Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical.
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches.
Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworksKey FeaturesGain insights into the latest antivirus evasion techniquesSet up a complete pentesting environment using Metasploit and virtual machinesDiscover a variety of tools and techniques that can be used with Kali LinuxBook DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system.
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devicesRetrieve and analyze data stored not only on mobile devices but also on the cloud and other connected mediumsUse the power of mobile forensics on popular mobile platforms by exploring different tips, tricks, and techniquesBook DescriptionMobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions.
Published in association with the Society of American Archivists Trusting Records in the Cloud presents key findings of InterPARES Trust, an international research project that has investigated issues of trust in, and trustworthiness of records and data online, with respect to privacy, accessibility, portability, metadata and ownership.
Social tagging (including hashtags) is used over platforms such as Twitter, Facebook, Instagram, Pinterest, WordPress, Tumblr and YouTube across countries and cultures meaning that one single hashtag can link information from a variety of resources.
'Devastating and urgent, this book could not be more timely' Caroline Criado Perez, award-winning and bestselling author of Invisible WomenDanielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone.
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume.
In this explosive memoir, a political consultant and technology whistleblower reveals the disturbing truth about the multi-billion-dollar data industry, revealing to the public how companies are getting richer using our personal information and exposing how Cambridge Analytica exploited weaknesses in privacy laws to help elect Donald Trump.
An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it-and explains why they have died todayMany think of the internet as an unprecedented and overwhelmingly positive achievement of modern human technology.
How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the futureWe live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
The subject of Artificial Intelligence (AI) is continuing on its journey of affecting each and every individual and will keep on this path in the times to come.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
This probing account of the erosion of privacy in America shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience.
This probing account of the erosion of privacy in America shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience.
Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered.
The new edition of this acclaimed book gives a fully updated overview of European data protection law affecting companies, incorporating the important legal developments which have taken place since the last edition was published.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
This book addresses the legal feasibility of ethnic data collection and positive action for equality and anti-discrimination purposes, and considers how they could be used to promote the Roma minority's inclusion in Europe.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.
Professionelle Hackerangriffe (sogenannte Advanced Persistent Threats) treffen heutzutage Regierungen, Unternehmen und sogar kritische Infrastrukturen wie Flughäfen oder Stromnetzbetreiber.
Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy perceptions and behaviors, a situational perspective needs to be adopted.