Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen. Im Vordergrund steht dabei, die Ursachen für Probleme heutiger IT-Systeme zu verdeutlichen und die grundlegenden Sicherheitskonzepte mit ihren jeweiligen Vor- und Nachteilen zu präsentieren. Der Leser entwickelt nicht nur ein Bewusstsein für IT-Sicherheitsrisiken, sondern erwirbt auch ein breites und grundlegendes Wissen zu deren Behebung. IT-Systeme und die Digitalisierung sind in allen Bereichen und Branchen von zentraler Bedeutung. Die IT-Sicherheit oder Cybersicherheit nimmt dabei eine tragende Rolle ein. Sie hat die Aufgabe sicher zu stellen, dass die verarbeiteten Daten nicht gezielt verfälscht werden, dass wertvolle Information nicht in falsche Hände gelangt und dass die IT-Systeme nicht in ihrer Funktion beeinträchtigt werden. Heutige IT-Systeme sind einer Vielzahl von Bedrohungen ausgesetzt und weisen noch immer viele Verwundbarkeiten auf. Gleichzeitig gibt es viele, zum Teil standardisierte Sicherheitslösungen, mit denen die Bedrohungen und die damit einhergehenden Risiken reduziert werden können. Kenntnisse möglicher Sicherheitsschwachstellen und möglicher Angriffe auf IT-Systeme, sowie der wichtigsten Sicherheitslösungen und deren Wirksamkeit sind essentiell, um IT-Systeme abzusichern und eine vertrauenswürdige Basis für die digitalen Prozesse zu schaffen. Aus den Inhalten: ¿ Sicherheitsschwachstellen, -bedrohungen und Angriffe ¿ Internet-(Un)Sicherheit ¿ Secure Engineering ¿ Kryptographische Verfahren und Schlüsselmanagement ¿ Digitale Identität ¿ Zugriffskontrolle ¿ Netzwerk-, Kommunikations- und Anwendungssicherheit ¿ Sichere drahtlose Kommunikation
Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation.Topics and features:Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications)Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for usersOffers characterization of privacy models, comparing their differences, advantages, and disadvantagesDescribes some of the most relevant algorithms to implement privacy modelsIncludes examples of data protection mechanismsThis unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview.Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.
Beginning-Intermediate user level
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test QuestionsInformation security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry.In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you'll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide.The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You'll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides:* Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies* Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions* Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key termsThe CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.
The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.
Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to conclusions about who we are. They even shape our everyday thoughts and actions - from who we date to how we vote. But this is just the latest front in an age-old struggle.Part history and part manifesto, Freedom to Think charts the history and importance of our most basic human right: freedom of thought. From Galileo to Nudge Theory to Alexa, human rights lawyer Susie Alegre explores how the powerful have always sought to get inside our heads, influence how we think and shape what we buy. Providing a bold new framework to understand how our agency is being gradually undermined, Freedom to Think is a ground-breaking and vital charter for taking back our humanity and safeguarding our reason.
Learn to gather and analyze publicly available data for your intelligence needsIn Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae Baker explains how to use publicly available data to advance your investigative OSINT skills and how your adversaries are most likely to use publicly accessible data against you. The author delivers an authoritative introduction to the tradecraft utilized by open-source intelligence gathering specialists while offering real-life cases that highlight and underline the data collection and analysis processes and strategies you can implement immediately while hunting for open-source info.In addition to a wide breadth of essential OSINT subjects, you'll also find detailed discussions on ethics, traditional OSINT topics like subject intelligence, organizational intelligence, image analysis, and more niche topics like maritime and IOT. The book includes:* Practical tips for new and intermediate analysts looking for concrete intelligence-gathering strategies* Methods for data analysis and collection relevant to today's dynamic intelligence environment* Tools for protecting your own data and information against bad actors and potential adversariesAn essential resource for new intelligence analysts, Deep Dive: Exploring the Real-world Value of Open Source Intelligence is also a must-read for early-career and intermediate analysts, as well as intelligence teams seeking to improve the skills of their newest team members.
"This is a powerful model of engaged, twenty-first century social criticism. Writing in the tradition of Jane Jacobs, Margaret Mead, and Rebecca Solnit, Jessa Lingel is a formidable new critical voice in America."--Siva Vaidhyanathan, author of Antisocial Media and The Googlization of Everything "The Gentrification of the Internet deftly dismantles romanticized notions of Big Tech, helping readers understand the internet as a site of increasing isolation, commodification, surveillance, and displacement. This readable and accessible book will definitely be required reading for all my courses." --Clemencia Rodríguez, Professor of Media Studies, Temple University "Jessa Lingel's book persuasively demonstrates that gentrification and its consequences in terms of displacement, isolation and commercialization has migrated from the realm of the urban economy to the internet. A revealing account of the way the digital world has transitioned from a space for DIY countercultures to a playground for the corporate oligarchy."--Paolo Gerbaudo, Director of the Centre for Digital Culture at King's College London
'Devastating and urgent, this book could not be more timely' Caroline Criado Perez, award-winning and bestselling author of Invisible WomenDanielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone.The boundary that once protected our intimate lives from outside interests is an artefact of the twentieth century. In the twenty-first, we have embraced a vast array of technology that enables constant access and surveillance of the most private aspects of our lives. From non-consensual pornography, to online extortion, to the sale of our data for profit, we are vulnerable to abuse -- and our laws have failed miserably to keep up.With vivid examples drawn from interviews with victims, activists and lawmakers from around the world, The Fight for Privacy reveals the threat we face and argues urgently and forcefully for a reassessment of privacy as a human right. As a legal scholar and expert, Danielle Citron is the perfect person to show us the way to a happier, better protected future.
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against Android malware.
The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
Take control of your personal data. Learn how companies manipulate and exploit your data and what you can do to access, delete, and monetise it yourself. The data you generate every day makes big companies rich. In Data for All, bestselling author John K Thompson outlines how this one-sided data economy is about to come to a dramatic end. Thompson pulls back the curtain to reveal the true nature of data ownership and explains how you can turn your data from an exploited resource into a financial asset. More about the book Both a handbook and a manifesto, Data for All is a must-read for anyone who wants to take control of their personal data. It lays out how businesses collect, use, and exploit data, providing a clear explanation of how the legislation overturns the existing system. By following this direct and accessible guide, you will completely change the way you handle your data. In this fascinating book, you will learn how to oversee who accesses your data, how much different types of data are worth, and how to keep private details private. You wil soon stop being a passive source of free data, and start earning a "data dividend"--hundreds or thousands of dollars paid out simply for your daily online activities. About the reader This text is for anyone curious or concerned about how their data is used, and what they can do to reclaim ownership. No technical knowledge is required. About the author John K. Thompson is an international technology executive with over 35 years of experience in the fields of data, advanced analytics, and Artificial Intelligence (AI). He was an executive partner at Gartner, and he was responsible for the advanced analytics business unit of the Dell Software Group. John is the author of Analytics Teams: Harnessing Analytics and Artificial Intelligencefor Business Improvement and co-author of Analytics: How to win with Intelligence. He holds a bachelor of science degree in Computer Science from Ferris State University and an MBA in Marketing from DePaul University.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tägliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen.Sie müssen keine Vorkenntnisse über diese vielseitigen Technologien haben, denn der Autor Volker Lang führt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einprägsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nächsten Kapitel übergehen. Dieses Buch geht den digitalen Schlagwörtern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten.Das Aufschlüsseln von Themen wie automatisiertes Fahren und intelligente Robotik mit künstlicher Intelligenz, Blockchain-basierte Kryptowährungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlässlich, um für die Zukunft der Industrie gerüstet zu sein. Unabhängig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder öffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan für alle Ihre Anforderungen an Technologie- und Innovationsstrategien.Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse über digitale Technologien und digitale Transformation zu benötigen Lernen Sie die beliebtesten aktuellen und zukünftigen Anwendungen von künstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit führenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um.Für wen dieses Buch bestimmt ist Vordenker, Führungskräfte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungsträger, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.
"Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate 'secure' systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience? In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals"--Back cover.
This book presents new cyber-physical security findings for Industry 4.0 using emerging technologies like Artificial Intelligence, Data Mining and Applied Mathematics which are the essential components for processing data, recognizing patterns, modelling new techniques and improving the advantages of the Data Science more.
This edited book covers novel techniques and solutions that provide medical information processing and security for smart healthcare applications. It covers the recent trends in the field of medical information processing and focuses on new security approaches and privacy solutions for smart healthcare applications.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.