Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand and analyze various modern cyber threats and attackers' techniquesGain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logsExplore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This volume presents peer-reviewed contributions from the 10th International Conference on Experimental Vibration Analysis for Civil Engineering Structures (EVACES), held in Milan, Italy on August 30-September 1, 2023.
As the world enters the era of big data, there is a serious need to give a semantic perspective to the data in order to find unseen patterns, derive meaningful information, and make intelligent decisions.
As the world enters the era of big data, there is a serious need to give a semantic perspective to the data in order to find unseen patterns, derive meaningful information, and make intelligent decisions.
This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17-18, 2023.
This book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19-21, 2022.
The volume is a collection of best selected research papers presented at International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2022) held at BITS Pilani, K K Birla Goa Campus, Goa, India during 23 - 25 September 2022.
This book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19-21, 2022.
The volume is a collection of best selected research papers presented at International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2022) held at BITS Pilani, K K Birla Goa Campus, Goa, India during 23 - 25 September 2022.
Linux-Server aufsetzen, administrieren und absichern: Arnold Willemer zeigt Ihnen in diesem Buch, wie Sie Ihren Debian/GNU Linux oder Ubuntu Server von Anfang an gut im Griff haben.
This book explores the applications and advancements of federated learning across diverse sectors, focusing on its integration with cutting- edge technologies like Internet of Things (IoT), artificial intelligence (AI), blockchain, and digital twins.
This book studies the evolution of sustainable green smart cities and demonstrates solutions for green environmental issues using modern industrial IoT solutions.
This book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16-17 February 2024.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Start from scratch and develop the essential skills needed to create, deploy, and manage cloud-native applications using Docker with the latest edition of Docker Deep DiveKey FeaturesGet a solid understanding of Docker and containersOvercome common problems while containerizing an applicationMaster Docker commands needed for creating, deploying, and running applicationsBook DescriptionMost applications, even the funky cloud-native microservices ones, need high-performance, production-grade infrastructure to run on.
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.
In February 2020, the Coronavirus pandemic became a worldwide health emergency, and in April of that year, the ITU and the WHO created a joint declaration to show their commitment to using ICTs to overcome the pandemic.
Computational Intelligence in Urban Infrastructure consolidates experiences and research results in computational intelligence and its applications in urban infrastructure.
Computational Intelligence in Urban Infrastructure consolidates experiences and research results in computational intelligence and its applications in urban infrastructure.
Become a security automation expert and build solutions that save time while making your organization more secureKey FeaturesWhat's insideAn exploration of the SOAR platform's full features to streamline your security operationsLots of automation techniques to improve your investigative abilityActionable advice on how to leverage the capabilities of SOAR technologies such as incident management and automation to improve security postureBook DescriptionWhat your journey will look likeWith the help of this expert-led book, you ll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
This book provides a timely introduction to the methodology of Intelligent Bridge Maintenance and Management (IBM&M) and a comprehensive synthesis of emerging digital technologies for realizing IBM&M.
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into using machine learning and AI for automating threat detection and responseGet a thorough understanding of Python essentials, tailored for security professionalsDiscover real-world applications of Python automation for enhanced securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigned to address the most common pain point for security teams-scalability-Security Automation with Python leverages the author's years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization's overall security posture.