 12th International Conference on Cloud Computing, CLOUD 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019.
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside?
Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language).
This book constitutes the refereed proceedings of the 5th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2023, which was held in Amsterdam, The Netherlands, during November 21-22, 2023.
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P).
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019.
The second volume of this book includes selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, which was held at Brunel University, London, on February 27-28, 2019.
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015.
This book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020.
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curacao, during March 4-8, 2024.
This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This book features high-quality research papers presented at the 3rd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2021), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 24 - 25 April 2021.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05), organized in India, during 29 February to 1 March, 2024.
This book constitutes the thoroughly refereed proceedings of the 31st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, held in Montreal, QC, Canada, in June 2018.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023.
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019.
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world.
This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications.
This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others.
Mit dem Praxisbuch bereiten die Autoren Orientierungswissen für die Modernisierung der Informations- und Kommunikations-Infrastrukturen für die Unternehmens-IT der Zukunft auf.
The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018.