Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05), organized in India, during 29 February to 1 March, 2024.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05), organized in India, during 29 February to 1 March, 2024.
This book contains original, peer-reviewed research articles from the 5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, held in Hyderabad, India on 28-29 March 2024.
Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language).
Securing Enterprise Networks with Cisco Meraki Discover the Power of Cisco Meraki Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
Embark on a journey to business evolution grounded in the real-world experiences and challenges faced by those at the forefront of the Web2 revolution.
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for the CC Certified in Cybersecurity exam.
Work on 10 practical projects, each with a blueprint for a different machine learning technique, and apply them in the real world to fight against cybercrimePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to frame a cyber security problem as a machine learning problemExamine your model for robustness against adversarial machine learningBuild your portfolio, enhance your resume, and ace interviews to become a cybersecurity data scientistBook DescriptionMachine learning in security is harder than other domains because of the changing nature and abilities of adversaries, high stakes, and a lack of ground-truth data.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2023), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, from 02-04 November, 2023.
Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratchPurchase of the print or Kindle book includes a free eBook in PDF format.
Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27-29 October 2023.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection.
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical.
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Preparation for the Certified Penetration Testing Engineer (CPTE) examinationPenetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack.