By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs).
Exploring many aspects of blockchain technologies and providing an overview of the latest cuttingedge developments along with their diversified business applications, this volume addresses the challenges, emerging issues, and problems in classical centralized architecture and covers how blockchain platforms provide almost magical solutions and novel services for improving business processes.
Exploring many aspects of blockchain technologies and providing an overview of the latest cuttingedge developments along with their diversified business applications, this volume addresses the challenges, emerging issues, and problems in classical centralized architecture and covers how blockchain platforms provide almost magical solutions and novel services for improving business processes.
Master the art of designing, developing, and operating secure infrastructures on Google CloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17-18, 2023.
The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry.
The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry.
Numerous advancements are being brought in and incorporated into the cloud domain with the aim of realizing a trove of deeper and decisive automations.
Numerous advancements are being brought in and incorporated into the cloud domain with the aim of realizing a trove of deeper and decisive automations.
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand and analyze various modern cyber threats and attackers' techniquesGain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logsExplore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques.
This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17-18, 2023.
This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at Brunel University, London, on 20-23 February 2023.
The book is a collection of high-quality research papers presented at 7th International Conference on Internet of Things and Connected Technologies (ICIoTCT 2022), held at Indian Institute of Technology (IIT) Patna, Bihar, India during 29-30 September 2022.
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Analytics and Insights (ICDAI 2023), organized by Techno International, Kolkata, India, during May 11-13, 2023.
This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at Brunel University, London, on 20-23 February 2023.
This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at Brunel University, London, on 20-23 February 2023.
The book is a collection of high-quality research papers presented at 7th International Conference on Internet of Things and Connected Technologies (ICIoTCT 2022), held at Indian Institute of Technology (IIT) Patna, Bihar, India during 29-30 September 2022.
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Analytics and Insights (ICDAI 2023), organized by Techno International, Kolkata, India, during May 11-13, 2023.
This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at Brunel University, London, on 20-23 February 2023.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This volume presents peer-reviewed contributions from the 10th International Conference on Experimental Vibration Analysis for Civil Engineering Structures (EVACES), held in Milan, Italy on August 30-September 1, 2023.
This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17-18, 2023.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
In today's fast-paced digital landscape, organizations face an ever-increasing volume of data that holds immense potential for driving business success.
This book is your practical and comprehensive guide to learning Google Cloud Platform (GCP) for data science, using only the free tier services offered by the platform.
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand and analyze various modern cyber threats and attackers' techniquesGain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logsExplore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This volume presents peer-reviewed contributions from the 10th International Conference on Experimental Vibration Analysis for Civil Engineering Structures (EVACES), held in Milan, Italy on August 30-September 1, 2023.
As the world enters the era of big data, there is a serious need to give a semantic perspective to the data in order to find unseen patterns, derive meaningful information, and make intelligent decisions.
As the world enters the era of big data, there is a serious need to give a semantic perspective to the data in order to find unseen patterns, derive meaningful information, and make intelligent decisions.
This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17-18, 2023.
This book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19-21, 2022.
The volume is a collection of best selected research papers presented at International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2022) held at BITS Pilani, K K Birla Goa Campus, Goa, India during 23 - 25 September 2022.