Explore the serverless world using Amazon Web Services (AWS) and develop various architectures, including those for event-driven and disaster recovery designs.
Network revolutions of the past have shaped the present and set the stage for the revolution we are experiencing todayIn an era of seemingly instant change, it's easy to think that today's revolutions in communications, business, and many areas of daily life are unprecedented.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
We are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization.
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
This book aims at scaffolding language teachers, pre-service language teachers, and undergraduate students in the process of teaching and material design by helping them to become informed decision-makers in this endeavour.
Master designing, developing, and operating secure infrastructures on Google cloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection.
Rails 7 completely redefines what it means to produce fantastic user experiences and provides a way to achieve all the benefits of single-page applications - at a fraction of the complexity.
This book covers different aspects of Internet of Drones (IoD) including fundamentals in drone design, deployment challenges, and development of applications.
This book covers different aspects of Internet of Drones (IoD) including fundamentals in drone design, deployment challenges, and development of applications.
This book includes original, peer-reviewed research articles from International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2022), held in VNR Vignana Jyoythi Institute of Engineering and Technology (VNR VJIET), Hyderabad, Telangana, India, during August 11-12, 2022.
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022.
This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.
This book includes peer-reviewed articles from the 7th International Conference on Geotechnics, Civil Engineering and Structures (CIGOS 2024) held on April 4-5 in Ho Chi Minh City, Vietnam.
Mit diesem Handbuch identifizieren Sie Risiken, bauen wegweisendes effizienzförderndes Handlungswissen auf und sichern so Ihr Unternehmen sowie seine Prozesse, Ressourcen und die Organisation ab.
This book includes high-quality papers presented at Second International Conference on Computational Electronics for Wireless Communications (ICCWC 2022), held at National Institute of Technology, Surathkal, Karnataka, India, during June 9 - 10, 2022.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August - September 2022.
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by means of security codes.
This book presents the security and privacy challenges of the smart home following the logic of "e;terminal device - voice interface - application platform"e;.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.