This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Preparation for the Certified Penetration Testing Engineer (CPTE) examinationPenetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack.
A compendium of essential information for the modern security entrepreneur and practitionerThe modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection.
Protect your organisation by building a security-minded culture With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a firm basis on which to build an effective cyber security training programme.
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same but the outcomes can be equally devastating.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27-29 October 2023.
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges.
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN.
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN.
This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.