Udvidet returret til d. 31. januar 2025

Netværkssikkerhed

Her finder du spændende bøger om Netværkssikkerhed. Nedenfor er et flot udvalg af over 523 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Peter Müller, Adrian Perrig, David Basin, mfl.
    1.037,95 - 1.432,95 kr.

  • af Al-Sakib Khan Pathan
    1.684,95 - 1.693,95 kr.

    This book gathers key advances in various areas related to using wireless Internet and wireless connectivity to achieve a more connected world.The world is now highly dependent on Internet connectivity. Even though some parts of the globe remain isolated, the smoothly running world all around us relies on Internet services for countless businesses and activities. During the COVID-19 pandemic, we have seen that exclusively relying on wired Internet would leave out a large part of our tech-savvy world. Hence, wireless connectivity is essential to anywhere, anytime connectivity. Further, in the event of a new pandemic or other disaster of global scale, wireless Internet offers a reliable way to keep us all connected.  The contributors to this book, hailing from academia, industrial and research laboratories, report on the latest solutions, trends and technologies with the potential to make wireless Internet more reliable and secure for the years to come.

  • af Eberhard Von Faber
    367,95 kr.

    Für die IT- oder Cybersecurity von IT-Dienstleistungen (IT-Services) zu sorgen, kann ein komplexes Unterfangen sein. Als Anwender das erreichte Maß an IT-Sicherheit adäquat einzuschätzen nicht minder.Dieses Buch bringt Ordnung in das Dickicht von Prozessen, Aktivitäten und Informationen, indem neue Begriffe eingeführt sowie existierende geschärft und in den Zusammenhang gesetzt werden. Es liefert konkrete Anleitungen und ein Gesamtkonzept für das Management der IT-Service-Sicherheit im Sinne von Organisieren, Orchestrieren und Optimieren. Es zeigt, wie man die vielen Themen gleichzeitig bearbeiten und erfolgreich am internen oder externen Markt bestehen kann. Die Methoden und Konzeptionen sind die Essenz aus mehr als fünfzehn Jahren Forschung und Lehre und aus mehr als zwölf Jahren in zentraler Verantwortlichkeit in einem der großen international tätigen IT-Dienstleister. Die Aufteilung der an sich komplexen Materie in einzelne Begriffe ermöglicht es dem Leser, sich jeweils auf eine Fragestellung zu konzentrieren. Das Buch richtet sich an Anwender (Anwenderorganisationen) und an IT-Dienstleister (IT-Abteilungen und Firmen in der IT-Industrie) und ist hilfreich für Hersteller, die beide Parteien zufriedenstellen müssen.

  • af Markus Stubbig
    342,95 - 362,95 kr.

  • af Giampaolo Bella
    865,95 kr.

    This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8¿9, 2022.The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

  • af Dieter Gollmann, S. Ponnusamy, Debasis Giri, mfl.
    2.412,95 kr.

    This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6¿8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.

  • af Prasant Kumar Pattnaik
    2.807,95 - 2.944,95 kr.

    This book presents high-quality research papers presented at the Second International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2021) held during June 16-17, 2021, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.

  • af Rebecca Blair
    542,95 kr.

    Align your SOC with the ATT&CK framework and follow practical examples for successful implementationPurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand Cloud, Windows, and Network ATT&CK Framework using different techniquesAssess the attack potential and implement frameworks aligned with Mitre ATT&CKAddress security gaps to detect and respond to all security threatsBook Description:The Mitre ATT&CK framework is an extraordinary resource for all SOC environments, however, determining the appropriate implementation techniques for different use cases can be a daunting task. This book will help you gain an understanding of the current state of your SOC, identify areas for improvement, and then fill the security gaps with appropriate parts of the ATT&CK framework. You'll learn new techniques to tackle modern security threats and gain tools and knowledge to advance in your career.In this book, you'll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you'll explore how to implement the framework and use it to fill any security gaps you've identified, expediting the process without the need for any external or extra resources. Finally, you'll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve.By the end of this book, you'll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.What You Will Learn:Get a deeper understanding of the Mitre ATT&CK FrameworkAvoid common implementation mistakes and provide maximum valueCreate efficient detections to align with the frameworkImplement continuous improvements on detections and review ATT&CK mappingDiscover how to optimize SOC environments with automationReview different threat models and their use casesWho this book is for:This book is for SOC managers, security analysts, CISOs, security engineers, or security consultants looking to improve their organization's security posture. Basic knowledge of Mitre ATT&CK, as well as a deep understanding of triage and detections is a must.

  • af Seth James Nielson
    547,95 kr.

    The contemporary IT landscape is littered with various technologies that vendors claim will ¿solve¿ an organization¿s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization¿s mission.This book introduces major technologies that are employed in today¿s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.What You Will LearnAuthentication technologies, including secure password storage and how hackers ¿crack¿ password listsAccess control technology, such as BLP, BIBA, and more recent models such as RBAC and ABACCore cryptography technology, including AES encryption and public key signaturesClassical host security technologies that protect against malware (viruses, trojans, ransomware)Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systemsWeb security technologies, including cookies, state, and session defenses, and threats that try to subvert themEmail and social media security threats such as spam, phishing, social media, and other email threatsWho This Book Is ForProfessionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.

  • af Shahram Latifi
    1.405,95 - 2.023,95 kr.

    This volume represents the 19th International Conference on Information Technology - New Generations (ITNG), 2022. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, and service award.  . This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both.  Accordingly, we do not know of any competitive literature.

  • af Hamid Jahankhani
    1.681,95 - 1.691,95 kr.

    This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities.  Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem.The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master's degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Tom Crick, Brijesh Iyer & Sheng-Lung Peng
    3.112,95 - 3.122,95 kr.

    This book is a collection of best selected research papers presented at 7th International Conference on Computing in Engineering and Technology (ICCET 2022), organized by Dr. Babasaheb Ambedkar Technological University, Lonere, India, during February 12 ¿ 13, 2022. Focusing on frontier topics and next-generation technologies, it presents original and innovative research from academics, scientists, students, and engineers alike. The theme of the conference is Applied Information Processing System.

  • - A Guide for Secure Design and Deployment
    af Chris Dotson
    394,95 kr.

    With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotsonan IBM senior technical staff membershows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.

  • af Saed Alrabaee, Zheng Xu, Nurul Hidayah Ab Rahman, mfl.
    2.447,95 kr.

  • af Shishir Kumar Shandilya, Atulya K. Nagar, V. B. Gupta & mfl.
    1.093,95 kr.

  • af Kyle Cucci
    712,95 kr.

    "This book is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse engineering, and analyzing state-of-the-art malware. It covers the basics in the context of the Windows operating system and details the tricks and evasive maneuvers that malware programs use to avoid detection and security controls. The book also instructs the reader on how to build their own anti-evasion analysis lab"--

  • af Chris Childerhose
    547,95 kr.

    Protect your cloud, virtual, and on-premises environments by implementing Veeam's powerful backup and replication technologyPurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain in-depth knowledge of core architecture changes including PostgreSQLWork with VeeaMover and understand how it can help manage backups and SOBRsExplore Object Storage - Direct to Object - ability to add Object Storage as your primary repositoryBook Description:Veeam is one of the leading modern data protection solutions, making it a necessary skill for anyone responsible for backing up virtual environments. This new edition of Mastering Veeam Backup & Replication is revised and updated to cover Veeam version 12.This edition covers some new features added to the application, such as VeeaMover, Per Machine Backup chains, and MFA on the console. The book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam while helping you master advanced concepts such as Continuous Data Protection (CDP), extended object storage support, VeeaMover, and security settings. You'll dive deep into other new features as well, such as Direct to Object storage, Object to Tape and learn about CDP from a service provider perspective with Veeam Cloud Connect (VCC).By the end of this Veeam book, you'll be able to successfully implement Veeam Backup & Replication to secure your environment and enable disaster recovery.What You Will Learn:Understand installing and upgrading Veeam to v12Master the ability to use PostgreSQL for databasesExplore SOBR - Direct to Object storage in performance tierExplore enhanced security, including MFA and Auto-LogoffUnderstand NAS Backup with Immutability SupportDiscover how GDP to vCD works for Cloud ConnectLearn how to get instant VM Recovery on VCCWho this book is for:This book is for backup administrators or cloud disaster architects looking to gain expertise in all things Veeam. This book is also for IT professionals who have intermediate to advanced-level knowledge of virtualization as well as backups and backup applications. Anyone who needs a reference guide for learning the advanced and latest features of Veeam 12 will find this book useful.

  • af Yassine Maleh
    1.784,95 kr.

    This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease.Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, onlinefraud, etc.This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.

  • af Lidia Fotia
    1.968,95 kr.

    This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.

  • af Mohiuddin Ahmed, Al-Sakib Khan Pathan, Nour Moustafa, mfl.
    1.775,95 kr.

  • af Dietmar P. F. Möller
    929,95 kr.

    In today¿s digital transformation environments, a rigorous cybersecurity approach to effective risk management ¿ including contingency planning, outlining immediate actions, preparing post-breach responses ¿ is central to defending organizations¿ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals.Topics and features:Explores cybersecurity¿s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networksProvides numerous examples of applications and best practicesConsiders methods that organizations can use to assess their cybersecurity awareness and/or strategyDescribes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate dataAddresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacksDiscusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity StandardGathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity.Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.

  • af MD Atiqur Rahman Ahad
    2.412,95 - 2.422,95 kr.

    This book presents the best-selected research papers presented at the 3rd International Conference on Activity and Behavior Computing (ABC 2021), during 20-22 October 2021. The book includes works related to the field of vision- and sensor-based human action or activity and behavior analysis and recognition. It covers human activity recognition (HAR), action understanding, gait analysis, gesture recognition, behavior analysis, emotion, and affective computing, and related areas. The book addresses various challenges and aspects of human activity recognition-both in sensor-based and vision-based domains. It can be considered as an excellent treasury related to the human activity and behavior computing. 

  • af Felix Bieker
    910,95 - 919,95 kr.

    This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data protection under the EU Charter and its relationship to the secondary legislation. Furthermore, the case law of the Court of Justice of the EU as well as current academic conceptualizations are analysed.The author finds that current approaches invariably link data protection to privacy and often fail to address the structural implications of data processing. He therefore suggests a dualistic approach to data protection: in its individual dimension, data protection aims to protect natural persons and their rights, while the structural dimension protects the democratic society as a whole from the adverse effects of data processing. Using this approach, the full potential of an independent right to data protection can be realized.Researchers, practitioners and students will find this a valuable resource on the rationales, scope and application of data protection.Felix Bieker is Legal Researcher at the Office of the Data Protection Commissioner of Schleswig-Holstein (Unabhängiges Landeszentrum für Datenschutz) in Kiel, Germany.

  • af Carmit Hazay & Martijn Stam
    1.130,95 - 1.240,95 kr.

  • af Julia Hesse
    608,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..

  • af Gang Li, Shiva Raj Pokhrel & Srikanth Prabhu
    862,95 kr.

    ¿This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30-31, 2022.The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.

  • af Florian Oelmaier
    481,95 kr.

    Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention. Illustriert durch zahlreiche Screenshots von Erpresserschreiben, Darknetseiten & Verhandlungschats. Mit Gastbeiträgen von N. Weyerstall, Dr. Malek und C. Kurtz sowie von betroffenen Unternehmen.Dieses Buch ist mehr als nur eine Notfallanleitung für den eingetretenen Krisenfall. Um die eigene Verteidigung zu planen, lohnt es sich, den Ernstfall gedanklich durchzuspielen.

  • af Robin Singh Bhadoria
    1.397,95 kr.

    This edited book covers advances, trends and future opportunities in the security framework of social media-computing. The authors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with Blockchain technology.

  • af Elisa Bertino
    377,95 kr.

    This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.

  • af John F. Dooley
    381,95 kr.

    In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June 1917, Herbert Yardley convinced the new head of the Army¿s Military Intelligence Division to create a code and cipher section for the Army with himself as its head. These two seminal events were the beginning of modern American cryptology, the growth of which culminated 35 years later with the creation of the National Security Agency. Each running their own cryptologic agencies in the 1920s, the Friedman-Yardley relationship was shattered after Yardley published a tell-all book about his time in military intelligence. Yet in the end, the work they all started in 1917 led directly to the modern American intelligence community. As they got older, they became increasingly irrelevant in the burgeoning American cryptologic fraternity. Topics and features:* Examines the lives of three remarkable and pioneering cryptologists* Offers fascinating insights into spies, codes and ciphers, rumrunners, poker, and military history* Sheds new light on interesting parts of the cryptologists¿ careers¿especially Elizebeth Friedman, whose work during World War II has just begun to be explored* Recounts several good stories, i.e., What if the Friedmans had gone to work for Herbert Yardley in his new Cipher Bureau in 1919? What if Yardley had moved back to Washington to work for William Friedman a decade later? This enjoyable book has wide appeal for: general readers interested in the evolution of American cryptology, American historians (particularly of World War I, the inter-war period, and World War II signals intelligence), and historians of¿and general readers interested in¿American military intelligence. It also can be used as an auxiliary text or recommended reading in introductory or survey courses in history or on the related topics.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.