Udvidet returret til d. 31. januar 2025

Netværkssikkerhed

Her finder du spændende bøger om Netværkssikkerhed. Nedenfor er et flot udvalg af over 523 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Aigul Kaskina
    1.087,95 - 1.096,95 kr.

    This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms. The elaborated components are exemplarily based on the needs of a political platform implemented during the presidential election in Ecuador. The book readdresses the issue of privacy paradox demonstrating that, indeed, users' actual decisions of being private in most cases diverge with their initial privacy intentions. The two concepts presented in the book - the citizen privacy profile framework and the prototype fuzzy-based privacy settings recommender system - can be adapted by different organizations such as government institutions, NGOs, or private online service providers to meet their specific needs.   The book will be of interest to researchers and practitioners in the areas of usage modeling, privacy, system design, and for service providers in eDemocracy.

  • af Weizhi Meng
    1.033,95 kr.

    This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

  • af Tom Wingfield
    258,95 kr.

    The 2022 National Defense Strategy calls for "integrated deterrence" in how the United States postures its cyberspace forces to address the strategic challenges posed by revisionist powers--in this case China. An integrated deterrence strategy entails combining cyber operations with other warfighting domains to reduce a competitor's perceptions of the net benefits of aggression relative to restraints. Such a strategy also represents a departure from the current U.S. Cyber Command (CYBERCOM) focus on technical operations in the cyber domain. The authors begin with an examination of various theories of international relations to highlight a variety of views on U.S.-China competition. They then apply the concept of selective overmatch to reevaluate current U.S. cyber operations in light of competition and possible conflict with China. Because the United States cannot maintain superiority in all aspects of cyber operations equally, it must selectively create advantage over China by targeting influence points--elements of the adversary's political, economic, or societal strength--that will most likely achieve U.S. objectives. By identifying the key influence points for China and the United States and the actions that might be taken against them, the authors explore selective overmatch as a framework for categorizing and assessing vulnerabilities in the Chinese and U.S. cyber domains, as well as for expanding the capabilities of cyber operations, integrating deterrence, and sustaining U.S. primacy. Selective overmatch, properly understood and applied, can provide a roadmap for CYBERCOM's future operations.

  • af Comptia Ace5
    217,95 kr.

    Unlock Your IT Potential: The Definitive CompTIA Certification Study Guide & Test Prep, Master Your IT Journey: The Ultimate 2-in-1 Network+ and Security+ CompTIA Certification GuideIn a digital age that demands expertise in both networking and security, why settle for a guide that offers only half the equation? Backed by two decades of copywriting for the IT sector, I present a resource that understands the modern IT professional's needs. This dual guide is meticulously constructed to navigate both the realms of the Network+ and Security+ CompTIA certifications, ensuring you're armed with knowledge that's both broad and deep.Double the Expertise in a Single Guide:Dual Depth: Dive deep into both networking and security realms, ensuring a holistic IT skillset ready for today's challenges.Efficient Learning: Seamlessly interwoven topics provide you with a logical progression through both certifications, eliminating the disjointedness of studying from separate resources.Battle-Tested Strategies: Equip yourself with proven test-taking techniques, curated practice exams, and insights that illuminate both the Network+ and Security+ paths.Crystal Clear Comprehension: Demystify intricate networking and security topics with lucid explanations, ensuring robust understanding over mere memorization.Embrace the dual power of networking and security. With the combined prowess of Network+ and Security+ under your belt, not only will you be ready to ace those exams, but you'll also possess the practical knowledge needed to excel in the dynamic world of IT. Your path to becoming a double-certified IT maestro starts here. Welcome to comprehensive, top-tier CompTIA preparation.Scroll Up Now and Click the Buy Button to Get Started.

  • af Vikrant Bhateja
    2.412,95 - 2.979,95 kr.

    This book presents the proceedings of the 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021), held at NIT Mizoram, Aizwal, Mizoram, India, during June 25 - 26, 2021. FICTA conference aims to bring together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. This volume covers broad areas of Evolution in Computational Intelligence. The conference papers included herein presents both theoretical as well as practical aspects of different areas like ANN and genetic algorithms, human-computer interaction, intelligent control optimization, evolutionary computing, intelligent e-learning systems, machine learning, mobile computing, multi-agent systems, etc. The volume will also serve as a knowledge centre for students of post-graduate level in various engineering disciplines.

  • af Miralem Mehic
    1.096,95 - 1.106,95 kr.

    This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology.This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.

  • af Deepak Garg
    2.146,95 - 2.156,95 kr.

    This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICIICT 2022), held in Thailand during April 15-16, 2022. It presents the works on the intersection of the Computer Science and Communication Engineering. Topics covered in the book include communications engineering, Internet and web technology, computer and information science, artificial intelligence, data science and management, and ICT applications.

  • af Julius Köpke
    1.196,95 kr.

    This book constitutes the proceedings of the BPM Forum held at the 21st International Conference on Business Process Management, BPM 2023, which took place in Utrecht, The Netherlands, in September 2023. The Blockchain Forum provided a platform for exploring and discussing innovative ideas on the intersection of BPM and blockchain technology. The RPA Forum focused on the use of the Robotic Process Automation (RPA) in the field of Business Process Management. The Educators Forum brought together educators within the BPM community for sharing resources to improve the practice of teaching BPM-related topics.The 18 full papers included in this volume were carefully reviewed and selected from a total of 39 submissions.

  • af Shantanu Pal
    1.095,95 - 1.104,95 kr.

    This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security solutions and future research directions for large-scale CPS, including its various challenges and significant security requirements. Furthermore, the book provides practical guidance on delivering robust, privacy, and trust-aware CPS at scale. Finally, the book presents a holistic insight into IoT technologies, particularly its latest development in strategic applications in mission-critical systems, including large-scale Industrial IoT, Industry 4.0, and Industrial Control Systems. As such, the book offers an essential reference guide about the latest design and development in CPS for students, engineers, designers, and professional developers.

  • af Marta Kepe
    217,95 kr.

    The Russia-Ukraine war (2022-) has highlighted the ways in which civilians can support a nation's effort to defend itself against an external occupying power. Although civilian-based resistance began during the first hours of Russia's full-scale invasion of Ukraine in 2022, most analysis to date has focused on Russian-Ukrainian armed military confrontations. Ukrainian civilian resistance efforts merit attention because of their potential value in helping Ukraine's strategic aims to ensure victory by regaining territorial integrity and maintaining political sovereignty. The authors of this report offer a broad characterization of Ukrainian approaches to civilian-based resistance during the first four months of the conflict. First, the authors offer a short overview of pertinent historic examples of civilian-based resistance and opposition movements that have paved the way for stronger social mobilization and activism across all segments of Ukrainian society. Second, the authors offer an overview of Ukrainian civilian-based activities through an analytical framework developed by RAND Corporation researchers in 2021 to analyze civilian-based resistance against external occupation. Third, the authors identify indicative future trends in civilian-based resistance against external aggressors.

  • af Hiroki Kuzuno
    666,95 kr.

    This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29¿31, 2023. This event was held in hybrid mode.The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.

  • af Ayman El Hajjar
    1.221,95 kr.

    In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master¿s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Shujun Li
    725,95 kr.

    This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14¿16, 2023.The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.

  • af Mostafa Yahia
    642,95 kr.

    Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey Features- Understand and analyze various modern cyber threats and attackers' techniques- Gain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logs- Explore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you'll learn how to detect and investigate attackers' techniques and malicious activities within Windows environments. As you make progress, you'll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You'll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.By the end of this book, you'll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.What you will learn- Get familiarized with and investigate various threat types and attacker techniques- Analyze email security solution logs and understand email flow and headers- Find out how to analyze Microsoft event logs- Practical investigation of the various Windows threats and attacks- Analyze web proxy logs to investigate C&C communication attributes- Understand web application firewall (WAF) logs and examine various external attacks- Analyze FW logs and security alerts to investigate cyber threats- Understand the role of CTI in investigation and identify potential threatsWho this book is forThis book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. If you want to efficiently detect and investigate cyberattacks by analyzing logs generated from different log sources, then this is the book for you. Basic knowledge of cybersecurity and networking domains and entry-level security concepts are necessary to get the most out of this book.Table of Contents- Investigating Email Threats- Email Flow and Header Analysis- Introduction to Windows Event Logs- Tracking Accounts Login and Management- Investigating Suspicious Process Execution Using Windows Event Logs- Investigating PowerShell Event Logs- Investigating Persistence and Lateral Movement Using Windows Event Logs- Network Firewall Logs Analysis- Investigating Cyber Threats by Using the Firewall Logs- Web Proxy Logs Analysis(N.B. Please use the Look Inside option to see further chapters)

  • af Florian Jörgens
    193,95 kr.

    Nicht nur im privaten Umfeld, auch im beruflichen sind Computer, Smartphones und das Internet Begleiter unseres täglichen Lebens. Dabei spielt der Schutz von Informationen eine wichtige Rolle. Über 70% aller Cyber-Angriffe zielen auf den Nutzer ab, lediglich ein kleiner Teil auf die tatsächlichen Systeme. Daher sind geschulte und aufmerksame Mitarbeiter ein unabdingbarer Bestandteil der allgemeinen Sicherheitsstrategie zum Schutz der Informationen. Das Ziel ist dabei der Aufbau einer Kultur der Cyber-Sicherheit, einer sogenannten human firewall.

  • af Bradley Fowler
    547,95 kr.

    Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology¿s recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications yoüll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company¿s highly valuable information assets today! What You'll LearnUnderstand what information assurance is and how it relates to risk management strategiesAssess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environmentsDevelop and utilize information usage profiles and risk factor tablesUnderstand the value of data encryption and usage of private and public key exchange for information assurance and security Who This Book Is ForInformation system and cloud architects responsible for developing, implementing, and managing corporate information systems and cloud environments.

  • af Mariya Ouaissa, Rajesh Kumar Dhanaraj, V. Seethalakshmi & mfl.
    1.405,95 kr.

  • af Valentin Mulder, Bernhard Tellenbach, Vincent Lenders & mfl.
    522,95 - 627,95 kr.

  • af Lars Hornuf, Sonja Mangold & Yayun Yang
    512,95 - 618,95 kr.

  • af Helena Handschuh & Anna Lysyanskaya
    1.239,95 - 1.344,95 kr.

  • af Nathan Clarke & Steven Furnell
    1.223,95 kr.

    This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.

  • af Krishna Jyothi
    317,95 kr.

    The "End-to-End Security Scheme for Machine Type Communication (MTC) in LTE Network" presents a comprehensive and robust approach to address the unique security challenges faced by MTC in the context of Long-Term Evolution (LTE) networks. As the world moves towards a more interconnected and automated future, MTC, also known as M2M (Machine-to-Machine) communication, has become increasingly prevalent in various industries, ranging from smart cities to industrial automation and healthcare.The scheme emphasizes the need for airtight security measures to ensure the integrity, confidentiality, and authenticity of data exchanged between machines without direct human intervention. One of the primary concerns with MTC is the potential exposure to cyber threats, as countless devices and sensors become part of the vast network ecosystem. Thus, a meticulous end-to-end security strategy becomes imperative to safeguard the entire communication chain.The proposed scheme incorporates several key security components. Encryption algorithms are implemented to protect the data during transmission, making it virtually indecipherable to unauthorized entities. Robust authentication protocols ensure that only trusted devices and servers are allowed to access critical information, thereby mitigating the risk of unauthorized access and malicious attacks.Furthermore, secure key management techniques are employed to generate, distribute, and revoke encryption keys efficiently. This process bolsters the overall security posture by maintaining strict control over the cryptographic keys, preventing unauthorized users from gaining access to sensitive data.Moreover, the scheme promotes continuous monitoring and threat analysis to identify and address potential vulnerabilities proactively. By staying vigilant and adaptable, network administrators can respond swiftly to emerging threats, thereby safeguarding the LTE-MTC ecosystem.In conclusion, the "End-to-End Security Scheme for Machine Type Communication in LTE Network" offers a comprehensive and cutting-edge approach to secure MTC in LTE networks. By implementing strong encryption, authentication, and key management mechanisms while maintaining proactive monitoring, this scheme ensures that the potential of MTC can be fully harnessed without compromising the privacy and security of data in our increasingly connected world.

  • af Nathan Clarke & Steven Furnell
    1.096,95 - 1.307,95 kr.

  • af Fenghua Li
    1.778,95 kr.

    The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment.The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.

  • af Jennifer D P Moroney
    297,95 kr.

    "In this report, the authors use 11 case studies to create a typology of the barriers that impede U.S. security cooperation with highly capable allies and partners; identify some of the more specific barriers in the air, space, and cyber domains; suggest mitigation strategies for each of these barriers; and propose a preliminary approach for implementing some of these mitigation strategies"--

  • af Jie Wu & En Wang
    1.992,95 kr.

    This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization. Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computationtasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book. Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.

  • af Mark Stamp
    1.688,95 - 1.697,95 kr.

    This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity.This book also provides insight into the difficult "e;how"e; and "e;why"e; questions that arise in AI within the security domain. For example, this book includes chapters covering "e;explainable AI"e;, "e;adversarial learning"e;, "e;resilient AI"e;, and a wide variety of related topics. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.

  • af Sanjay Goel
    1.022,95 kr.

    This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.

  • af Anna Lisa Ferrara
    1.112,95 kr.

    This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19¿21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.