Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Myjwc Publishing
    168,95 kr.

    This client logbook is a written record of a client's interactions with a particular service or organization. It typically includes important details such as the client's personal information, the dates and times of their appointments or visits, the services provided, any relevant notes or observations made by staff members, and any progress made toward the client's goals or objectives. The logbook may also contain important documents or forms related to the client's care, as well as contact information for relevant service providers. Overall, the purpose of a client logbook is to provide a comprehensive and detailed record of a client's experiences and interactions with a particular service or organization, which can be used to inform future care and support.

  • af Jie Wu & En Wang
    2.012,95 kr.

    This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization. Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computationtasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book. Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.

  • af Mark Stamp
    1.704,95 - 1.714,95 kr.

    This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity.This book also provides insight into the difficult "e;how"e; and "e;why"e; questions that arise in AI within the security domain. For example, this book includes chapters covering "e;explainable AI"e;, "e;adversarial learning"e;, "e;resilient AI"e;, and a wide variety of related topics. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.

  • af Sanjay Goel
    1.032,95 kr.

    This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.

  • af Anna Lisa Ferrara
    1.123,95 kr.

    This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19¿21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.

  • af Srikanta Patnaik
    2.413,95 - 2.423,95 kr.

    This book presents a collection of peer-reviewed best selected research papers presented at the First International Conference on Smart and Sustainable Technologies (ICSST 2021), organized by Department of ECE, GIET University, Gunupur, Rayagada, Odisha, India, during December 16-18, 2021. The proceedings of the conference have a special focus on the developments of local tribe and rural people using smart and sustainable technologies. It is an interdisciplinary platform for researchers, practitioners, and educators as well as NGO workers who are working in the area of web engineering, IoT and cloud computing, Internet of Everything, data science, artificial intelligence, machine learning, computer vision, and intelligent robotics, particularly for the rural and tribal development.

  • af Martin Serrano Orozco
    1.238,95 kr.

    In this second part of the INFINITECH book series, which is a series of three books, the basic concepts for FinTech referring to the diversity in the use of technology to underpin the delivery of financial services are reviewed. The demand and the supply side in 16 of the most representatives scenarios in the financial sector are demonstrated, and further discussed is why FinTech nowadays is considered the most trendy topic in the Financial Industry, being responsible for waves of services digitization. Financial technology (FinTech) and insurance technology (InsuranceTech) are rapidly transforming the financial and insurance services industry. An overview of Reference Architecture (RA) for BigData, IoT and AI applications in the financial and insurance sectors (INFINITECH-RA) are also provided. Moreover, the book reviews the concept of innovation and its application in INFINITECH, and innovative technologies provided by the project for financial sector practical examples

  • af Chaminda Hewage
    1.993,95 kr.

    This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g. Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.

  • af Paolo Mori
    709,95 kr.

    This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from February 11¿13, 2021 and February 9¿11, 2022. respectively.The 6 full papers included in this book were carefully reviewed and selected from 217 submissions. The ICISSP 2021 and 2022 book contains extended and revised version of proceedings papers dealing with information systems security and privacy.

  • af Ru Campbell
    573,95 kr.

    Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threatsPurchase of the print or Kindle book includes a free PDF ebookKey Features:- Help in understanding Microsoft 365 Defender and how it is crucial for security operations- Implementation of the proactive security defense capabilities of Microsoft Defender for Endpoint, Identity, Office 365, and Cloud Apps so that attacks can be stopped before they start- A guide to hunting and responding to threats using M365D's extended detection and response capabilitiesBook Description:This book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively.You'll start with a quick overview of cybersecurity risks that modern organizations face, such as ransomware and APT attacks, how Microsoft is making massive investments in security today, and gain an understanding of how to deploy Microsoft Defender for Endpoint by diving deep into configurations and their architecture.As you progress, you'll learn how to configure Microsoft Defender Antivirus, and onboard and manage macOS, Android, and Linux MDE devices for effective solutions. You'll also learn how to deploy Microsoft Defender for Identity and explore its different deployment methods that can protect your hybrid identity platform, as well as how to configure Microsoft Defender for Office 365 and Cloud Apps, and manage KQL queries for advanced hunting with ease. Toward the end, you'll find out how M365D can be integrated with Sentinel and how to use APIs for incident response.By the end of this book, you will have a deep understanding of Microsoft 365 Defender, and how to protect and respond to security threats.What You Will Learn:- Understand the Threat Landscape for enterprises- Effectively implement end-point security- Manage identity and access management using Microsoft 365 defender- Protect the productivity suite with Microsoft Defender for Office 365- Hunting for threats using Microsoft 365 DefenderWho this book is for:You're a security engineer, incident responder, blue teamer, or an IT security professional who wants to deploy and manage Microsoft 365 Defender services and successfully investigate and respond tocyber threatsYou have a basic understanding of networking, vulnerabilities, operating systems, email, Active Directory, and cloud appsTable of Contents- Microsoft and Modern Cybersecurity Threats- Microsoft 365 Defender: The Big Picture- The Fundamentals of Microsoft Defender for Endpoint- Onboarding Windows Clients and Servers- Getting Started with Microsoft Defender Antivirus for Windows- Advanced Microsoft Defender Antivirus for Windows- Managing Attack Surface Reduction for Windows- Managing Additional Capabilities for Windows- Onboarding and Managing macOS- Onboarding and Managing Linux Servers- Onboarding and Managing iOS and Android- Deploying Microsoft Defender for Identity- Managing Defender for Identity- Deploying Exchange Online Protection- Deploying Defender for Office 365- Implementing and Managing Microsoft Defender for Cloud Apps- Maintaining Security Hygiene and Threat Awareness- Extended Detection and Response with Microsoft 365 Defender- Advanced Hunting with KQL- Microsoft Sentinel Integration- Understanding Microsoft 365 Defender APIs- Glossary- Answers

  • af Zhihan Lyu
    1.443,95 kr.

    This book covers cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and video monitoring.

  • af Ahmed A Abd El-Latif
    1.398,95 kr.

    This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns.

  • af Glen D. Singh
    433,95 kr.

    Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and networksPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn how adversaries use reconnaissance techniques to discover security vulnerabilities on systemsDevelop advanced open source intelligence capabilities to find sensitive informationExplore automated reconnaissance and vulnerability assessment tools to profile systems and networksBook Description:This book explores reconnaissance techniques - the first step in discovering security vulnerabilities and exposed network infrastructure. It aids ethical hackers in understanding adversaries' methods of identifying and mapping attack surfaces, such as network entry points, which enables them to exploit the target and steal confidential information.Reconnaissance for Ethical Hackers helps you get a comprehensive understanding of how threat actors are able to successfully leverage the information collected during the reconnaissance phase to scan and enumerate the network, collect information, and pose various security threats. This book helps you stay one step ahead in knowing how adversaries use tactics, techniques, and procedures (TTPs) to successfully gain information about their targets, while you develop a solid foundation on information gathering strategies as a cybersecurity professional. The concluding chapters will assist you in developing the skills and techniques used by real adversaries to identify vulnerable points of entry into an organization and mitigate reconnaissance-based attacks.By the end of this book, you'll have gained a solid understanding of reconnaissance, as well as learned how to secure yourself and your organization without causing significant disruption.What You Will Learn:Understand the tactics, techniques, and procedures of reconnaissanceGrasp the importance of attack surface management for organizationsFind out how to conceal your identity online as an ethical hackerExplore advanced open source intelligence (OSINT) techniquesPerform active reconnaissance to discover live hosts and exposed portsUse automated tools to perform vulnerability assessments on systemsDiscover how to efficiently perform reconnaissance on web applicationsImplement open source threat detection and monitoring toolsWho this book is for:If you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. Cybersecurity professionals will find this book useful in determining the attack surface of their organizations and assets on their network, while understanding the behavior of adversaries.

  • af Sasa Kovacevic
    488,95 kr.

    Explore the methodologies and reasons behind successful legacy application moves to a hyper-space cloud, specifically AzurePurchase of the print or Kindle book includes a free PDF eBookKey Features:Discover tips and tricks to help you avoid common pitfalls and get up and running quicklyGain in-depth end-to-end knowledge of all things cloud to smoothen your learning journeyExplore everything from formulating a plan to governing the cloud over the long termBook Description:You've heard about the benefits of the cloud and you want to get on board, but you're not sure where to start, what services to use, or how to make sure your data is safe. Making the decision to move to the cloud can be daunting and it's easy to get overwhelmed, but if you're not careful, you can easily make mistakes that cost you time and money.Azure Cloud Adoption Framework Handbook is here to help. This guide will take you step-by-step through the process of making the switch to the Microsoft Azure cloud. You'll learn everything from foundational cloud concepts and planning workload migration through to upskilling and organization transformation. As you advance, you'll find out how to identify and align your business goals with the most suitable cloud technology options available. The chapters are designed in a way to enable you to plan for a smooth transition, while minimizing disruption to your day-to-day operations. You'll also discover how the cloud can help drive innovation in your business or enable modern software development practices such as microservices and CI/CD. Throughout the chapters, you'll see how decision makers can interact with other internal stakeholders to achieve success through the power of collaboration.By the end of this book, you'll be more informed and less overwhelmed about moving your business to the cloud.What You Will Learn:Understand cloud adoption and digital transformation generallyGet to grips with the real-world, day-to-day running of a cloud platformDiscover how to plan and execute the cloud adoption journeyGuide all levels of the organization through cloud adoptionInnovate with the business goals in mind in a fast and agile wayBecome familiar with advanced topics such as cloud governance, security, and reliabilityWho this book is for:This book provides actionable strategies for anyone looking to optimize their organization's cloud adoption journey or get back on course, from IT managers and system architects to CXOs and program managers. Whether you're an enterprise or a fledgling start-up, this handbook has everything you need to get started with your cloud journey. General IT knowledge and a basic understanding of the cloud, modern software development practices, and organizational change management concepts are all prerequisites.

  • af Gilbert Peterson
    1.008,95 - 1.017,95 kr.

    Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations.  Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings.  Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVIII describes original research results and innovative applications in the discipline of digital forensics.  In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.  The areas of coverage include: This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics.  The book contains a selection of eleven edited papers from the Eighteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, a fully-virtual event held in the winter of 2022.  

  • af Faris Elghaish
    1.395,95 - 1.980,95 kr.

    This book significantly contributes the digital transformation of construction. The book explores the capabilities of deep learning to provide smart solutions for the construction industry, particularly in areas of managing equipment, design optimization, energy optimization and detect cracks for buildings and highways. It provides conceptual solutions but also practical techniques. A new deep learning CNN-based highway cracks detection is demonstrated, and its usefulness is tested. The resulting deep learning CNN model will enable users to scan long distance of highway and detect types of cracks accurately in a very short time compared to traditional approaches.The book explores the integration of IoT and blockchain to provide practical solutions to tackle existing challenges like the endemic fragmentation in supply chain, the need for monitoring construction projects remotely and tracking equipment on the site. The Blockchain of Things (BCoT) concept has been introduced to exploit the advantages of IoT and blockchain, and different applications were developed based on this integration in leading industries such as shared economy and health care. Workable potential use cases to exploit successful utilization of BCoT for the construction industry are explored in the book's chapters.This book will appeal to researchers in providing a comprehensive review of related literature on blockchain, the IoT and construction identify gaps and offer a springboard for future research. Construction practitioners, research and development institutes and policy makers will also benefit from its usefulness as a reference book and collection of case studies on the application of these new approaches in construction.

  • af Sandika S. Sukhdeve
    493,95 kr.

    This book is your practical and comprehensive guide to learning Google Cloud Platform (GCP) for data science, using only the free tier services offered by the platform.Data science and machine learning are increasingly becoming critical to businesses of all sizes, and the cloud provides a powerful platform for these applications. GCP offers a range of data science services that can be used to store, process, and analyze large datasets, and train and deploy machine learning models.The book is organized into seven chapters covering various topics such as GCP account setup, Google Colaboratory, Big Data and Machine Learning, Data Visualization and Business Intelligence, Data Processing and Transformation, Data Analytics and Storage, and Advanced Topics. Each chapter provides step-by-step instructions and examples illustrating how to use GCP services for data science and big data projects.Readers will learn how to set up a Google Colaboratory account and run Jupyternotebooks, access GCP services and data from Colaboratory, use BigQuery for data analytics, and deploy machine learning models using Vertex AI. The book also covers how to visualize data using Looker Data Studio, run data processing pipelines using Google Cloud Dataflow and Dataprep, and store data using Google Cloud Storage and SQL.What You Will LearnSet up a GCP account and projectExplore BigQuery and its use cases, including machine learningUnderstand Google Cloud AI Platform and its capabilities Use Vertex AI for training and deploying machine learning modelsExplore Google Cloud Dataproc and its use cases for big data processingCreate and share data visualizations and reports with Looker Data StudioExplore Google Cloud Dataflow and its use cases for batch and stream data processing Run data processing pipelines on Cloud DataflowExplore Google Cloud Storageand its use cases for data storage Get an introduction to Google Cloud SQL and its use cases for relational databases Get an introduction to Google Cloud Pub/Sub and its use cases for real-time data streamingWho This Book Is ForData scientists, machine learning engineers, and analysts who want to learn how to use Google Cloud Platform (GCP) for their data science and big data projects

  • af Stan Z. Li, Sergio Escalera, Guodong Guo, mfl.
    338,95 kr.

    This book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors begin with fundamental and foundational information on face spoofing attack detection, explaining why the computer vision community has intensively studied it for the last decade. The authors also discuss the reasons that cause face anti-spoofing to be essential for preventing security breaches in face recognition systems. In addition, the book describes the factors that make it difficult to design effective methods of face presentation attack detection challenges. The book presents a thorough review and evaluation of current techniques and identifies those that have achieved the highest level of performance in a series of ChaLearn face anti-spoofing challenges at CVPR and ICCV. The authors also highlight directions for future research in face anti-spoofing that would lead to progress in the field. Additional analysis, new methodologies, and a more comprehensive survey of solutions are included in this new edition.

  • af George Gibson
    168,95 - 268,95 kr.

  • af Jan Faky
    301,95 kr.

    Studienarbeit aus dem Jahr 2022 im Fachbereich Informatik - Künstliche Intelligenz, Note: 1,7, IU Internationale Hochschule, Sprache: Deutsch, Abstract: Auch wenn es uns nicht offensichtlich ist, werden ähnliche fortgeschrittene technologische Systeme mit künstlicher Intelligenz heutzutage im Roboterjournalismus mithilfe bestimmter Algorithmen überwiegend auch in Medienbranchen benutzt, um Informationen beispielsweise über den Verkehr in verschiedenen Regionen oder das Wetter automatisiert zu produzieren. Diese Zahlreiche Anwendungen und ihre Potenziale bringen allerdings Herausforderungen mit sich. Ob diese Systeme Journalisten oder Autoren ersetzen und wie den Einsatz von künstlicher Intelligenz uns beeinflusst, werden im Rahmen dieser Seminararbeit verdeutlicht. Beginnend werden allgemeine Begriffe wie Roboterjournalismus und künstliche Intelligenz genauer definiert, um die darauffolgenden, multimodalen und vorteilhaften Anwendungen in den Medien besser verstehen zu können. Darüber hinaus werden weitere Perspektiven sowie Vor- und Nachteile vom Einsatz dieser Art von komplexen autonomen Systemen diskutiert.

  • af Lakhmi C. Jain, Kun Zhang, Roumen Kountchev & mfl.
    2.413,95 - 2.428,95 kr.

  • af Maria Virvou, Jeng-Shyang Pan, Zhenyu Meng & mfl.
    2.423,95 - 3.123,95 kr.

    This book presents selected papers from the 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 14th International Conference on Frontiers of Information Technology, Applications and Tools, held on 29-31 October 2021 in Kaohsiung, Taiwan. It is divided into two volumes and discusses latest research outcomes in the field of information technology (IT) including but not limited to information hiding, multimedia signal processing, big data, data mining, bioinformatics, database, industrial and internet of things, and their applications.

  • af Vikas Grover
    488,95 kr.

    Accelerate your career growth by building dynamic applications that function across all environments and cloud typesPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn hybrid cloud architecture from experienced cloud and telco architectsAdapt and deploy emerging technologies like AI and ML in a standardized and secure mannerMaster communication between Kubernetes clusters and managementBook Description:Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud.You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you'll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You'll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises.By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.What You Will Learn:Design and build a foundation for hybrid cloud platformLeverage Kubernetes, containers, and GitOps for hybrid cloudUse architectural pattern blueprints to deliver applications on hybrid cloudEnable communication between applications hosted on different cloudsRollout zero-touch provisioning and monitoring in a hybrid architectureEnhance stability and scale up or down without rebuilding appsUnderstand principles of hybrid cloud security for application stackDesign cost-optimized systems based on the economics of hybrid cloudWho this book is for:This book is for cloud architects, developers, and DevOps engineers, responsible for delivering modern applications and deploying resources anywhere. Professionals aspiring to implement distributed and cloud solutions will also benefit from reading this book. Basic understanding of VM, containers, CI/CD and familiarity with public cloud and edge is a must.

  • af Jerry Andriessen
    1.593,95 - 1.602,95 kr.

    This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology.This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations  based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security.Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed.This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book. 

  • af Tasha Penwell
    267,95 kr.

    Improve cloud security within your organization by leveraging AWS¿s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. Yoüll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization¿s needs. Yoüll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization¿s business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not ¿one and done¿ Reinforce the need for updates and monitoring as a continued part of AWS securityWho This Book Is ForCloud computing architects, security professionals, security engineers, and software professionals interested in Cloud security.

  • af Mohammad Faisal, Halima Sadia & Mohd Shahid Husain
    1.873,95 - 2.433,95 kr.

  • af Mz Naser
    1.409,95 - 2.196,95 kr.

    This handbook aims at modernizing the current state of civil engineering and firefighting, especially in this era where infrastructures are reaching new heights, serving diverse populations, and being challenged by unique threats. Its aim is to set the stage toward realizing contemporary, smart, and resilient infrastructure.The Handbook of Cognitive and Autonomous Systems for Fire Resilient Infrastructures draws convergence between civil engineering and firefighting to the modern realm of interdisciplinary sciences (i.e., artificial intelligence, IoT, robotics, sensing, and human psychology). As such, this work aims to revolutionize the current philosophy of design for one of the most notorious extreme events: fire. Unlike other publications, which are narrowed to one specific research area, this handbook cultivates a paradigm in which critical aspects of structural design, technology, and human behavior are studied and examined through chapters written by leaders in their fields. This handbook can also serve as a textbook for graduate and senior undergraduate students in Civil, Mechanical, and Fire Protection engineering programs as well as for students in Architectural and social science disciplines. Students, engineers, academics, professionals, scientists, firefighters, and government officials involved in national and international societies such as the American Society of Civil Engineers (ASCE), Society of Fire Protection Engineers (SFPE), National Fire Protection Association (NFPA), and Institute of Electrical and Electronics Engineers (IEEE), among others, will benefit from this handbook.

  • af Carina Thull
    473,95 kr.

    Cyberrisiken sind für Unternehmen weltweit das größte Geschäftsrisiko. Die zunehmende Wahrscheinlichkeit, von einem Cyberangriff betroffen zu werden, wirft die Frage der Absicherung potentieller Schäden durch Versicherungen auf. Vor diesem Hintergrund untersucht die Autorin anhand der Musterbedingungen des Gesamtverbandes der deutschen Versicherungswirtschaft zur Cyber-Risikoversicherung (AVB Cyber), inwieweit Cyberrisiken angemessen abgesichert werden können. Daneben widmet sie sich der Absicherung durch traditionelle Sach- und Haftpflichtversicherungen. Ein wichtiger Aspekt betrifft die Problematik um ¿silent cyber". Unter diesem Stichwort wird die Absicherung von Cyberrisiken durch konventionelle Versicherungen zusammengefasst, die diese Risiken weder ausdrücklich ein- noch ausschließen.

  • af Paul A. Watters
    672,95 kr.

    This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.