Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applicationsKey FeaturesExplore the practical application of secure software development methodologiesModel security vulnerabilities throughout the software development lifecycle (SDLC)Develop the skills to trace requirements, from requirements gathering through to implementationPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExtend your software development skills to integrate security into every aspect of your projects.
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals.
This book presents the best papers from the 4th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2023, held in London, UK.
Handbook on Augmenting Telehealth Services: Using Artificial Intelligence provides knowledge of AI-empowered telehealth systems for efficient healthcare services.
Handbook on Augmenting Telehealth Services: Using Artificial Intelligence provides knowledge of AI-empowered telehealth systems for efficient healthcare services.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
This book presents the best papers from the 4th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2023, held in London, UK.
This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast ocean of publicly available information to gain valuable insights and intelligence.
Umsetzbare Sicherheitsstrategien – auch für Unternehmen und Organisationen mit kleinen Budgets- Das komplexe Thema »Informationssicherheit« zugänglich und praxisnah aufbereitet.
This book addresses social and complex network analysis challenges, exploring social network structures, dynamic networks, and hierarchical communities.
La tecnología del Internet de las Cosas (IoT) está directamente relacionada con los avances en la digitalización en todos los ámbitos, que están ocurriendo de manera vertiginosa en la última década.
This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively.
This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively.
In an increasingly interconnected digital realm, Ubiquitous and Transparent Security: Challenges and Applications emerges as a guiding beacon through the intricate web of modern cybersecurity.
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and "e;canceling"e; people for perceived violations of norms.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2023), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, from 02-04 November, 2023.
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.
Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscapeKey FeaturesGet introduced to three primary AI tactics used in malware and detectionLeverage data science tools to combat critical cyber threatsUnderstand regulatory requirements for using AI in cyber threat managementPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis.
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems.
Auf Grund des langanhaltenden Niedrigzinsniveaus sowie der zusätzlichen Herausforderungen der Corona-Pandemie, stehen Anbieter von Finanzdienstleistungsberatungen (z.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.