Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec considerationsKey FeaturesFind out how to attack real-life Microsoft infrastructureDiscover how to detect adversary activities and remediate your environmentApply the knowledge you've gained by working on hands-on exercisesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis book teaches you the tactics and techniques used to attack a Windows-based environment, along with showing you how to detect malicious activities and remediate misconfigurations and vulnerabilities.You'll begin by deploying your lab, where every technique can be replicated. The chapters help you master every step of the attack kill chain and put new knowledge into practice. You'll discover how to evade defense of common built-in security mechanisms, such as AMSI, AppLocker, and Sysmon; perform reconnaissance and discovery activities in the domain environment by using common protocols and tools; and harvest domain-wide credentials. You'll also learn how to move laterally by blending into the environment's traffic to stay under radar, escalate privileges inside the domain and across the forest, and achieve persistence at the domain level and on the domain controller. Every chapter discusses OpSec considerations for each technique, and you'll apply this kill chain to perform the security assessment of other Microsoft products and services, such as Exchange, SQL Server, and SCCM.By the end of this book, you'll be able to perform a full-fledged security assessment of the Microsoft environment, detect malicious activity in your network, and guide IT engineers on remediation steps to improve the security posture of the company.What you will learnUnderstand and adopt the Microsoft infrastructure kill chain methodologyAttack Windows services, such as Active Directory, Exchange, WSUS, SCCM, AD CS, and SQL ServerDisappear from the defender's eyesight by tampering with defensive capabilitiesUpskill yourself in offensive OpSec to stay under the radarFind out how to detect adversary activities in your Windows environmentGet to grips with the steps needed to remediate misconfigurationsPrepare yourself for real-life scenarios by getting hands-on experience with exercisesWho this book is forThis book is for pentesters and red teamers, security and IT engineers, as well as blue teamers and incident responders interested in Windows infrastructure security. The book is packed with practical examples, tooling, and attack-defense guidelines to help you assess and improve the security of your real-life environments. To get the most out of this book, you should have basic knowledge of Windows services and Active Directory.Table of ContentsGetting the Lab Ready and Attacking Exchange ServerDefense EvasionDomain Reconnaissance and Discovery Credential Access in DomainLateral Movement in Domain and Across ForestsDomain Privilege EscalationPersistence on Domain LevelAbusing Active Directory Certificate ServicesCompromising Microsoft SQL ServerTaking over WSUS and SCCM
This book constitutes the proceedings of the 12th International Congress on Telematics and Computing, WITCOM 2023, held in Puerto Vallarta, Mexico, in November 2023. The 35 full papers presented in this volume were carefully reviewed and selected from 88 submissions. The papers are focused on the topics of artificial intelligence techniques, data science, blockchain, environment monitoring, cybersecurity, education, and software for communications protocols.
This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.
This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22¿23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.
Blockchains are meant to provide an append-only sequence (ledger) of transactions. Security commonly relies on a consensus protocol in which forks in the sequence are either prevented completely or are exponentially unlikely to last more than a few blocks. This monograph proposes the design of algorithms and a system to achieve high performance (a few seconds from the time of initiation for transactions to enter the blockchain), the absence of forks, and a very low energy cost (a per transaction cost that is a factor of a billion or more less than bitcoin). The foundational component of this setup is a group of satellites whose blockchain protocol code can be verified and burned into read-only memory. Because such satellites can perhaps be destroyed but cannot be captured (unlike even fortified terrestrial servers), a reasonable assumption is that the blockchain protocol code in the satellites may fail to make progress either permanently or intermittently but will not be traitorous. A second component of this setup is a group of terrestrial sites whose job is to broadcast information about blocks and to summarize the blockchain ledger. These can be individuals who are eager to get a fee for service. Even if many of these behave traitorously (against their interests as fee-collectors), a small number of honest ones is sufficient to ensure safety and liveness. The third component of this setup is a Mission Control entity which will act very occasionally to assign roles to terrestrial sites and time slots to satellites. These assignments will be multi-signed using the digital signatures of a widely distributed group of human governors. Given these components and these reasonable assumptions, the protocol described in this monograph, called Bounce, will achieve ledger functionality for arbitrarily sized blocks at under five seconds per block and at negligible energy cost. This monograph will discuss the overall architecture and algorithms of such a system, the assumptions it makes, and the guarantees it gives.
This book consists of selected peer-reviewed articles from the International Conference on Computer Vision, High Performance Computing, Smart Devices and Networks (CHSN-2020), held at JNTU, Kakinada, India. The theme and areas of the conference include vast scope for latest concepts and trends in communication engineering, information theory and networks, signal, image and speech processing, wireless and mobile communication, Internet of Things, and cybersecurity for societal causes and humanitarian applications.
Build a solid foundation in DevOps and Linux systems as well as advanced DevOps practices such as configuration, IAC, and CI/CDKey Features:Master Linux basics, the command line, and shell scriptingBecome a DevOps expert by mastering Docker, Git, monitoring, automation, and CI/CDImplement networking, manage services, and leverage Infrastructure as Code (IaC)Purchase of the print or Kindle book includes a free PDF eBookBook Description:The Linux DevOps Handbook is a comprehensive resource that caters to both novice and experienced professionals, ensuring a strong foundation in Linux. This book will help you understand how Linux serves as a cornerstone of DevOps, offering the flexibility, stability, and scalability essential for modern software development and operations.You'll begin by covering Linux distributions, intermediate Linux concepts, and shell scripting to get to grips with automating tasks and streamlining workflows. You'll then progress to mastering essential day-to-day tools for DevOps tasks. As you learn networking in Linux, you'll be equipped with connection establishment and troubleshooting skills. You'll also learn how to use Git for collaboration and efficient code management.The book guides you through Docker concepts for optimizing your DevOps workflows and moves on to advanced DevOps practices, such as monitoring, tracing, and distributed logging. You'll work with Terraform and GitHub to implement continuous integration (CI)/continuous deployment (CD) pipelines and employ Atlantis for automated software delivery. Additionally, you'll identify common DevOps pitfalls and strategies to avoid them.By the end of this book, you'll have built a solid foundation in Linux fundamentals, practical tools, and advanced practices, all contributing to your enhanced Linux skills and successful DevOps implementation.What You Will Learn:Understand how to manage infrastructure using Infrastructure as Code (IaC) tools such as Terraform and AtlantisAutomate repetitive tasks using Ansible and Bash scriptingSet up logging and monitoring solutions to maintain and troubleshoot your infrastructureIdentify and understand how to avoid common DevOps pitfallsAutomate tasks and streamline workflows using Linux and shell scriptingOptimize DevOps workflows using DockerWho this book is for:This book is for DevOps Engineers looking to extend their Linux and DevOps skills as well as System Administrators responsible for managing Linux servers, who want to adopt DevOps practices to streamline their operations.You'll also find this book useful if you want to build your skills and knowledge to work with public cloud technologies, especially AWS, to build and manage scalable and reliable systems.
This book explores new applications in the field of science and technology for healthcare systems. The main focus of this book is to devise smart, efficient and robust solutions for the health care sector to serve the major population of rural areas. Artificial Intelligence-based Healthcare Systems encourages scientists, engineers, and scholars across the multiple disciplines to design smart intelligent innovations on rural healthcare issues and motivate to collaborate multiple ideas to design best solutions. It also helps the readers at various levels of knowledge to further enhance their understanding for new tools and smart solutions.
Avez-vous besoin de comprendre en quoi consiste Kubernetes? Aimez-vous apprendre par la pratique?Si oui, alors ce livre est fait pour vous...Le guide de démarrage rapide pour Kubernetes est présenté par l'auteur à succès Nigel Poulton. Ce livre ne requiert aucune expérience préalable relative à Kubernetes. En lisant ce livre, vous serez capable de déployer et gérer une application simple. Et le tout, en moins de 100 pages!Tout au long de ce livre, vous apprendrez:- Pourquoi Kubernetes existe- Qu'est-ce que Kubernetes- Quel est le futur de Kubernetes- Les fondamentaux de l'architecture KubernetesVous effectuerez également les tâches pratiques suivantes:- Construire un cluster- Mettre en conteneur une application- Déployer l'application sur Kubernetes- Casser l'application et la regarder se réparer automatiquement- Deployer l'application à plus grande échelle- Effectuer une mise à jour sans interruptionTout au long du livre, Nigel fournira les explications aussi clairement que possible et reviendra en détail sur le sens des terminologies utilisées.Lorsque vous aurez lu ce livre, vous aimerez Kubernetes et serez prêt à l'utiliser.
Do you need learn Docker and containers, and do you like to learn by doing? If yes, this is the book for you.Getting Started with Docker -- brought to you by best-selling author, and Docker Captain, Nigel Poulton -- assumes zero prior experience and gets you up-to-speed fast. You'll learn what Docker is, why it's so important, and where it's going in the future. You'll also get hands-on experience using Docker to deploy and manage multi-container microservices apps.You'll perform all of the following hands-on tasks:- Run your first container- Containerize a sample app- Work with Docker Hub- Deploy and manage a multi-container app with Docker Compose- Deploy a WebAssembly app with DockerAlong the way, Nigel will explain everything as clearly as possible and demystify all the jargon. When you're done, you'll be ready to start working with Docker and containers!
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and thought process to perform a successful ethical hackExplore the various stages of an ethical hack and the tools related to each phasePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.What you will learnUnderstand the key differences between encryption algorithms, hashing algorithms, and cryptography standardsCapture and analyze network trafficGet to grips with the best practices for performing in-cloud reconGet start with performing scanning techniques and network mappingLeverage various top tools to perform privilege escalation, lateral movement, and implant backdoorsFind out how to clear tracks and evade detectionWho this book is forThis book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.Table of ContentsNetworking PrimerCapturing and Analyzing Network TrafficA Cryptography PrimerReconnaissanceScanningGaining AccessPost-Exploitation
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27¿28, 2023.Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was ¿Humans in security protocols ¿ are we learning from mistakes?¿The topics covered are securing the human endpoint and proving humans correct.
Unabhängig davon, wo sich Ihr Unternehmen auf dem Weg in die Cloud befindet, ist der Wechsel in die Cloud in den kommenden Jahren unvermeidlich. Die Cloud wird kommen und bleiben, und jetzt ist der beste Zeitpunkt, um optimale Strategien zu entwickeln, um die Vorteile zu nutzen und die Risiken zu minimieren. Cloud Computing Basics ist der praktische, leicht zugängliche Einstiegspunkt, den Sie gesucht haben.Sie erhalten eine Einführung in die Grundlagen des Cloud Computing und in alle fünf großen Cloud-Plattformen. Der Autor Anders Lisdorf stellt sicher, dass Sie sich ein grundlegendes Cloud-Vokabular aneignen und lernen, wie Sie die von den verschiedenen Anbietern verwendeten Fachbegriffe übersetzen können. Die Nutzung der wirtschaftlichen und sicherheitstechnischen Vorteile, die die Cloud bietet, kann für jedes Unternehmen sehr unterschiedlich aussehen, und Lisdorf nutzt sein Fachwissen, um Ihnen zu helfen, Ihre Strategie entsprechend anzupassen.Grundlagen des Cloud Computing ist dazu da, Ihr Unternehmen in die Zukunft zu führen. Ganz gleich, ob Sie ein Anfänger auf diesem Gebiet sind oder eine technische Führungskraft, die den Wandel in Ihrem Unternehmen ankurbelt - dieses Buch bietet wichtige Einblicke in die Einführung der Cloud und ihre Vorteile für unser modernes digitales Zeitalter. Lassen Sie sich nicht abhängen und legen Sie sich die Grundlagen des Cloud Computing noch heute in Ihr Bücherregal.Was Sie lernen werdenVerstehen, was die Cloud ist und wie sie sich von herkömmlichen On-Premise-Lösungen unterscheidetSie erwerben ein grundlegendes Cloud-Vokabular und lernen, wie Sie es mit den Begriffen der verschiedenen Anbieter vergleichenSie kennen die wichtigsten Komponenten der Cloud und wissen, wie sie genutzt werdenSie kennen die Anbieter auf dem Cloud-Markt, ihre Stärken und Schwächen und wissen, was Sie von ihnen erwarten können.die optimale Cloud-Lösung auf den Unternehmenskontext abstimmenUntersuchung verschiedener Ansätze zur Cloud-Einführung und der Kontexte, in denen sie geeignet sind, damit Sie bestimmen können, wie Ihr Unternehmen den größten Nutzen aus der Cloud ziehen kannFür wen ist dieses Buch gedacht?Ein allgemeines Geschäftspublikum, das sich über die Grundlagen des Cloud Computing informieren möchte, um fundierte Gespräche mit technischen Fachleuten und Anbietern führen zu können. Das Buch richtet sich an alle, die ein tieferes Verständnis dafür entwickeln möchten, was die Cloud ist, woher sie kommt und wie sie sich in Zukunft auf jedes Unternehmen auswirken wird. Ein Grundverständnis der Informationstechnologie ist hilfreich, aber nicht erforderlich.
Before an enterprise answers "How can we achieve a Zero Trust architecture?" they should be asking "Why are we looking at Zero Trust as an access model? Does it align with our vision?" In an innovative format, Cisco security architecture expert Avinash Naduvath guides you through the philosophical questions and practical answers for an enterprise looking to start the Zero Trust journey. A conversational model will take you from the initial stages of identifying goals and pitching solutions, through practical tasks that highlight tangible outcomes-including common primary use cases-in order to bring focus to the correct implementation and maintenance of a Zero Trust architecture. For a future where success is measured as much by the security of a system as by the functionality, In Zero Trust We Trust is designed to help everyone at every stage and level of leadership understand not only the conceptual underpinnings, but the real-world context of when, how, and why to deploy Zero Trust security controls. This book provides the starting point for helping you change the mindset of others, and getting them to understand why Zero Trust isn't simply a conversation to be had, but a movement to embrace. Origins of the Zero Trust philosophy in security architecture explained, and why it took so long to catch onDetailed examination of how to ask the right questions so as to implement the right security answers for clientsUnderstanding the metrics by which to measure Zero Trust success, and what maintaining that success looks likeIdentifying the stakeholders and empowering a Zero Trust team within an enterpriseExamples of how to catalyze opinion and tailor tactics to motivate investment in secure Zero Trust architectureImplement, monitor, feedback, repeat: Presenting and building a roadmap for a sustainable security architectureLooking ahead to a Zero Trust Lifecycle Framework and a blueprint for the future
Are you ready to challenge the ways you have always approached networking? The IT world has undergone a transformation, and fast solutions just aren't fast enough anymore. A platform-based approach with automated processing of data is no longer a dream of the future-it's a requirement of the present. In Cisco Meraki Fundamentals, you will learn how to "think" platform: end-to-end control, management, and visibility of operations, all with less complexity. As you embrace this thinking, the possibilities for producing optimized solutions to problems now and in the future become constraints merely of your imagination. Cisco Meraki Fundamentals provides everything you need to get started forging a platform-centric journey. From the basics of cloud architecture and building the Dashboard, through automation, best practices, and a look at the Meraki admin experience, Cisco Meraki Fundamentals provides a powerful foundation from which to forge a digital operation for the future. Learn the origins of the Cisco Meraki cloud-managed platform, from founding concept through philosophy and goalsLearn to manage data that emerges from day-to-day operations and how to get to outcomes more quicklyUnderstand the differences between cloud-managed Meraki networks and more traditional networksGet to know the basics of administering a network with the Meraki DashboardSee examples of Meraki-specific best practices, as well as how to integrate and automate with non-Meraki tools and servicesSee an overview of how the cloud platform assists in identifying and troubleshooting potential issues more easilyLook in on a day in the life of a Meraki-based platform administrator, including use cases for the Meraki cloud platform
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for the CC Certified in Cybersecurity exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CC Certified in Cybersecurity Cert Guide helps you master the concepts and techniques that ensure your exam success. Expert authors Amena Jamali and Mari Galloway share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the examDo I Know This Already? quizzes, which let you decide how much time you need to spend on each sectionExam Topic lists that make referencing easyChapter-ending exercises, which help you drill on key concepts you must know thoroughlyThe powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reportsA final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategiesStudy plan suggestions and templates to help you organize and optimize your study time This study guide helps you master all the topics on the CC Certified in Cybersecurity exam, including Security PrinciplesBusiness Continuity (BC), Disaster Recovery (DR), and Incident Response ConceptsAccess Control ConceptsNetwork SecuritySecurity Operations Companion Website: The companion website contains more than 200 unique practice exam questions, practice exercises, and a study planner Also available from Pearson IT Certification is the CC Certified in Cybersecurity Premium Edition ebook and Practice Tests. This digital-only certification preparation product combines an eBook with an enhanced Pearson Test Prep Practice Test. This integrated learning package Enables you to focus on individual topic areas or take complete, timed examsIncludes direct links from each question to detailed tutorials to help you understand the concepts behind the questionsProvides unique sets of exam-realistic practice questionsTracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most
Serverless computing, a revolutionary paradigm in cloud computing, offers a multitude of advantages that have transformed the way organizations develop and deploy applications. In this model, the cloud provider manages all the underlying infrastructure, allowing developers to focus solely on writing code. Here are the key advantages of serverless computing:Cost Efficiency: Serverless computing follows a pay-as-you-go model, meaning you only pay for the compute resources you use. This eliminates the need to provision and maintain servers, reducing operational costs.Scalability: Serverless platforms automatically scale to handle varying workloads. Applications can seamlessly handle increased traffic, ensuring optimal performance without manual intervention.Simplified Development: Developers can focus on writing code without worrying about server management, OS updates, or security patches. This accelerates development cycles and allows for faster time-to-market.Event-Driven Architecture: Serverless functions are triggered by events, such as HTTP requests or database changes. This event-driven architecture simplifies building responsive, real-time applications.High Availability: Serverless platforms often offer built-in redundancy and automatic failover, enhancing application availability and reliability.Reduced Maintenance: With no servers to manage, organizations save time and resources on maintenance tasks, allowing IT teams to concentrate on more strategic initiatives.Resource Utilization: Serverless platforms automatically allocate resources based on the load, optimizing resource utilization and reducing idle capacity.Security: Cloud providers typically invest heavily in security, offering robust protection for serverless applications, including data encryption, access control, and automated compliance checks.Cost Transparency: Serverless platforms provide clear billing and cost monitoring, helping organizations track and control their cloud expenses.Ecosystem Integration: Serverless services often integrate with various cloud services, databases, and third-party APIs, simplifying the development of complex, integrated applications.Vendor Independence: Most major cloud providers offer serverless options, providing flexibility and avoiding vendor lock-in.In summary, serverless computing offers a compelling set of advantages, from cost savings and scalability to simplified development and enhanced security. It empowers organizations to focus on innovation, streamline development processes, and build highly responsive, efficient applications, making it a valuable choice for modern cloud-based solutions.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security ¿ investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. This book, Advances in Digital Forensics XIX, is the nineteenth volume in the annual series produced by the IFIP Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book presents original research results and innovative applications in digital forensics. Also, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This volume contains fourteen revised and edited chapters based on papers presented at the Nineteenth IFIP WG 11.9 International Conference on Digital Forensics held at SRI International in Arlington, Virginia, USA on January 30-31, 2023. A total of 24 full-length papers were submitted for presentation at the conference.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies.Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids.It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementationThis publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
"Networked Minds Shape Social Media's Impact" explores how the collective behaviors and interactions of users on social media platforms influence the spread of information, trends, and opinions. It delves into the consequences, both positive and negative, of user-driven dynamics on these platforms, including the amplification of content, the formation of echo chambers, the influence of influencers, and the impact on society, privacy, and mental health. Understanding these dynamics is crucial for comprehending the far-reaching effects of social media in the modern world.Information Sharing and Virality: Social media platforms enable the rapid dissemination of information, news, and content. Networked minds, fueled by the desire for likes, shares, and engagement, contribute to the virality of content. When a piece of information resonates with a group of users, it can quickly spread across the platform, influencing public discourse and opinion.Echo Chambers and Filter Bubbles: Networked minds tend to follow and engage with like-minded individuals, leading to the formation of echo chambers and filter bubbles. In these online spaces, people are exposed to information and perspectives that align with their existing beliefs, reinforcing their views while often shutting out dissenting opinions. This can polarize societies and limit constructive dialogue.Mental Health Impacts: The constant connectivity and comparison on social media can have profound effects on the mental health of networked minds. Issues like cyberbullying, anxiety, depression, and addiction have become increasingly prevalent concerns.Regulation and Governance: The behavior of networked minds has prompted debates about the need for regulation and governance of social media platforms. Governments and organizations are grappling with how to balance free speech, user safety, and the prevention of harmful content.In conclusion, social media's impact on society is not solely determined by the technology itself but is significantly influenced by the collective actions and behaviors of networked minds. Understanding how users interact with these platforms and the consequences of their actions is crucial for addressing the challenges and harnessing the positive potential of social media in our interconnected world.
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
The primary purpose of this book is to present the state-of-the-art of mobile cloud computing and applications with an emphasis on energy-efficiency. The future research directions are also highlighted in this book to enrich the global market-place of mobile cloud computing services facilitating the scientific, industrial, business, and consumer applications. We expect that the book will serve as a reference to a large number of readers including researchers, system architects, practitioners, and graduate-level students. This book focuses on an emerging area that has considerable research interest, momentum, and interest of commercial developers. The target reader of this book are professional developers, under-graduate and post-graduate students, and researchers. As mobile cloud computing, as well as green computing, will have a major impact on the quality of science and society over the next few years, its knowledge will enrich our readers to be at the forefront of the field.This book reports the latest research advances in the area of green mobile cloud computing. The book covers the architecture, services, methods, applications, and future research directions of green mobile cloud computing.
This book collects contributions of forefront research and practices related to the use of the enabling technologies of Industry 4.0 in the architecture and design fields and their impact on the UN's Sustainable Developments goals. The book is structured into three sections (research, practice, and technologies), with the goal of creating a new framework useful for widespread awareness necessary to initiate technology transfer processes for the benefit of the public sector, universities, research centers, and innovative companies, and a new professional figure capable of controlling the entire process is essential. Thus, the book chapters arouse a series of relevant topics such as computational and parametric design, performance-based architecture, data-driven design strategies, parametric environmental design and analysis, computational and parametric structural design and analysis, AI and machine learning, BIM and interoperability, VR and AR, digital and robotic fabrication, additive manufacturing and 3D printing, R&D and entrepreneurship, circular architecture, and didactics. In the post-digital era, where the essence of design lies in the control and information of the process that holistically involves all the aspects mentioned above, rather than in formal research, it is necessary to understand technologies and analyze the advantages that they can bring in terms of environmental sustainability and product innovation.
Develop cloud-native applications using serverless technologies, Azure services, and .NET with the help of this reference guideKey FeaturesCreate cloud-native .NET applications using cutting-edge technologiesDesign, develop, and deploy scalable, manageable, and resilient apps with various Azure servicesExplore serverless architecture and optimize application scalability through efficient designPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionA Developer's Guide to .NET in Azure helps you embark on a transformative journey through Microsoft Azure that is tailored to .NET developers. This book is a curated compendium that'll enable you to master the creation of resilient, scalable, and highly available applications.The book is divided into four parts, with Part 1 demystifying Azure for you and emphasizing the portal's utility and seamless integration. The chapters in this section help you configure your workspace for optimal Azure synergy. You'll then move on to Part 2, where you'll explore serverless computing, microservices, containerization, Dapr, and Azure Kubernetes Service for scalability, and build pragmatic, cost-effective applications using Azure Functions and Container apps. Part 3 delves into data and storage, showing you how to utilize Azure Blob Storage for unstructured data, Azure SQL Database for structured data, and Azure Cosmos DB for document-oriented data. The final part teaches you about messaging and security, utilizing Azure App Configuration, Event Hubs, Service Bus, Key Vault, and Azure AD B2C for robust, secure applications.By the end of this book, you'll have mastered Azure's responsive infrastructure for exceptional applications.What you will learnDiscover how to create serverless apps and servicesDesign microservices with Azure Kubernetes serviceGet to grips with different Azure databases and storage servicesFind out how to use secret and configuration managementFamiliarize yourself with event-driven architectureUnderstand how to leverage Azure Service Bus and Azure Event HubsFind out how to protect APIs and apps using Azure B2CWho this book is forThis book is for .NET developers and architects who are eager to master the art of creating and deploying robust applications using .NET and Azure. A foundational understanding of .NET and Azure will enable you to enhance your skills with this resourceful guide. Developers aspiring to explore the realms of microservices and serverless applications within the .NET and Azure landscapes will find this book invaluable.Table of ContentsSetting Up Your Development EnvironmentCreating Docker Containers on AzureBuilding Resilient Applications with DaprDesigning Microservices with AKS and Containers in AzureBuilding Serverless Apps with Azure Functions and Container AppsExploring Azure Blob StorageCreating an Azure SQL DatabaseCreating Documents via .NET for Azure Cosmos DBUtilizing Azure App ConfigurationProcessing Data with Azure Event HubsDesigning Ready-Made Solutions with Azure Service BusEnhancing Data Protection with Azure Key VaultManaging Access with Azure Active Directory B2C
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.