We stand on the cusp of a digital revolution, with Web3 technologies gaining momentum and proving pivotal in shaping the future of finance, art, governance, and social interactions.
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into using machine learning and AI for automating threat detection and responseGet a thorough understanding of Python essentials, tailored for security professionalsDiscover real-world applications of Python automation for enhanced securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigned to address the most common pain point for security teams-scalability-Security Automation with Python leverages the author's years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization's overall security posture.
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process.
This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions.
This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid development into a potent technological weapon of the 21st century.
This book delves into the history of biometrics, the different systems that have been developed to date, problems that have arisen from these systems, the necessity of AI-based biometrics systems, different AI techniques developed to date (including machine learning, deep learning, natural language processing, and pattern recognition), their potential uses and applications, security and privacy issues in AI-based Biometric systems, current trends in AI-based biometrics, and presents case studies of AI-based biometrics.
Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as the Internet of Things (IoT), artificial intelligence (AI), and robotics, to achieve higher levels of efficiency, productivity, and safety.
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.
Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities presents the applications of the healthcare sector in the context of futuristic smart cities.
Moving towards resiliency is more than just implanting policy and procedure; it is a process that takes organizations on a winding path requiring patience and tolerance.
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.