This book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19-21, 2022.
The volume is a collection of best selected research papers presented at International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2022) held at BITS Pilani, K K Birla Goa Campus, Goa, India during 23 - 25 September 2022.
Linux-Server aufsetzen, administrieren und absichern: Arnold Willemer zeigt Ihnen in diesem Buch, wie Sie Ihren Debian/GNU Linux oder Ubuntu Server von Anfang an gut im Griff haben.
This book explores the applications and advancements of federated learning across diverse sectors, focusing on its integration with cutting- edge technologies like Internet of Things (IoT), artificial intelligence (AI), blockchain, and digital twins.
This book studies the evolution of sustainable green smart cities and demonstrates solutions for green environmental issues using modern industrial IoT solutions.
This book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16-17 February 2024.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Start from scratch and develop the essential skills needed to create, deploy, and manage cloud-native applications using Docker with the latest edition of Docker Deep DiveKey FeaturesGet a solid understanding of Docker and containersOvercome common problems while containerizing an applicationMaster Docker commands needed for creating, deploying, and running applicationsBook DescriptionMost applications, even the funky cloud-native microservices ones, need high-performance, production-grade infrastructure to run on.
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.
In February 2020, the Coronavirus pandemic became a worldwide health emergency, and in April of that year, the ITU and the WHO created a joint declaration to show their commitment to using ICTs to overcome the pandemic.
Computational Intelligence in Urban Infrastructure consolidates experiences and research results in computational intelligence and its applications in urban infrastructure.
Computational Intelligence in Urban Infrastructure consolidates experiences and research results in computational intelligence and its applications in urban infrastructure.
Become a security automation expert and build solutions that save time while making your organization more secureKey FeaturesWhat's insideAn exploration of the SOAR platform's full features to streamline your security operationsLots of automation techniques to improve your investigative abilityActionable advice on how to leverage the capabilities of SOAR technologies such as incident management and automation to improve security postureBook DescriptionWhat your journey will look likeWith the help of this expert-led book, you ll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
This book provides a timely introduction to the methodology of Intelligent Bridge Maintenance and Management (IBM&M) and a comprehensive synthesis of emerging digital technologies for realizing IBM&M.
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into using machine learning and AI for automating threat detection and responseGet a thorough understanding of Python essentials, tailored for security professionalsDiscover real-world applications of Python automation for enhanced securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigned to address the most common pain point for security teams-scalability-Security Automation with Python leverages the author's years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization's overall security posture.
Master best practices for success with all aspects of Azure cloud storage For cloud environments to operate and scale as they should, their storage components must be designed and configured well.
Libro especializado que se ajusta al desarrollo de la cualificación profesional y adquisición del certificado de profesionalidad "IFCT0410 - ADMINISTRACIÓN Y DISEÑO DE REDES DEPARTAMENTALES".
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks.
This new volume covers a diverse range of advances in intelligent systems that involve applications of AI and digital automation, such as machine learning, deep learning, sectional convolutional neural network models, and much more.
Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineers, offers a real-world, hands-on guide to deploying automated architectures with a focus on segmentation at any scale--from proof-of-concept to large, mission-critical infrastructures.