Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork.
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
Market and Technical Knowledge Integration in R&D-Intensive Companies explores the integration of market and technical knowledge within R&D-intensive companies.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
Network Tutorial delivers insight and understanding about network technology to managers and executives trying to get up to speed or stay current with the complex challenges of designing, constructing, maintaining, upgrading, and managing the netwo
The fifth generation (5G) of wireless communication technology is poised to revolutionize the way we connect and communicate with each other as well as with our devices and machines.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This book comprehensively discusses nature inspired algorithms, deep learning methods, applications of mathematical programming, and artificial intelligence techniques.
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
This book builds on the popular GARDENER OF GOVERNANCE article, which enjoys amazing traction in the professional community globally and has been translated into 25+ languages.
This book compiles recent research endeavors at the intersection of computer vision (CV) and deep learning for Internet of Vehicles (IoV) applications, which are pivotal in shaping the landscape of smart cities.