This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others.
Mit dem Praxisbuch bereiten die Autoren Orientierungswissen für die Modernisierung der Informations- und Kommunikations-Infrastrukturen für die Unternehmens-IT der Zukunft auf.
The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018.
Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers Key FeaturesLearn how to develop and program Windows malware applications using hands-on examplesExplore methods to bypass security mechanisms and make malware undetectable on compromised systemsUnderstand the tactics and tricks of real adversaries and APTs and apply their experience in your operationsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionMalware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016.
This two-volume set LNICST 301 -302 constitutes the post-conference proceedings of the Third EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2019, held in Nanjing, China, in September 2019.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics.
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011.
Over 40 recipes to help you set up and configure Linux networksAbout This BookMove beyond the basics of how a Linux machine works and gain a better understanding of Linux networks and their configurationImpress your peers by setting up and configuring a Linux server and its various network elements like a proThis is a hands-on solution guide to building, maintaining, and securing a network using LinuxWho This Book Is ForThis book is targeted at Linux systems administrators who have a good basic understanding and some prior experience of how a Linux machine operates, but want to better understand how various network services function, how to set them up, and how to secure them.
The book provides insights into International Conference on Smart Innovations in Communications and Computational Sciences (ICSICCS 2017) held at North West Group of Institutions, Punjab, India.
This book includes selected peer-reviewed papers presented at third International Conference on Computing and Communication Networks (ICCCN 2023), held at Manchester Metropolitan University, UK, during 17-18 November 2023.
This volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023.
This book constitutes the refereed post-proceedings of the 9th International Conference on Mobile, Secure, and Programmable Networking, MSPN 2023, held in Paris, France, during October 26-27, 2023.
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006.
This book constitutes the refereed post-conference proceedings of the 4th EAI International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2020, held in Nairobi, Kenya, in March 2020.
The six volume set LNCS 11361-11366 constitutes the proceedings of the 14th Asian Conference on Computer Vision, ACCV 2018, held in Perth, Australia, in December 2018.
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.
This book constitutes refereed proceedings of the First International Conference on Emerging Networking Architecture and Technologies, ICENAT 2022, held in Shenzhen, China, in October 2022.
This book constitutes the refereed proceedings of the Second International Joint Conference on Electronic Voting, E-Vote-ID 2017, held in Bregenz, Austria, in October 2017.
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.
This book constitutes the proceedings of the 13th International Conference on Cloud Computing, CLOUD 2020, held as part of SCF 2020, during September 18-20, 2020.
Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risksKey FeaturesImplement NIST RMF with step-by-step instructions for effective security operationsDraw insights from case studies illustrating the application of RMF principles in diverse organizational environmentsDiscover expert tips for fostering a strong security culture and collaboration between security teams and the businessPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis comprehensive guide provides clear explanations, best practices, and real-world examples to help readers navigate the NIST Risk Management Framework (RMF) and develop practical skills for implementing it effectively.
This money-saving collection covers every objective for the CompTIA Security+ exam and contains exclusive bonus contentThis fully updated test preparation bundle covers every topic on the current version of the CompTIA Security+ exam.
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc.
The two-volume set LNCS 10761 + 10762 constitutes revised selected papers from the CICLing 2017 conference which took place in Budapest, Hungary, in April 2017.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 36th International Conference on Advanced Information Systems Engineering, CAiSE 2024, which was held in Limassol, Cyprus, during June 2024.
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches.
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
This book constitutes refereed proceedings of the First International Conference on Emerging Networking Architecture and Technologies, ICENAT 2022, held in Shenzhen, China, in October 2022.
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
This book gathers high-quality research papers presented at the 6th International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2021) organized by Bhubaneswar Institute of Technology, Bhubaneswar, Odisha, India, during December 23-24, 2021.