In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense.
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals.
The adoption of serverless is on the rise, but until now, little guidance has been available for development teams that want to apply this technology on AWS.
This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2023), organized by Soft Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 14 to 15 July 2023.
Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applicationsKey FeaturesExplore the practical application of secure software development methodologiesModel security vulnerabilities throughout the software development lifecycle (SDLC)Develop the skills to trace requirements, from requirements gathering through to implementationPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExtend your software development skills to integrate security into every aspect of your projects.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2023), organized by Soft Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 14 to 15 July 2023.
This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150 is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy.
This book focuses on topics that business managers and project teams in global enterprises need to understand and follow to successfully deploy an Enterprise System (ES) for their organization.
As artificial intelligence (AI) becomes more and more woven into our everyday lives-and underpins so much of the infrastructure we rely on-the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.
This book offers an insightful exploration into the cutting edge of technological progress, focusing on how virtual reality (VR) and artificial intelligence (AI) are reshaping the way we learn and coach.
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals.
This book offers an insightful exploration into the cutting edge of technological progress, focusing on how virtual reality (VR) and artificial intelligence (AI) are reshaping the way we learn and coach.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
The adoption of serverless is on the rise, but until now, little guidance has been available for development teams that want to apply this technology on AWS.
The connected world paradigm effectuated through the proliferation of mobile devices, Internet of Things (IoT), and the metaverse will offer novel services in the coming years that need anytime, anywhere, high-speed access.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This project-oriented book presents a hands-on approach to identifying migration and performance issues with experience drawn from real-world examples.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
The book presents selected papers from the International Conference on Data Science and Communication (ICTDsC 2023) organized by the Department of Electronics and Communication Engineering and Department of Engineering Science and Humanities (DESH) Siliguri Institute of Technology, India during 23 - 24 March 2023 in Siliguri, India.
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a task that humans perform routinely and effortlessly in our daily lives - still poses great challenges, especially in unconstrained conditions.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
The book presents selected papers from the International Conference on Data Science and Communication (ICTDsC 2023) organized by the Department of Electronics and Communication Engineering and Department of Engineering Science and Humanities (DESH) Siliguri Institute of Technology, India during 23 - 24 March 2023 in Siliguri, India.