The first of two volumes, this book about the criminology of Carlo Morselli includes diverse contributions that study the social inter-dependence of criminal phenomena.
Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ebookKey FeaturesHelp in understanding Microsoft 365 Defender and how it is crucial for security operationsImplementation of the proactive security defense capabilities of Microsoft Defender for Endpoint, Identity,Office 365, and Cloud Apps so that attacks can be stopped before they startA guide to hunting and responding to threats using M365D s extended detection and response capabilitiesBook DescriptionThis book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively.
Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ebookKey FeaturesHelp in understanding Microsoft 365 Defender and how it is crucial for security operationsImplementation of the proactive security defense capabilities of Microsoft Defender for Endpoint, Identity,Office 365, and Cloud Apps so that attacks can be stopped before they startA guide to hunting and responding to threats using M365D s extended detection and response capabilitiesBook DescriptionThis book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively.
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.
The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 35th International Conference on Advanced Information Systems Engineering, CAiSE 2023, which was held in Zaragoza, Spain, during June 12-16, 2023.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 35th International Conference on Advanced Information Systems Engineering, CAiSE 2023, which was held in Zaragoza, Spain, during June 12-16, 2023.
This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed.
This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed.
Es necesario que la ciberseguridad se conozca desde que se comienza a usar cualquier dispositivo electrónico porque son muchas las personas que se aprovechan de la inocencia de nuestros hijos para intentar estafarles o manipularles.
The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain.
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments.
Este libro tiene como objetivo que todas aquellas personas que se quieren iniciarse en el "hacking" comprendan los conceptos, metodología y las herramientas que se necesitan durante el proceso de detección de vulnerabilidades de seguridad de un sistema.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.
La Ingeniería Inversa, se refiere al estudio detallado de las funciones de cualquier archivo binario, paso a paso, con el fin de descubrir cuál es el código responsable por su funcionamiento.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.
This textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.
This book contains high quality research papers accepted and presented at the International Conference on Intelligent Computing, Communication and Information Security (ICICCIS 2022), organized by Swami Keshvanand Institute of Technology, Management & Gramothan (SKIT), Jaipur, India during 25-26, November 2022.
This book is a collection of peer-reviewed best selected research papers presented at the Fourth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2023), organized by Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India, during 15-16 January 2023.
This book contains high quality research papers accepted and presented at the International Conference on Intelligent Computing, Communication and Information Security (ICICCIS 2022), organized by Swami Keshvanand Institute of Technology, Management & Gramothan (SKIT), Jaipur, India during 25-26, November 2022.
This book is a collection of peer-reviewed best selected research papers presented at the Fourth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2023), organized by Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India, during 15-16 January 2023.
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.
The metaverse, a hybrid society of the real and the virtual is attracting significant attention from academia to industry and is starting to change the world.
The metaverse, a hybrid society of the real and the virtual is attracting significant attention from academia to industry and is starting to change the world.