Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2024), held in NJSC South Kazakhstan State Pedagogical University, Shymkent City, Kazakhstan, during April 29-30, 2024.
The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2024), held in NJSC South Kazakhstan State Pedagogical University, Shymkent City, Kazakhstan, during April 29-30, 2024.
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into using machine learning and AI for automating threat detection and responseGet a thorough understanding of Python essentials, tailored for security professionalsDiscover real-world applications of Python automation for enhanced securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigned to address the most common pain point for security teams-scalability-Security Automation with Python leverages the author's years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization's overall security posture.