This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during 5-6 January 2024.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during 5-6 January 2024.
This book delves into the critical realm of trust management within the Internet of Vehicles (IOV) networks, exploring its multifaceted implications on safety and security which forms part of the intelligent transportation system domain.
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
This book builds on the popular GARDENER OF GOVERNANCE article, which enjoys amazing traction in the professional community globally and has been translated into 25+ languages.
We stand on the cusp of a digital revolution, with Web3 technologies gaining momentum and proving pivotal in shaping the future of finance, art, governance, and social interactions.
We stand on the cusp of a digital revolution, with Web3 technologies gaining momentum and proving pivotal in shaping the future of finance, art, governance, and social interactions.
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into using machine learning and AI for automating threat detection and responseGet a thorough understanding of Python essentials, tailored for security professionalsDiscover real-world applications of Python automation for enhanced securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigned to address the most common pain point for security teams-scalability-Security Automation with Python leverages the author's years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization's overall security posture.
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process.
This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions.