Die IT-Welt befindet sich in einem ständigen Wandel, und Unternehmen stehen vor der Herausforderung, ihre IT-Services agil, effizient und zukunftssicher zu gestalten.
This book is a compilation of high-quality scientific papers presented at the 5th International Conference on Computer & Communication Technologies (IC3T 2023).
This book is a compilation of high-quality scientific papers presented at the 5th International Conference on Computer & Communication Technologies (IC3T 2023).
This book is a compilation of high-quality scientific papers presented at the 5th International Conference on Computer & Communication Technologies (IC3T 2023).
This book is a compilation of high-quality scientific papers presented at the 5th International Conference on Computer & Communication Technologies (IC3T 2023).
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense.
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense.
Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applicationsKey FeaturesExplore the practical application of secure software development methodologiesModel security vulnerabilities throughout the software development lifecycle (SDLC)Develop the skills to trace requirements, from requirements gathering through to implementationPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExtend your software development skills to integrate security into every aspect of your projects.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a task that humans perform routinely and effortlessly in our daily lives - still poses great challenges, especially in unconstrained conditions.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
With the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified.
Configure your Fedora Linux environment as a professional system administration workstation with this comprehensive guideKey FeaturesLeverage best practices and post-installation techniques to optimize your Fedora Linux workstationLearn how to optimize operating system tuning to enhance system administrationExplore Fedora Linux's virtualization resources using QEMU, KVM, and libvirt technologiesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionFedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers.
Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applicationsKey FeaturesExplore the practical application of secure software development methodologiesModel security vulnerabilities throughout the software development lifecycle (SDLC)Develop the skills to trace requirements, from requirements gathering through to implementationPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExtend your software development skills to integrate security into every aspect of your projects.
Prepare to pass the ISACA CRISC exam with confidence, gain high-value skills, and propel yourself toward IT risk management masteryKey FeaturesGain end-to-end coverage of all the topics assessed in the ISACA CRISC examApply and embed your learning with the help of practice quizzes and self-assessment questionsHave an in-depth guide handy as you progress in your enterprise IT risk management careerPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionFor beginners and experienced IT risk professionals alike, acing the ISACA CRISC exam is no mean feat, and the application of this advanced skillset in your daily work poses a challenge.
Prepare to pass the ISACA CRISC exam with confidence, gain high-value skills, and propel yourself toward IT risk management masteryKey FeaturesGain end-to-end coverage of all the topics assessed in the ISACA CRISC examApply and embed your learning with the help of practice quizzes and self-assessment questionsHave an in-depth guide handy as you progress in your enterprise IT risk management careerPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionFor beginners and experienced IT risk professionals alike, acing the ISACA CRISC exam is no mean feat, and the application of this advanced skillset in your daily work poses a challenge.
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals.