Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extract insights from massive datasets. These methodologies are crucial in enabling informed decision-making and driving transformative advancements across many fields, industries, and domains. This book offers an overview of latest tools, methods and approaches while also highlighting their practical use through various applications and case studies.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals. This book will help you set up vulnerable-by-design environments in the cloud to minimize the risks involved while learning all about cloud penetration testing and ethical hacking.This step-by-step guide begins by helping you design and build penetration testing labs that mimic modern cloud environments running on AWS, Azure, and Google Cloud Platform (GCP). Next, you'll find out how to use infrastructure as code (IaC) solutions to manage a variety of lab environments in the cloud. As you advance, you'll discover how generative AI tools, such as ChatGPT, can be leveraged to accelerate the preparation of IaC templates and configurations. You'll also learn how to validate vulnerabilities by exploiting misconfigurations and vulnerabilities using various penetration testing tools and techniques. Finally, you'll explore several practical strategies for managing the complexity, cost, and risks involved when dealing with penetration testing lab environments in the cloud.By the end of this penetration testing book, you'll be able to design and build cost-effective vulnerable cloud lab environments where you can experiment and practice different types of attacks and penetration testing techniques.What you will learnBuild vulnerable-by-design labs that mimic modern cloud environmentsFind out how to manage the risks associated with cloud lab environmentsUse infrastructure as code to automate lab infrastructure deploymentsValidate vulnerabilities present in penetration testing labsFind out how to manage the costs of running labs on AWS, Azure, and GCPSet up IAM privilege escalation labs for advanced penetration testingUse generative AI tools to generate infrastructure as code templatesImport the Kali Linux Generic Cloud Image to the cloud with easeWho this book is forThis book is for security engineers, cloud engineers, and aspiring security professionals who want to learn more about penetration testing and cloud security. Other tech professionals working on advancing their career in cloud security who want to learn how to manage the complexity, costs, and risks associated with building and managing hacking lab environments in the cloud will find this book useful.Table of ContentsGetting Started with Penetration Testing Labs in the CloudPreparing Our First Vulnerable Cloud Lab EnvironmentSucceeding with Infrastructure as Code Tools and StrategiesSetting Up Isolated Penetration Testing Lab Environments on GCPSetting Up Isolated Penetration Testing Lab Environments on AzureSetting Up Isolated Penetration Testing Lab Environments on AWSSetting Up an IAM Privilege Escalation LabDesigning and Building a Vulnerable Active Directory LabRecommended Strategies and Best Practices
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.What you will learnGrasp the psychological concepts and principles used in social engineering attacksDistinguish the different types of social engineering attacksExamine the impact of social engineering on social networksFind out how attackers leverage OSINT tools to perform more successful attacksWalk through the social engineering lifecycleGet a glimpse of the capabilities of Social Engineering Toolkit (SET)Who this book is forThis book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.Table of ContentsThe Psychology Behind Social EngineeringUnderstanding Social EngineeringCommon Scam AttacksTypes of Social Engineering AttacksEnhanced Social Engineering AttacksSocial Engineering and Social Network AttacksAI-Driven Techniques in Enhanced Social Engineering AttacksThe Social Engineering Toolkit (SET)Understanding the Social Engineering LifecycleDefensive Strategies for Social EngineeringApplicable Laws and Regulations for Social Engineering
The Most Up to Date Book on Dark Web & Dark Net.You must read this book if you want to learn about or embark on the dark web journey. In this short book, you'll learn the chilling tales of the dark web and dark net. You will know the fundamentals, the facts and figures about the surface web, the deep web and the dark web.The book also provides a broad overview of current and emerging digital threats and computer crimes. You will be updated with crucial information on fraud and identity theft carried out daily on the dark web.Specifically you will learn:What exactly is the dark web?The origin of the deep web and dark webActivities that take place on the dark webHow the dark web affects youHow personal data is sold on the dark webThe pieces of data most often traded on the dark webHuman organ trafficking and child pornography services in the dark webThe dark web market placesThe Tor network & how the Tor browser worksThe story of Ross William Ulbricht, the man behind the Silk RoadThe truth about the Surface Web: why some sites cannot be trusted with your informationThe most important things you will learn:What you can do to protect yourself from malicious activities in the dark webHow to keep your internet identity safe on a daily basis
This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security. During the past five years, digital cities have been emerging as a technology reality that will come to dominate the usual life of people, in either developed or developing countries. Particularly, with big data issues from smart cities, privacy and security have been a widely concerned matter due to its relevance and sensitivity extensively present in cybersecurity, healthcare, medical service, e-commercial, e-governance, mobile banking, e-finance, digital twins, and so on. These new topics rises up with the era of smart cities and mostly associate with public sectors, which are vital to the modern life of people. This volume summarizes the recent advances in addressing the challenges on big data privacy and security in smart cities and points out the future research direction around this new challenging topic.
¡Por fin! Un plan de seguridad en línea que encantará a los padres y con el que los niños podrán vivir."La mayoría de los expertos le dirán que los niños no deben estar en línea debido a los muchos peligros inherentes. Si bien estoy de acuerdo, el hecho es que en esta época, la tecnología encontrará su camino en la vida de nuestros hijos y sin preparación son vulnerables. Este libro ofrece herramientas y una estrategia integral para enseñar a los niños cómo estar seguros en línea sin abrumar a los padres que pueden no ser tan expertos en tecnología. No tiene que enviar a sus hijos a ciegas a las aguas riesgosas del mundo en línea. Puedes equiparlos con estrategias que estarán entusiasmados de seguir."
"How cultural and technological objects can reveal more information than their creators or sharers intended, or even imagined, when introduced into new contexts"--
Online Anonymity is the concept where the identities of communicators are kept secret. Online privacy is more than just encrypting/decrypting data, where, the identities are also hidden. Dark Web is that part of the Internet, which achieves anonymity and security to the highest level. Requiring specialized access methodologies unlike the normal web Dark Inside the Dark Web offers a comprehensive analysis of the inner workings of this digital domain, giving readers a rare glimpse into this modern-day frontier?In this book we will look at:Staying Anonymous on the Deep WebWhat the TOR network isWhether or not TOR is the answer for youHow to get started with TOR quickly and safelyHow to stay completely anonymous with TORHow to surf the dark web safelyWhat you can expect to find on the dark webThe groundbreaking Silk Road takedown and the digital forensics and tools employed in investigating this largely uncharted territory. Delve into the ethical and moral issues surrounding the Dark Web, but also explore the positives that can arise from its existence.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.
Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising, and cellular location data.Important questions are raised such as: How much information will we be allowed to keep private through the use of encryption on our computational devices? What rights do we have to secure and personalized channels of communication, and how should those be balanced by the state's interests in maintaining order and degrading the capacity of criminals and rival state actors to organize through data channels? What new regimes may be required for states to conduct digital searches, and how does encryption act as countersurveillance? How have key debates relied on racialized social constructions in their discourse? What transformations in journalistic media and practices have occurred with the development of encryption tools? How are the digital footprints of consumers tracked and targeted?Scholars and students from many backgrounds as well as policy makers, journalists, and the general reading public will find a multidisciplinary approach to questions of privacy and encryption encompassing research from Communication, Sociology, Critical Data Studies, and Advertising and Public Relations.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia.Digital networks allow for a granularity and pervasiveness of surveillance by government and corporate entities. This creates power asymmetries where each citizen's daily 'data exhaust' can be used for manipulative and controlling ends by powerful institutional actors. This volume explores key erosions in our fundamental human values associated with free societies by covering government surveillance of library-based activities, cognitive enhancement debates, the increasing business orientation of art schools, and the proliferation of conspiracy theories in network media.Scholars and students from many backgrounds, as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to questions of totalitarian tendencies encompassing research from Communication, Rhetoric, Library Sciences, Art and New Media.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type.Digital technologies develop at a much faster pace relative to our systems of governance which are supposed to embody democratic principles that are comparatively timeless, whether rooted in ancient Greek or Enlightenment ideas of freedom, autonomy and citizenship. Algorithms, computing millions of calculations per second, do not pause to reflect on their operations. Developments in the accumulation of vast private datasets that are used to train automated machine learning algorithms pose new challenges for upholding these values. Social media platforms, while the key driver of today's information disorder, also afford new opportunities for organized social activism. The US and China, presumably at opposite ends of an ideological spectrum, are the main exporters of AI technology to both free and totalitarian societies. These are some of the important topics covered by this volume that examines the democratic stakes for societies with the rapid expansion of these technologies.Scholars and students from many backgrounds as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to issues of democratic values and governance encompassing research from Sociology, Digital Humanities, New Media, Psychology, Communication, International Relations and Economics.Chapter 3 of this book is available for free in PDF format as Open Access from the individual product page at www.routledge.com. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media.For over a century, the indexical relationship of the photographic image, and its related media of film and video, to the scene of capture has served as a basis for truth claims. Historically, the iconicity of these images has featured a causal traceback to actual light rays in a particular time and space, which were fixed by chemical reactions or digital sensors to the resultant image. Today, photorealistic audiovisual media can be generated from deep learning networks that sever any connection to an actual event. Should society instantiate new regimes to manage this new challenge to our sense of reality and the traditional evidential capacities of the 'mechanical image'? How do these images generate information disorder while also providing the basis for legitimate tools used in entertainment and creative industries?Scholars and students from many backgrounds, as well as policymakers, journalists and the general reading public, will find a multidisciplinary approach to questions posed by deep fake research from Communication, International Studies, Writing and Rhetoric.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts. This book tackles these unexplored research areas with special emphasis on conditions, components, and consequences of cognitive, attitudinal, affective, and behavioural dimensions toward communication and AI. In doing so, this book epitomizes communication, journalism and media scholarship on AI and its social, political, cultural, and ethical perspectives.Topics vary widely from interactions between humans and robots through news representation of AI and AI-based news credibility to privacy and value toward AI in the public sphere. Contributors from such countries as Brazil, Netherland, South Korea, Spain, and United States discuss important issues and challenges in AI and communication studies. The collection of chapters in the book considers implications for not only theoretical and methodological approaches, but policymakers and practitioners alike.The chapters in this book were originally published as a special issue of Communication Studies.
This book shares new methodologies, technologies, and practices for resolving issues associated with leveraging AI-centric modeling, data analytics, ML-aided models, IoT-driven applications, and cybersecurity techniques in the era of the Industrial Revolution 4.0.
Master the art of web exploitation with real-world techniques on SAML, WordPress, IoT, ElectronJS, and Ethereum smart contractsPurchase of the print or Kindle book includes a free PDF eBookKey Features- Learn how to detect vulnerabilities using source code, dynamic analysis, and decompiling binaries- Find and exploit vulnerabilities such as SQL Injection, XSS, Command Injection, RCE, and Reentrancy- Analyze real-world security incidents based on MITRE ATT&CK to understand the risk at the CISO levelBook DescriptionWeb attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks.The book starts by emphasizing the importance of mindset and toolset in conducting successful web attacks. You'll then explore the methodologies and frameworks used in these attacks, and learn how to configure the environment using interception proxies, automate tasks with Bash and Python, and set up a research lab. As you advance through the book, you'll discover how to attack the SAML authentication layer; attack front-facing web applications by learning WordPress and SQL injection, and exploit vulnerabilities in IoT devices, such as command injection, by going through three CTFs and learning about the discovery of seven CVEs. Each chapter analyzes confirmed cases of exploitation mapped with MITRE ATT&CK. You'll also analyze attacks on Electron JavaScript-based applications, such as XSS and RCE, and the security challenges of auditing and exploiting Ethereum smart contracts written in Solidity. Finally, you'll find out how to disclose vulnerabilities.By the end of this book, you'll have enhanced your ability to find and exploit web vulnerabilities.What you will learn- Understand the mindset, methodologies, and toolset needed to carry out web attacks- Discover how SAML and SSO work and study their vulnerabilities- Get to grips with WordPress and learn how to exploit SQL injection- Find out how IoT devices work and exploit command injection- Familiarize yourself with ElectronJS applications and transform an XSS to an RCE- Discover how to audit Solidity's Ethereum smart contracts- Get the hang of decompiling, debugging, and instrumenting web applicationsWho this book is forThis book is for anyone whose job role involves ensuring their organization's security - penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, developers and DevOps professionals who want to get into the mindset of an attacker; and security managers and CISOs looking to truly understand the impact and risk of web, IoT, and smart contracts. Basic knowledge of web technologies, as well as related protocols is a must.Table of Contents- Mindset and Methodologies- Toolset for Web Attacks and Exploitation- Attacking the Authentication Layer - a SAML Use Case- Attacking Internet-Facing Web Applications - SQL Injection and Cross-Site Scripting (XSS) on WordPress- Attacking IoT Devices - Command Injection and Path Traversal- Attacking Electron JavaScript Applications - from Cross-Site Scripting (XSS) to Remote Command Execution (RCE)- Attacking Ethereum Smart Contracts - Reentrancy, Weak Sources of Randomness, and Business Logic- Continuing the Journey of Vulnerability Discovery
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.Purchase of the print or Kindle book includes a free PDF eBookKey Features:- A beginners' guide to Keycloak focussed on understanding Identity and Access Management- Implement authentication and authorization in applications using Keycloak 22- Utilize Keycloak in securing applications developed by you and the existing applications in your enterpriseBook Description:The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you'll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.By the end of this new edition, you'll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.What You Will Learn:- Understand how to install, configure, and manage the latest version of Keycloak- Discover how to obtain access tokens through OAuth 2.0- Utilize a reverse proxy to secure an application implemented in any programming language or framework- Safely manage Keycloak in a production environment- Secure different types of applications, including web, mobile, and native applications- Discover the frameworks and third-party libraries that can expand KeycloakWho this book is for:This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.Table of Contents- Getting Started with Keycloak- Securing Your First Application- Brief Introduction to Standards- Authenticating Users with OIDC- Authorizing Access with OAuth 2.0- Securing Different Application Types- Integrating Applications with Keycloak- Authorization Strategies- Configuring Keycloak for Production- Managing Users- Authenticating Users- Managing Tokens and Sessions- Extending Keycloak- Securing Keycloak and Applications
The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment.The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.
The Power of Personal Data: How it Shapes the Future of Business and SocietyIn today's digital age, personal data has become a valuable commodity, fueling the growth of many businesses and shaping the society we live in. The widespread use of the Internet and mobile devices has given rise to new business models that cater to our every need and convenience online. As a result, there is a race for data supremacy through the collection and exploitation of personal data, which feeds artificial intelligence (AI) tools and solutions such as ChatGPT, BingAI, and others.Here are a few highlights of what you will learn: Companies collect and analyze personal data to market to consumers based on their searches, behavioral habits, and purchasing patterns.Some of these companies provide habit-changing services that can result in irreversible social change.Personal data has become a currency that people are willing to trade for convenience, entertainment, and instant gratification.The book delves into the potential impact of personal data on the future of business and society.It explores the new surveillance capitalism business model, privacy concerns, the impact of social media, and how the future is shaping up given AI, Metaverse, and other online data-hungry solutions and applications.It also offers practical steps (Digital Gold Nuggets) that individuals can take to reclaim and reposition their data power.Some readers may be skeptical about the impact of personal data on society and may question the practicality of the suggested steps to reclaim data power.By understanding the power of personal data, readers can take control of their digital footprint and make informed decisions about their online activities.This book is a must-read for anyone concerned about the future of privacy and the impact of personal data on society.Get your copy of the book today to discover the power of personal data and take control of your digital life.
"Jäger der Digitalen Schatten: OSINT und Personenrecherche im Internet" ist ein praxisnaher Einblick in das Handwerk der digitalen Informationsbeschaffung. Geschrieben von einer Top-Führungskraft und Berater mit umfangreicher Expertise in internen Untersuchungen und globalen Compliance-Verfahren bei renommierten DAX-Konzernen, beleuchtet dieses Buch die facettenreiche Welt der OSINT-Methodik (Open Source Intelligence).Weit mehr als ein Leitfaden, enthüllt dieses Werk die Feinheiten effizienter Datensammlung, -zusammenstellung und -analyse, und befähigt die Leser dazu, relevante Informationen aus der überwältigenden Flut an Online-Daten zu extrahieren und nach Relevanz zu bewerten. Der Autor teilt seine wertvollen praktischen Erfahrungen und bietet eine Vielzahl von Praxistipps, ergänzt durch eine ausführliche Darstellung nützlicher Tools aus dem Internet und dem Darkweb - Tools, die viele lieber im Verborgenen halten würden."Jäger der Digitalen Schatten" ist nicht nur eines der wenigen deutschsprachigen Praxisbücher über OSINT, es ist ein Leitfaden erprobter Methoden und Insiderwissen. Es ist unentbehrlich für Ermittler, Staatsanwälte, interne Untersucher und Journalisten, bietet aber gleichzeitig fesselnde Einblicke für jeden, der ein Interesse an der Welt der digitalen Informationssammlung hat. Dieses Buch bietet Ihnen eine völlig neue Perspektive auf die Möglichkeiten und Herausforderungen des Internets.
Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you answered yes to all these questions, you've come to the right place.Unlike malicious hacking, ethical hacking is a legal way to test the vulnerabilities of a system. Many organizations are still wary of ethical hackers, and they have every right to be since some hackers lie for their own benefit. That being said, many organizations are now searching for ethical hackers because they want to identify a way to protect themselves and their customers and employees.Over the course of the book, you will learn more about what ethical hacking is and will begin to comprehend the different types of attacks that an ethical hacker can perform on a system. This book will talk about:¿ What ethical hacking is and how it is different from malicious hacking¿ Why it's important to hack a system¿ What the different phases of ethical hacking are¿ The steps that an ethical hacker must take to protect himself¿ The different skills an ethical hacker must have¿ The different tools that a hacker can utilize to test a system¿ Different types of attacks that can be performed on a system¿ How the hacker should protect a system from such attacksThis book provides numerous examples of different attacks and also includes some exercises that you can follow when you're performing these attacks for the first time. It is important to remember that ethical hacking is becoming one of the most sought-after professions because every organization is looking for a way to protect their data.
This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g. Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.