This book presents high-quality, peer-reviewed papers from 3rd International Conference on "e;Universal Threats in Expert Applications and Solutions"e; (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6-9, 2024.
This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast ocean of publicly available information to gain valuable insights and intelligence.
The Internet of Things (IoT) involves physical devices, cars, household appliances, and any other physical appliance equipped with sensors, software, and network connections to gather and communicate data.
On the back of their last book, Cyber-risk and Youth, and building on a new research project, Adorjan and Ricciardelli marshal current research to explore parenting in the digital age.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction.
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal.
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux.
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux.
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal.
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables.
Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity.
Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity.
Bigger in size, longer in length, broader in scope, and even more useful than our original Mac OS X Hacks, the new Big Book of Apple Hacks offers a grab bag of tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the new line of iPods, iPhone, and Apple TV.
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfarewithout truly realizing the scope of this global conflict.
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfarewithout truly realizing the scope of this global conflict.
If youre an app developer with a solid foundation in Objective-C, this book is an absolute mustchances are very high that your companys iOS applications are vulnerable to attack.
If youre an app developer with a solid foundation in Objective-C, this book is an absolute mustchances are very high that your companys iOS applications are vulnerable to attack.
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life.