Udvidet returret til d. 31. januar 2025

Datasikkerhed

Her finder du spændende bøger om Datasikkerhed. Nedenfor er et flot udvalg af over 1.000 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af M. D. Miller
    1.978,95 kr.

    This book offers a practical approach to conducting research in foreign languages on topics with a global nexus. It introduces the problem researchers face when getting started with a research problem, such as setting up the research environment and establishing goals for the research. The researcher then needs to prepares and to conduct foreign-language research by generating key terms and searching the right places where the information they seek is most likely to be stored. Using the appropriate advanced search operators, the researcher narrows down the search results to the desired sources, thereby eliminating the irrelevant sources. Specialized knowledge of country-specific domains advances the specificity and relevance of the researcher¿s efforts. The methods and tools demonstrated in this book are applicable to a variety of academic and practical fields. A doctor may ask ¿what are other experts in my field saying about ABC disease?¿ A sommelier may ask ¿where else in the world are XYZ grape varietals grown?¿ A businessman may ask ¿who are my global competitors in my market?¿ A doctoral student may ask ¿have any other students at universities abroad ever written a dissertation about my topic, too?¿ With the tools and techniques demonstrated in this book, all of these questions are answerable. This book concludes with chapters on translation and citation methods, and includes three case studies that demonstrate the practical use of the methods discussed above. This book targets academic researchers as well as students and faculty. This book will also be a good fit as an assigned reading for a college course on thesis/dissertation research.

  • af Shishir Kumar Shandilya, Atulya K. Nagar, V. B. Gupta & mfl.
    1.093,95 kr.

  • af Kyle Cucci
    712,95 kr.

    Dive into the fascinating and terrifying world of evasive malware - malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive manoeuvres that malware programs use to determine whether they're being analysed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defence bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn: Modern evasive malware threats, anti-analysis techniques used in malware, how malware bypasses and circumvents security controls, how malware uses victim targeting and profiling techniques, how malware uses anti-forensics and file-less techniques, how to perform malware analysis and reverse engineering on evasive programs.

  • af Bojan Magusic
    564,95 kr.

    From the back cover Azure Security is a practical guide to the native security services of Microsoft Azure. You'll learn how to use Azure tools to improve your systems security and get an insider's perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud. Insightful analogies and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you've learned. About the reader For software and security engineers building and securing Azure applications.

  • af Artur-Axel Wandtke
    372,95 - 512,95 kr.

    Das Lehrbuch richtet sich in erster Linie an Studenten, die das 1. Staatsexamen im Schwerpunktbereich auf dem Gebiet des Urheber-und Medienrechts zu absolvieren haben. Methodisch ist das Lehrbuch so aufgebaut, dass der Student sein Wissen anhand von Fragen und Antworten am Ende eines Abschnittes vertiefen kann. Im Anhang werden die wichtigsten Entscheidungen des BGH, des BVerfG und des EuGH zum Urheberrecht genannt. Auerdem bietet es Rechtsanwalten, die eine Masterausbildung abschlieen wollen, eine solide Grundlage fur die urheber-und medienrechtliche Ausbildung. In der 6. Auflage des Lehrbuchs werden die aktuellen Reformen des Urheberrechts berucksichtigt, insbesondere das neue Urhebervertragsrecht, das Gesetz uber die Verwertungsgesellschaften und die Bildungs-und Wissenschaftsschranken. Das Lehrbuch tragt der Tatsache Rechnung, dass die Digitalisierung und das Internet mit seinen Geschaftsmodellen sowie neue Technologien Herausforderungen fur den nationalen und europaischen Gesetzgeber und fur die Rechtsprechung darstellen.

  • af Rafi Ullah Khan
    2.037,95 - 2.717,95 kr.

  • af Yassine Maleh
    1.784,95 kr.

    This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease.Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, onlinefraud, etc.This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.

  • af Lidia Fotia
    1.968,95 kr.

    This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.

  • af Sanjay Misra & Amit Kumar Tyagi
    1.405,95 - 1.970,95 kr.

  • af Maria Papadaki
    1.136,95 kr.

    This book constitutes selected papers from the 19th European, Mediterranean, and Middle Eastern Conference, EMCIS 2022, which was held virtually during December 7-8, 2022.EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners. It focuses on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact.The 47 papers presented in this volume were carefully reviewed and selected from a total of 136 submissions. They were organized in topical sections named: Artificial intelligence; big data and analytics; blockchain technology and applications; cloud computing; digital governance; digital services and social media; emerging computing technologies and trends for business process management; enterprise systems; information system security and information privacy protection; innovative research projects; IT governance and alignment; management and organizational issues in information systems; and metaverse.

  • af Mohiuddin Ahmed, Al-Sakib Khan Pathan, Nour Moustafa, mfl.
    1.775,95 kr.

  • af Nasir Ghani, Elias Bou-Harb, Jorge Crichigno & mfl.
    683,95 kr.

  • af Dietmar P. F. Möller
    929,95 kr.

    In today¿s digital transformation environments, a rigorous cybersecurity approach to effective risk management ¿ including contingency planning, outlining immediate actions, preparing post-breach responses ¿ is central to defending organizations¿ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals.Topics and features:Explores cybersecurity¿s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networksProvides numerous examples of applications and best practicesConsiders methods that organizations can use to assess their cybersecurity awareness and/or strategyDescribes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate dataAddresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacksDiscusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity StandardGathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity.Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.

  • af Mike Rosulek
    1.136,95 kr.

    This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2023, CT-RSA 2023, held in San Francisco, CA, USA, in April 2023.The 26 full papers presented in this volume were carefully reviewed and selected from 76 submissions. The conference presents papers on subjects such as Cryptographic Implementations, Quantum Cryptanalysis, Advanced Public-Key Encryption, Tools for Privacy-Enhancing Technologies, Symmetric Cryptanalysis, Multiparty Protocols, Digital Signatures, Fault Attacks and Side Channels, Heuristic Approaches, Symmetric-Key Constructions, and Key Agreement.

  • af MD Atiqur Rahman Ahad
    2.412,95 - 2.422,95 kr.

    This book presents the best-selected research papers presented at the 3rd International Conference on Activity and Behavior Computing (ABC 2021), during 20-22 October 2021. The book includes works related to the field of vision- and sensor-based human action or activity and behavior analysis and recognition. It covers human activity recognition (HAR), action understanding, gait analysis, gesture recognition, behavior analysis, emotion, and affective computing, and related areas. The book addresses various challenges and aspects of human activity recognition-both in sensor-based and vision-based domains. It can be considered as an excellent treasury related to the human activity and behavior computing. 

  • af Felix Bieker
    910,95 - 919,95 kr.

    This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data protection under the EU Charter and its relationship to the secondary legislation. Furthermore, the case law of the Court of Justice of the EU as well as current academic conceptualizations are analysed.The author finds that current approaches invariably link data protection to privacy and often fail to address the structural implications of data processing. He therefore suggests a dualistic approach to data protection: in its individual dimension, data protection aims to protect natural persons and their rights, while the structural dimension protects the democratic society as a whole from the adverse effects of data processing. Using this approach, the full potential of an independent right to data protection can be realized.Researchers, practitioners and students will find this a valuable resource on the rationales, scope and application of data protection.Felix Bieker is Legal Researcher at the Office of the Data Protection Commissioner of Schleswig-Holstein (Unabhängiges Landeszentrum für Datenschutz) in Kiel, Germany.

  • af Astha Bhanot, Shweta Dewangan & Sapna Singh Kshatri
    2.152,95 - 2.827,95 kr.

  • af Carmit Hazay & Martijn Stam
    1.130,95 - 1.240,95 kr.

  • af Julia Hesse
    608,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..

  • af Gang Li, Shiva Raj Pokhrel & Srikanth Prabhu
    862,95 kr.

    ¿This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30-31, 2022.The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.

  • af Florian Oelmaier
    481,95 kr.

    Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention. Illustriert durch zahlreiche Screenshots von Erpresserschreiben, Darknetseiten & Verhandlungschats. Mit Gastbeiträgen von N. Weyerstall, Dr. Malek und C. Kurtz sowie von betroffenen Unternehmen.Dieses Buch ist mehr als nur eine Notfallanleitung für den eingetretenen Krisenfall. Um die eigene Verteidigung zu planen, lohnt es sich, den Ernstfall gedanklich durchzuspielen.

  • af Elisa Bertino
    377,95 kr.

    This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.

  • af John F. Dooley
    381,95 kr.

    In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June 1917, Herbert Yardley convinced the new head of the Army¿s Military Intelligence Division to create a code and cipher section for the Army with himself as its head. These two seminal events were the beginning of modern American cryptology, the growth of which culminated 35 years later with the creation of the National Security Agency. Each running their own cryptologic agencies in the 1920s, the Friedman-Yardley relationship was shattered after Yardley published a tell-all book about his time in military intelligence. Yet in the end, the work they all started in 1917 led directly to the modern American intelligence community. As they got older, they became increasingly irrelevant in the burgeoning American cryptologic fraternity. Topics and features:* Examines the lives of three remarkable and pioneering cryptologists* Offers fascinating insights into spies, codes and ciphers, rumrunners, poker, and military history* Sheds new light on interesting parts of the cryptologists¿ careers¿especially Elizebeth Friedman, whose work during World War II has just begun to be explored* Recounts several good stories, i.e., What if the Friedmans had gone to work for Herbert Yardley in his new Cipher Bureau in 1919? What if Yardley had moved back to Washington to work for William Friedman a decade later? This enjoyable book has wide appeal for: general readers interested in the evolution of American cryptology, American historians (particularly of World War I, the inter-war period, and World War II signals intelligence), and historians of¿and general readers interested in¿American military intelligence. It also can be used as an auxiliary text or recommended reading in introductory or survey courses in history or on the related topics.

  • af Keith Brock
    222,95 kr.

    Millions of people each year find out the hard way that prepping is a necessary part of life. It can be overwhelming if you want to prep but are strapped for cash. Fortunately, there are still ways to make it work. This book goes into the origins of prepping, the science behind prepping, how to create a bug out bag for when SHTF, prepping on a budget, the pros and cons of prepping. By investing in this book, you can get a grasp of how to properly prep so that you are able to take care of you and your loved ones when they need it the most.Here's some of what you will learn in this easy to read guide:What being a prepper is all aboutEverything you need to know before becoming a prepperEssential prepping skillsAll about homesteadingHow to use natural resourcesWhat to expect when the SHTFWhat to put in your bug-out bagWhat food, medical, and other supplies you should be stockpiling...and much, much more!Now, you can survive the worst of conditions by creating a nurturing environment without the need of electricity. Come up with your own alternative source of energy and keep your house warm to survive a long winter without any central heating. Take care of your family and friends by implementing these thoughtful suggestions and never let a blackout cause a significant damage to your life.

  • af Bimal Kumar Roy
    2.427,95 kr.

    The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 ¿ 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.

  • af Pradeep Kumar Singh
    2.422,95 - 2.427,95 kr.

    This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing (ICRIC 2021), held on June 8-9, 2021 by Eotvos Lorand University (ELTE), Budapest, Hungary in association with many Universities; WSG Poland, Knowledge University, ERBIL.  The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.

  • af Shiva V. N. Parasram
    487,95 kr.

    Explore various digital forensics methodologies and frameworks and manage your cyber incidents effectivelyPurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain red, blue, and purple team tool insights and understand their link with digital forensicsPerform DFIR investigation and get familiarized with Autopsy 4Explore network discovery and forensics tools such as Nmap, Wireshark, Xplico, and ShodanBook Description:Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools.This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You'll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You'll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, memory, and operating systems.By the end of this digital forensics book, you'll have gained hands-on experience in implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation - all using Kali Linux's cutting-edge tools.What You Will Learn:Install Kali Linux on Raspberry Pi 4 and various other platformsRun Windows applications in Kali Linux using Windows Emulator as WineRecognize the importance of RAM, file systems, data, and cache in DFIRPerform file recovery, data carving, and extraction using Magic RescueGet to grips with the latest Volatility 3 framework and analyze the memory dumpExplore the various ransomware types and discover artifacts for DFIR investigationPerform full DFIR automated analysis with Autopsy 4Become familiar with network forensic analysis tools (NFATs)Who this book is for:This book is for students, forensic analysts, digital forensics investigators and incident responders, security analysts and administrators, penetration testers, or anyone interested in enhancing their forensics abilities using the latest version of Kali Linux along with powerful automated analysis tools. Basic knowledge of operating systems, computer components, and installation processes will help you gain a better understanding of the concepts covered.

  • af Ashish Kumar
    387,95 kr.

    Secure your business in a post-pandemic world: Master digital risk identification and defensePurchase of the print or Kindle book includes a free PDF eBookKey Features:Become well-versed with sophisticated system-level security risks and the zero-trust frameworkLearn about remote working risks, modern collaboration, and securing the digital data estateKeep up with rapidly evolving compliances and regulations and their impact on cyber risksBook Description:With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What You Will Learn:Become aware of and adopt the right approach to modern digital transformationExplore digital risks across companies of all sizesStudy real-world cases that focus on post-pandemic digital transformationUnderstand insider threats and how to mitigate vulnerability exploitationGet to know how cyberwarfare targets infrastructure and disrupts critical systemsDiscover how implementing a regulatory framework can safeguard you in the current and future data landscapesWho this book is for:This book is for three categories of readers-those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.

  • af Henry Prunckun
    142,95 kr.

    Industrial espionage involves the theft or unauthorized access of proprietary information, strategies, or technologies belonging to a company, government agency, or non-profit organization. Understanding industrial espionage is, therefore, crucial so that these entities can protect their intellectual property, trade secrets, and confidential information.Dr Henry Prunckun calls on his experience in the field of security as well as his research into the topic to highlight how such activities can have severe consequences for those targeted, including loss of competitive advantage, damage to reputation, financial losses, and in extreme cases, bankruptcy. He points out that industrial espionage can also have national security implications if it involves the theft of information related to defense or critical infrastructure.This technical monograph will help readers understand the methods and motivations behind industrial espionage and how organizations can take steps to safeguard their sensitive information. Additionally, it can help organizations detect and prevent such activities and work with law enforcement agencies to hold perpetrators accountable.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.