|
Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In...
Editeur :
Springer
Parution :
2020-09-16
Collection :
Human–Computer Interaction Series
PDF, ePub
|
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.
Computer network vulnerabilities and threats are covered...
Editeur :
Apress
Parution :
2020-09-12
PDF, ePub
|
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your...
Editeur :
Apress
Parution :
2020-09-11
PDF, ePub
|
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological,...
Editeur :
Springer
Parution :
2020-08-21
Collection :
SpringerBriefs in Applied Sciences and Technology
PDF, ePub
|
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and...
Editeur :
Apress
Parution :
2020-08-12
PDF, ePub
|
Until recently, the Arctic was almost impossible for anyone other than indigenous peoples and explorers to traverse. Pervasive Arctic sea ice and harsh climatological conditions meant that the region was deemed incapable of supporting industrial activity or a Western...
Editeur :
SAGE Publications Ltd
Parution :
2020-07-15
PDF
|
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...
Editeur :
Springer
Parution :
2020-07-14
Collection :
Signals and Communication Technology
PDF, ePub
|
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...
Editeur :
Apress
Parution :
2020-06-13
PDF, ePub
|
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...
Editeur :
Wiley
Parution :
2020-06-09
PDF, ePub
|
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...
Editeur :
Springer
Parution :
2020-04-23
PDF, ePub
|
This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...
Editeur :
Springer
Parution :
2020-03-11
PDF, ePub
|
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...
Editeur :
Apress
Parution :
2020-02-25
PDF, ePub
|
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...
Editeur :
Apress
Parution :
2019-12-18
PDF, ePub
|
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...
Editeur :
Apress
Parution :
2019-12-17
PDF, ePub
|
Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and...
Editeur :
SAGE Publications Ltd
Parution :
2019-12-15
PDF
|
Water supply and water management services are among the most critical infrastructures in society, providing safe and affordable drinking water, managing wastewater to avoid floods and environmental pollution, and enabling the reuse and replenishment of scarce water...
Editeur :
SAGE Publications Ltd
Parution :
2019-12-15
PDF
|
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...
Editeur :
Springer
Parution :
2019-11-14
Collection :
Advances in Computer Vision and Pattern Recognition
PDF, ePub
|
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...
Editeur :
Apress
Parution :
2019-11-06
PDF, ePub
|
A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top...
Editeur :
Sybex
Parution :
2019-10-24
PDF, ePub
|
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.
Cryptography is the lifeblood...
Editeur :
Apress
Parution :
2019-09-27
PDF, ePub
|