Vi bøger
Levering: 1 - 2 hverdage
Forlænget returret til d. 31. januar 2025

Persondata og datasikkerhed

Her finder du spændende bøger om Persondata og datasikkerhed. Nedenfor er et flot udvalg af over 156 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Shoshana Zuboff
    238,95 - 331,95 kr.

    Enorm rigdom og magt er i dag koncentreret i nye markeder, hvor overvågning af og forudsigelser om vores adfærd bliver købt og solgt. Shoshana Zuboff betegner fænomenet overvågningskapitalisme og kalder det for en lige så stor omvæltning af den menneskelige tilværelse i dag, som den industrielle revolution var det i det 20. århundrede. Der er tale om en hidtil uset magtkonstellation karakteriseret ved ekstreme koncentrationer af viden uden demokratisk tilsyn – og prisen er vores frihed. Med begrænset modstand fra lovgivning og samfund truer overvågningskapitalismen vores nutid og vil dominere vores fremtid – hvis vi tillader det. Anmeldelser “Læs den – den er fremragende!” ★★★★★★ - Altinget ”Det hidtil mest ambitiøse forsøg på at tegne det store billede og forklare baggrunden for digitaliseringens følger, som vi oplever dem som individer og som samfundsborgere ... En fortsættelse af traditionen fra Adam Smith, Max Weber, Karl Polanyi og – tør man sige det – Karl Marx.” – The Observer ”En tilbundsgående researchet, fængende skrevet fortælling om overvågningskapitalismens opståen og dens skadelige virkninger for vores samfund... – New York Times Book Review ”... alle bør læse denne bog som et digitalt selvforsvar. Med stort klarsyn og moralsk mod demonstrerer Zuboff ikke alene, hvordan vores hjerner støvsuges for data, men også hvordan de ændres undervejs, hurtigt og radikalt.” – Naomi Klein, forfatter til Intet bliver som før og No Logo Om forfatteren Shoshana Zuboff er amerikansk socialpsykolog, filosof og professor emerita på Harvard Business School samt ekspert i den digitale revolution. Hun har udgivet en lang række bøger i spændingsfeltet mellem teknologi, psykologi, filosofi og økonomi, og i 1988 skrev hun The age of the Smart Machine: the Future of Work and Power, som blev et skelsættende hovedværk om computeriseringen af vores arbejde og liv.

  • - Med kommentarer
    af Kristian Korfits Nielsen & Anders Lotterup
    1.663,95 kr.

    Databeskyttelsesforordningen og databeskyttelsesloven med kommentarer beskriver reglerne og praksis vedrørende både forordningen og loven, som samlet set fremadrettet vil udgøre reguleringen af databeskyttelsesretten i Danmark.Lovkommentaren er et praktisk redskab for medarbejdere i den offentlige sektor, private virksomheder, foreninger m.v., som er beskæftiget med aktiviteter, der er omfattet af forordningen og loven, og for advokater, revisorer og andre rådgivere. Bogen indeholder relevant praksis fra Datatilsynet og relevante afgørelser fra bl.a. danske domstole, EU-Domstolen og det nye Europæiske Databeskyttelsesråd.

  • af Peer Schaumburg-Müller & Line Budtz Pedersen
    898,95 kr.

    Databeskyttelse i arbejdsretten – fra jura til praksis indeholder en samlet fremstilling af databeskyttelsesretten med fokus på arbejdsretten.Bogen indeholder både en analyse af de nye databeskyttelsesretlige regler og en lang række praktiske anvisninger på, hvordan reglerne kan håndteres i praksis – i form af paradigmer, vejledninger og forslag til forretningsgange.Bogen giver en præcis, konkret og brugbar gennemgang af de nye regler, uden at læseren skal kaste sig ud i nærmere studier af et meget kompliceret retsområde.Databeskyttelse i arbejdsretten – fra jura til praksis er et praktisk værktøj, der henvender sig til medarbejdere i virksomheder, arbejdsgiver- og lønmodtagerorganisationer, advokater, revisorer og andre rådgivere, der beskæftiger sig med persondataretten.Om forfatterneLine Budtz Pedersen er advokat og sektionschef i TDC Group. Hun har mange års erfaring med compliance og har i de seneste år indgående beskæftiget sig med inkorporeringen af databeskyttelsesforordningen.Peer Schaumburg-Müller er vicedirektør i TDC Group, ekstern lektor på CBS og adjungeret professor på Aalborg Universitet. Han er forfatter og medforfatter til en lang række bøger bl.a. inden for arbejdsret.

  • af Shobhit Mehta
    633,95 kr.

    Prepare to pass the ISACA CRISC exam with confidence, gain high-value skills, and propel yourself toward IT risk management masteryKey Features:- Gain end-to-end coverage of all the topics assessed in the ISACA CRISC exam- Apply and embed your learning with the help of practice quizzes and self-assessment questions- Have an in-depth guide handy as you progress in your enterprise IT risk management career- Purchase of the print or Kindle book includes a free PDF eBookBook Description:For beginners and experienced IT risk professionals alike, acing the ISACA CRISC exam is no mean feat, and the application of this advanced skillset in your daily work poses a challenge. The ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is a comprehensive guide to CRISC certification and beyond that'll help you to approach these daunting challenges with its step-by-step coverage of all aspects of the exam content and develop a highly sought-after skillset in the process.This book is divided into six sections, with each section equipped with everything you need to get to grips with the domains covered in the exam. There'll be no surprises on exam day - from GRC to ethical risk management, third-party security concerns to the ins and outs of control design, and IDS/IPS to the SDLC, no stone is left unturned in this book's systematic design covering all the topics so that you can sit for the exam with confidence. What's more, there are chapter-end self-assessment questions for you to test all that you've learned, as well as two book-end practice quizzes to really give you a leg up.By the end of this CRISC exam study guide, you'll not just have what it takes to breeze through the certification process, but will also be equipped with an invaluable resource to accompany you on your career path.What You Will Learn:- Adopt the ISACA mindset and learn to apply it when attempting the CRISC exam- Grasp the three lines of defense model and understand risk capacity- Explore the threat landscape and figure out vulnerability management- Familiarize yourself with the concepts of BIA, RPO, RTO, and more- Get to grips with the four stages of risk response- Manage third-party security risks and secure your systems with ease- Use a full arsenal of InfoSec tools to protect your organization- Test your knowledge with self-assessment questions and practice quizzesWho this book is for:If you are a GRC or a risk management professional with experience in the management of IT audits or in the design, implementation, monitoring, and maintenance of IS controls, or are gearing up to take the CRISC exam, then this CRISC book is for you. Security analysts, penetration testers, SOC analysts, PMs, and other security or management professionals and executives will also benefit from this book.Table of Contents- Governance, Risk, and Compliance- CRISC Practice Areas and the ISACA Mindset- Organizational Governance, Policies, and Risk Management- The Three Lines of Defense and Cybersecurity- Legal Requirements and the Ethics of Risk Management- Risk Management Life Cycle- Threat, Vulnerability, and Risk- Risk Assessment Concepts, Standards, and Frameworks- Business Impact Analysis, and Inherent and Residual Risk- Risk Response and Control Ownership- Third-Party Risk Management- Control Design and Implementation- Log Aggregation, Risk and Control Monitoring, and Reporting(N.B. Please use the Read Sample option to see further chapters)

  • af Jaap-Henk Hoepman
    201,95 kr.

    "This book debunks 10 myths about how hard it really is to design privacy-friendly systems" --

  • af Katharine Jarmul
    524,95 kr.

    Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems. Practical Data Privacy answers important questions such as: What do privacy regulations like GDPR and CCPA mean for my data workflows and data science use cases? What does "anonymized data" really mean? How do I actually anonymize data? How does federated learning and analysis work? Homomorphic encryption sounds great, but is it ready for use? How do I compare and choose the best privacy-preserving technologies and methods? Are there open-source libraries that can help? How do I ensure that my data science projects are secure by default and private by design? How do I work with governance and infosec teams to implement internal policies appropriately?

  • af Laurent Richard & Sandrine Rigaud
    106,95 - 196,95 kr.

  • af Kashmir Hill
    106,95 kr.

    A thrilling investigation into the secret world of facial recognition technology from an award-winning journalist

  • Spar 12%
    af Hanne Marie Motzfeldt
    573,95 kr.

    I 2016 blev EU's efterhånden så berømte databeskyttelsesforordning vedtaget. I 2018 fik forordningen virkning i dansk ret, og den regulerer i dag store dele af det digitale samfunds databehandling, suppleret af databeskyttelsesloven.Forordningens vagt og upræcist formulerede regler er i dag præciseret i en række retningslinjer, vejledninger, udtalelser og afgørelser fra Det Europæiske Databeskyttelsesråd og Datatilsynet, ligesom en række domme er afsagt siden 2018. Grundlæggende databeskyttelsesret gennemgår de væsentligste dele af den almindelige databeskyttelsesret under inddragelse af dette, nyere materiale.Gennemgangen er struktureret efter en række temaer:· Databeskyttelsesrettens nyere historik, formål og sigte· Databeskyttelsesrettens retskilder· Databeskyttelsesforordningens og –lovens anvendelsesområder· Databeskyttelsesrettens reguleringsmodel og aktører· De grundlæggende behandlingsprincipper· Kravene om behandlingsgrundlag og hjemmel· De registreredes rettigheder· De databeskyttelsesretlige ansvarlighedsregler· Reglerne om overførsler til tredjelande og internationale organisationer· Tilsyn, håndhævelse og sanktioner Bogen er blevet til på baggrund af et ønske om en opdatering af lærebogsmaterialet i databeskyttelsesret på Juridisk Fakultet, Københavns Universitet. Den er skrevet af lektor, ph.d. Hanne Marie Motzfeldt, der har undervist i faget siden 2019.

  • af Ian Wild
    388,95 kr.

    Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey Features:Demonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook Description:Online learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What You Will Learn:Measure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is for:If you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.

  • af Lars aka Ghandy Sobiraj
    373,95 kr.

  • af Serap Kurbano¿lu
    827,95 - 884,95 kr.

  • af Jean-Christophe Gaillard
    208,95 kr.

    A must-read for top executives seeking to break patterns of frustration and breach around cybersecurity and a precious management summary to the "Cybersecurity Leadership Handbook for the CISO and the CEO"

  • af Philippa Mawking
    133,95 kr.

    One strategy to draw some attention to the website when launching an internet business at a low startup cost is through traffic. This is essentially a mechanism that makes sure each person's site is included in the viewing arrangement by having sites viewed during the exchange procedure. Learn everything you require right here.

  • af Max Smith-Creasey
    520,95 kr.

    This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable todevices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.

  • af Cong Wang
    1.609,95 - 1.618,95 kr.

  • af Sara Mannheimer
    384,95 kr.

    This book explores the connections between qualitative data reuse, big social research, and data curation. A review of existing literature identifies the key issues of context, data quality and trustworthiness, data comparability, informed consent, privacy and confidentiality, and intellectual property and data ownership. Through interviews of qualitative researchers, big social researchers, and data curators, the author further examines each key issue and produces new insights about how domain differences affect each community of practice¿s viewpoints, different strategies that researchers and curators use to ensure responsible practice, and different perspectives on data curation. The book suggests that encouraging connections between qualitative researchers, big social researchers, and data curators can support responsible scaling up of social research, thus enhancing discoveries in social and behavioral science.

  • af Alex Foster
    208,95 kr.

    The digital landscape is growing unprecedentedly in today's interconnected society, bringing incredible ease and evident threats. Technology has ingratiated itself into our lives, allowing us to interact, communicate, and transact in ways that were unthinkable just a few decades ago. Cyber threats, a fresh breed of threats brought on by the digital revolution, have the potential to compromise our personal data, financial security, and even the basic systems that keep our societies running.Welcome to " Cybersecurity: Cybersecurity EssentialsSafeguarding Your Digital World." This e-book has been written to guide you through the maze of cyber risks, arming you with the information and resources required to move about the online world securely and confidently. This e-book is meant to empower you, whether you're an individual looking to safeguard your personal information, a professional trying to strengthen the security measures in place at your company, or just someone who wants to know more about the digital threats we face. Understanding cybersecurity fundamentals is no longer optional in this digital age, where cyber attacks vary from sophisticated data breaches that target large companies to deceptive phishing emails that attempt to trick individuals. Our e-book will guide you through the key ideas, routines, and tactics that can protect you from the always-changing threats lurking in cyberspace.

  • af Michael Butler
    286,95 kr.

    There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that.The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client¿s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What yoüll learnHow to handle and ongoing develop client relationships in a high end industryTeam management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing.How to identify, understand, and over-deliver on client expectations.How to staff and develop talent within the team.Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities.The various structures of services available that they may present to their clients.Who This Book Is ForThis book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.

  • af Tuomo Sipola
    1.817,95 - 1.827,95 kr.

    This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity.During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies.Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference. 

  • af Charles Johnson Jr
    238,95 kr.

    Il libro aggiornato su Dark Web & Dark Net.Devi leggere questo libro se vuoi conoscere o intraprendere il viaggio nel dark web. In questo breve libro, imparerai le storie agghiaccianti del dark web e della dark net. Conoscerai i fondamenti, i fatti e le cifre sul surface web, il deep web e il dark web.Il libro fornisce anche un'ampia panoramica delle minacce digitali attuali ed emergenti e dei crimini informatici. Sarai aggiornato con informazioni cruciali su frodi e furti di identità effettuati quotidianamente sul dark web.In particolare, imparerai: Cos'è esattamente il dark web?L'origine del deep web e del dark web.Attività che si svolgono sul dark web.Come il dark web ti influenza.Come vengono venduti i dati personali sul dark web.I dati più spesso scambiati sul dark web.Traffico di organi umani e servizi di pornografia infantile nel dark web.Il mercato del dark web.La rete Tor e come funziona il browser Tor.La storia di Ross William Ulbricht, l'uomo dietro la Via della Seta.La verità sul surface web: perché alcuni siti non possono essere considerati attendibili con le tue informazioni.Le cose più importanti che imparerai: cosa puoi fare per proteggerti da attività dannose nel dark web.Come mantenere la tua identità Internet al sicuro su base giornaliera.

  • af Yaochu Jin
    1.320,95 - 1.810,95 kr.

    This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level. Federated learning is a distributed machine learning paradigm which enables model training on a large body of decentralized data. Its goal is to make full use of data across organizations or devices while meeting regulatory, privacy, and security requirements. The book starts with a self-contained introduction to artificial neural networks, deep learning models, supervised learning algorithms, evolutionary algorithms, and evolutionary learning. Concise information is then presented on multi-party secure computation, differential privacy, and homomorphic encryption, followed by a detailed description of federated learning. In turn, the book addresses the latest advances in federate learning research, especially from the perspectives of communication efficiency, evolutionary learning, and privacy preservation.The book is particularly well suited for graduate students, academic researchers, and industrial practitioners in the field of machine learning and artificial intelligence. It can also be used as a self-learning resource for readers with a science or engineering background, or as a reference text for graduate courses.       

  • af Farid Haque
    168,95 kr.

    We live in a world that is filled with misinformation and disinformation. In our precarious digital environment, the need for awareness about this risk is greater than ever.In Bug Byes, investigator Ava Williams uses her wits and journalism skills to uncover a disinformation campaign set to damage critical American communications infrastructure. With help from a few allies along the way, Ava races to expose the web of lies being spun online.Created by the CISA (the U.S. Cybersecurity and Infrastructure Security Agency), Bug Bytes is the second graphic novel in the Resilience Series, which was created to illustrate the threat that inaccurate information (fake news) can have on important events that shape the future of our democracy. Yes, the threat is real, and very dangerous. Everyone needs to understand how it works and how to recognize the truth. This exciting and entertaining little book can help.

  • af Joe Grant
    198,95 kr.

    ¿Sabes si te han hackeado? ¿Sabe si alguna información personal fue robada de su sistema o cuenta? ¿Siempre has querido aprender a proteger tu sistema de este tipo de ataques? Si respondiste que sí a todas estas preguntas, has venido al lugar correcto.A diferencia de la piratería maliciosa, la piratería ética es una forma legal de probar las vulnerabilidades de un sistema. Muchas organizaciones todavía desconfían de los hackers éticos, y tienen todo el derecho a serlo ya que algunos hackers mienten para su propio beneficio. Dicho esto, muchas organizaciones ahora están buscando hackers éticos porque quieren identificar una manera de protegerse a sí mismos y a sus clientes y empleados.En el transcurso del libro, usted aprenderá más acerca de lo que es la piratería ética y comenzará a comprender los diferentes tipos de ataques que un hacker ético puede realizar en un sistema.Este libro hablará sobre:¿ Qué es el hackeo ético y cómo es diferente del hackeo maliciosä Por qué es importante hackear un sistemä Cuáles son las diferentes fases del hackeo éticö Los pasos que un hacker ético debe tomar para protegerse¿ Las diferentes habilidades que un hacker ético debe tener¿ Las diferentes herramientas que un hacker puede utilizar para probar un sistemä Diferentes tipos de ataques que se pueden realizar en un sistemä Cómo el hacker debe proteger un sistema de este tipo de ataquesEste libro proporciona numerosos ejemplos de diferentes ataques y también incluye algunos ejercicios que puedes seguir cuando realizas estos ataques por primera vez. Es importante recordar que el hackeo ético se está convirtiendo en una de las profesiones más buscadas porque cada organización está buscando una manera de proteger sus datos.Entonces, ¿qué estás esperando - toma una copia del libro ahora!

  • af Vandana Verma Sehgal
    388,95 kr.

    Integrate Shift-Left Security, automation, IaC, and compliance into every stage of development, ensuring strong application security and continuous protection for modern software with DevSecOps best practicesKey Features- Understand security posture management to maintain a resilient operational environment- Master DevOps security and blend it with software engineering to create robust security protocols- Adopt the left-shift approach to integrate early-stage security in DevSecOps- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionDevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software. This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles.After understanding the principles, you'll dig deeper into different topics concerning application security and secure coding before learning about the secure development lifecycle and how to perform threat modeling properly. You'll also explore a range of tools available for these tasks, as well as best practices for developing secure code and embedding security and policy into your application. Finally, you'll look at automation and infrastructure security with a focus on continuous security testing, infrastructure as code (IaC), protecting DevOps tools, and learning about the software supply chain.By the end of this book, you'll know how to apply application security, safe coding, and DevSecOps practices in your development pipeline to create robust security protocols.What you will learn- Find out how DevSecOps unifies security and DevOps, bridging a significant cybersecurity gap- Discover how CI/CD pipelines can incorporate security checks for automatic vulnerability detection- Understand why threat modeling is indispensable for early vulnerability identification and action- Explore chaos engineering tests to monitor how systems perform in chaotic security scenarios- Find out how SAST pre-checks code and how DAST finds live-app vulnerabilities during runtime- Perform real-time monitoring via observability and its criticality for security managementWho this book is forThis book is for individuals new to DevSecOps and want to implement its practices successfully and efficiently. DevSecOps Engineers, Application Security Engineers, Developers, Pentesters, and Security Analysts will find plenty of useful information in this book. Prior knowledge of the software development process and programming logic is beneficial, but not mandatory.Table of Contents- Introducing DevSecOps- DevSecOps Principles- Understanding the Security Posture- Understanding Observability- Understanding Chaos Engineering- Continuous Integration and Continuous Deployment- Threat Modeling- Software Composition Analysis (SCA)- Static Application Security Testing (SAST)- Infrastructure-as-Code (IaC) Scanning- Dynamic Application Security Testing (DAST)- Setting Up a DevSecOps Program with Open Source Tools- Licenses Compliance, Code Coverage, and Baseline Policies- Setting Up a Security Champions Program- Case Studies- Conclusion

  • af Kim Crawley
    543,95 kr.

    Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectivelyKey Features:- Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform- Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)- Get acquainted with the penetration testing tools and security measures specific to each platform- Purchase of the print or Kindle book includes a free PDF eBookBook Description:With AWS, Azure, and GCP gaining prominence, understanding their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters evaluate cloud environments effectively.In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.What You Will Learn:- Familiarize yourself with the evolution of cloud networks- Navigate and secure complex environments that use more than one cloud service- Conduct vulnerability assessments to identify weak points in cloud configurations- Secure your cloud infrastructure by learning about common cyber attack techniques- Explore various strategies to successfully counter complex cloud attacks- Delve into the most common AWS, Azure, and GCP services and their applications for businesses- Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentestingWho this book is for:This book is for aspiring Penetration Testers, and the Penetration Testers seeking specialized skills for leading cloud platforms-AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.Table of Contents- How Do Enterprises Utilize and Implement Cloud Networks?- How Are Cloud Networks Cyber Attacked?- Key Concepts for Pentesting Today's Cloud Networks- Security Features in AWS- Pentesting AWS Features through Serverless Applications and Tools- Pentesting Containerized Applications in AWS- Security Features in Azure- Pentesting Azure Features through Serverless Applications and Tools- Pentesting Containerized Applications in Azure- Security Features in GCP- Pentesting GCP Features through Serverless Applications and Tools- Pentesting Containerized Applications in GCP- Best Practices and Summary

  • af Lambert Hogenhout
    453,95 kr.

    Apply a step-by-step approach to develop your organization's global data privacy strategy. Data is everywhere. Organizations continuously use data in new ways, often generating cross-border data flows. At the same time, concern about the use of personal data is growing. Every year, more countries adopt data privacy laws and our expectations increase on how companies respect our private data. A data privacy strategy is no longer just about compliance-it is good business. A clear and effective data privacy program can build customer trust and strengthen a brand's reputation. We cover the art of crafting an effective data privacy strategy that aligns with business objectives and brand positioning yet ensures compliance with relevant laws. Gain a foundational understanding of data privacy issues as a prerequisite to developing a custom strategy. Use our review of the major legislations around the world to guide you in creating a data privacy strategy. Benefit from our insights on the relation between data privacy programs and a data strategy, an IT strategy, and risk management frameworks. Be able to apply methodologies to help you stay on track, such as Privacy by Design and data minimization. Incorporate the cultural and ethical considerations of data privacy across different countries where you may operate. Know how emerging privacy enhancing technologies (PETs) can be powerful tools in implementing your strategy, and pinpoint the intersection between data privacy and AI.The stakes for data privacy have never been higher and this book will help you up your game.

  • af Nataliia Neshenko
    1.803,95 - 1.812,95 kr.

    This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.

  • af Holger Kaschner
    488,95 - 631,95 kr.

  • af Jiachi Chen
    832,95 - 887,95 kr.

    The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8-10, 2023. The 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. The papers are organized in the following topical sections: Part I: Anomaly detection on blockchain; edge intelligence and metaverse services; blockchain system security; empirical study and surveys; federated learning for blockchain. Part II: AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.