A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures.
This book introduces 6G enabled healthcare systems and helps readers understand state-of-the-art techniques and applications for future healthcare systems.
This book introduces 6G enabled healthcare systems and helps readers understand state-of-the-art techniques and applications for future healthcare systems.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
This book provides a timely introduction to the methodology of Intelligent Bridge Maintenance and Management (IBM&M) and a comprehensive synthesis of emerging digital technologies for realizing IBM&M.
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs).
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Get the most out of ACDs (automatic call distributors) and other complex systems in order to boost customer satisfaction and increase sales Includes three ready to use RFPs (request for proposals) for buying an ACD, computer telephony system, or recording
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.
Step into the next frontier of technology with The Quantum Internet Revolution, a groundbreaking exploration of the science, innovations, and transformative potential of quantum networking.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP Enterprise Wireless ENWLSD 300-425 and ENWLSI 300-430 exams.
The International Conference on Electronics, Information Technology and Intellectualization (ICEITI2014) was dedicated to build a high-level international academic communication forum for international experts and scholars.
In todays digital age, where data preservation is the cornerstone of security and communications, safeguarding this invaluable asset has never been more critical.
In todays digital age, where data preservation is the cornerstone of security and communications, safeguarding this invaluable asset has never been more critical.
This book explores the intersection of legal frameworks, healthcare innovation, and computational intelligence, shedding light on how emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping the medical landscape.