This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed.
Es necesario que la ciberseguridad se conozca desde que se comienza a usar cualquier dispositivo electrónico porque son muchas las personas que se aprovechan de la inocencia de nuestros hijos para intentar estafarles o manipularles.
The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain.
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments.
Este libro tiene como objetivo que todas aquellas personas que se quieren iniciarse en el "hacking" comprendan los conceptos, metodología y las herramientas que se necesitan durante el proceso de detección de vulnerabilidades de seguridad de un sistema.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.
La Ingeniería Inversa, se refiere al estudio detallado de las funciones de cualquier archivo binario, paso a paso, con el fin de descubrir cuál es el código responsable por su funcionamiento.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.
This textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.
This book contains high quality research papers accepted and presented at the International Conference on Intelligent Computing, Communication and Information Security (ICICCIS 2022), organized by Swami Keshvanand Institute of Technology, Management & Gramothan (SKIT), Jaipur, India during 25-26, November 2022.
This book is a collection of peer-reviewed best selected research papers presented at the Fourth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2023), organized by Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India, during 15-16 January 2023.
This book contains high quality research papers accepted and presented at the International Conference on Intelligent Computing, Communication and Information Security (ICICCIS 2022), organized by Swami Keshvanand Institute of Technology, Management & Gramothan (SKIT), Jaipur, India during 25-26, November 2022.
This book is a collection of peer-reviewed best selected research papers presented at the Fourth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2023), organized by Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India, during 15-16 January 2023.
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.
The metaverse, a hybrid society of the real and the virtual is attracting significant attention from academia to industry and is starting to change the world.
The metaverse, a hybrid society of the real and the virtual is attracting significant attention from academia to industry and is starting to change the world.
This important reference work is an extensive resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey FeaturesGain a comprehensive understanding of threat validationLeverage open source tools to test security detectionsHarness open source content to supplement detection and testingBook DescriptionThreat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline.
Discover how different QRadar components fit together and explore its features and implementations based on your platform and environmentPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGet to grips with QRadar architecture, components, features, and deploymentsUtilize IBM QRadar SIEM to respond to network threats in real timeLearn how to integrate AI into threat management by using QRadar with WatsonBook DescriptionThis comprehensive guide to QRadar will help you build an efficient security operations center (SOC) for threat hunting and need-to-know software updates, as well as understand compliance and reporting and how IBM QRadar stores network data in real time.
The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications.
This textbook presents a comprehensive treatment of the legal arrangement of the corporation, the instruments and institutions through which capital can be raised, the management of the flow of funds through the individual firm, and the methods of dividing the risks and returns among the various contributors of funds.
The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives.
In diesem Buch werden die wichtigsten kryptographischen Verfahren, Protokolle und Algorithmen der letzten Jahrzehnte erläutert und mathematisch-logisch begründet.
This monograph provides a comprehensive and rigorous exposition of the basic concepts and most important modern research results concerning blockchain and its applications.
This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security.
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June - July 2021.
This book focuses on protection needs and new aspects of personality and data protection rights on the Internet, presenting a comprehensive review that discusses and compares international, European and national (Brazilian, German, Pakistani) perspectives.
This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021.
Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your dataAbout This BookExplore and learn the new security features introduced in Oracle Database 12c, to successfully secure your sensitive dataLearn how to identify which security strategy is right for your needs - and how to apply itEach 'recipe' provides you with a single step-by-step solution, making this book a vital resource, delivering Oracle support in one accessible placeWho This Book Is ForThis book is for DBAs, developers, and architects who are keen to know more about security in Oracle Database 12c.
Russian Information Warfare: Assault on Democracies in the Cyber Wild West examines how Moscow tries to trample the very principles on which democracies are founded and what we can do to stop it.
FINALIST: International Book Awards 2023 - Business: GeneralFINALIST: American Book Fest Best Book Award 2023 - Business: GeneralBalance the benefits of digital transformation with the associated risks with this guide to effectively managing cybersecurity as a strategic business issue.