Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019In modern times, all individuals need to be knowledgeable about cybersecurity.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
With the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified.
Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker.
Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environmentKey FeaturesSecure your network, infrastructure, data, and applications on Microsoft Azure effectivelyIntegrate artificial intelligence, threat analysis, and automation for optimal security solutionsInvestigate possible security breaches and gather forensic evidence to prevent modern cyber threatsBook DescriptionAzure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI).
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical.
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches.
Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworksKey FeaturesGain insights into the latest antivirus evasion techniquesSet up a complete pentesting environment using Metasploit and virtual machinesDiscover a variety of tools and techniques that can be used with Kali LinuxBook DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system.
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devicesRetrieve and analyze data stored not only on mobile devices but also on the cloud and other connected mediumsUse the power of mobile forensics on popular mobile platforms by exploring different tips, tricks, and techniquesBook DescriptionMobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions.
Published in association with the Society of American Archivists Trusting Records in the Cloud presents key findings of InterPARES Trust, an international research project that has investigated issues of trust in, and trustworthiness of records and data online, with respect to privacy, accessibility, portability, metadata and ownership.
Social tagging (including hashtags) is used over platforms such as Twitter, Facebook, Instagram, Pinterest, WordPress, Tumblr and YouTube across countries and cultures meaning that one single hashtag can link information from a variety of resources.
'Devastating and urgent, this book could not be more timely' Caroline Criado Perez, award-winning and bestselling author of Invisible WomenDanielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone.
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume.
In this explosive memoir, a political consultant and technology whistleblower reveals the disturbing truth about the multi-billion-dollar data industry, revealing to the public how companies are getting richer using our personal information and exposing how Cambridge Analytica exploited weaknesses in privacy laws to help elect Donald Trump.
An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it-and explains why they have died todayMany think of the internet as an unprecedented and overwhelmingly positive achievement of modern human technology.
How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the futureWe live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
The subject of Artificial Intelligence (AI) is continuing on its journey of affecting each and every individual and will keep on this path in the times to come.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
This probing account of the erosion of privacy in America shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience.
This probing account of the erosion of privacy in America shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience.