Udvidet returret til d. 31. januar 2025

Netværkssikkerhed

Her finder du spændende bøger om Netværkssikkerhed. Nedenfor er et flot udvalg af over 523 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Richie Miller
    287,95 kr.

    If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:¿¿Baseline Configuration, Diagrams & IP Management Data Sovereignty & Data Loss Prevention Data Masking, Tokenization & Digital Rights Management Geographical Considerations & Cloud Access Security Broker Secure Protocols, SSL Inspection & Hashing API Gateways & Recovery Sites Honeypots, Fake Telemetry & DNS Sinkhole Cloud Storage and Cloud Computing IaaS, PaaS & SaaS Managed Service Providers, Fog Computing & Edge Computing VDI, Virtualization & Containers Microservices and APIs Infrastructure as Code (IAC) & Software Defined Networking (SDN) Service Integrations and Resource Policies Environments, Provisioning & Deprovisioning Integrity Measurement & Code Analysis Security Automation, Monitoring & Validation Software Diversity, Elasticity & Scalability Directory Services, Federation & AttestationEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & Pulverizing Deguassing, Purging & Wiping Cryptographic Terminology and History Digital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number Generators BUY THIS BOOK NOW AND GET STARTED TODAY!

  • af Richie Miller
    352,95 kr.

    If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:Secure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Secure Mobile SolutionsGeo-tagging & Context-Aware AuthenticationHow to Apply Cybersecurity Solutions to the CloudHow to Implement Identity and Account Management ControlsHow to Implement Authentication and Authorization SolutionsHow to Implement Public Key InfrastructureFile Manipulation & Packet CapturesForensics & Exploitation FrameworksData Sanitization ToolsHow to Apply Policies, Processes and Procedures for Incident ResponseDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleDisaster Recovery & Business ContinuityHow to Implement Data Sources to Support an InvestigationRetention Auditing, Compliance & MetadataHow to Implement Mitigation Techniques to Secure an EnvironmentMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsChain of Custody & Legal HoldFirst Responder Best PracticesNetwork Traffic and LogsScreenshots & WitnessesPreservation of EvidenceData IntegrityJurisdictional Issues & Data Breach Notification LawsThreat Types & Access ControlApplicable Regulations, Standards, & FrameworksBenchmarks & Secure Configuration GuidesHow to Implement Policies for Organizational SecurityMonitoring & BalancingAwareness & Skills TrainingTechnology & Vendor DiversityChange Management & Asset ManagementRisk Management Process and ConceptsRisk Register, Risk Matrix, and Heat MapRegulatory ExamplesQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation Lifecycle BUY THIS BOOK NOW AND GET STARTED TODAY!

  • af Richie Miller
    207,95 kr.

    If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as Usual (BAU) tasks or deploying new as well as on-going company projects. Most of these jobs requiring you to be on site but since 2020, companies are willing to negotiate with you if you want to work from home (WFH). Yet, to pass the Job interview, you must have experience. Still, if you think about it, all current IT security professionals at some point had no experience whatsoever. The question is; how did they get the job with no experience? Well, the answer is simpler then you think. All you have to do is convince the Hiring Manager that you are keen to learn and adopt new technologies and you have willingness to continuously research on the latest upcoming methods and techniques revolving around IT security. Here is where this book comes into the picture. Why? Well, if you want to become an IT Security professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Passing security exams isn't easy. In fact, due to the raising security beaches around the World, both above mentioned exams are becoming more and more difficult to pass. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book (as well as the other books in this series) will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:· Secure Networking Protocols· Host or Application Security Solutions· Coding, Fuzzing & Quality Testing· How to Implement Secure Network Designs· Network Access Control, Port Security & Loop Protection· Spanning Tree, DHCP Snooping & MAC Filtering· Access Control Lists & Route Security· Intrusion Detection and Prevention· Firewalls & Unified Threat Management· How to Install and Configure Wireless Security· How to Implement Secure Mobile Solutions· Geo-tagging & Context-Aware Authentication· How to Apply Cybersecurity Solutions to the Cloud· How to Implement Identity and Account Management Controls· How to Implement Authentication and Authorization Solutions· How to Implement Public Key Infrastructure BUY THIS BOOK NOW AND GET STARTED TODAY!

  • af Ko Nishino, Leonid Karlinsky & Tomer Michaeli
    927,95 - 2.011,95 kr.

  • af Sokratis Katsikas
    751,95 kr.

    This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions. Chapter(s) 5, 10, 11, and 14 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • af Fei Fang
    863,95 kr.

    This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models.

  • af Parikshit N. Mahalle, Sheetal S. Sonawane & Archana S. Ghotkar
    1.285,95 kr.

    This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications with examples. It also provides understanding of graph theory basics, graph algorithms and networks using graph. The book is divided into three parts and contains nine chapters. The first part gives graph theory basics and graph networks, and the second part provides basics of IR with graph-based information retrieval. The third part covers IR and NLP recent and emerging applications with case studies using graph theory. This book is unique in its way as it provides a strong foundation to a beginner in applying mathematical structure graph for IR and NLP applications. All technical details that include tools and technologies used for graph algorithms and implementation in Information Retrieval and Natural Language Processing with its future scope are explained in a clear and organized format.

  • af Shu-Chuan Chu, Roumen Kountchev, Jie-Fang Zhang & mfl.
    2.422,95 kr.

    The book is a collection of high-quality research papers presented at 7th Euro-China Conference on Intelligent Data Analysis and Applications, hosted by Communication University of Zhejiang, China and technically co-sponsored by Shandong University of Science and Technology, China; Zhejiang Lab, China; and Fujian University of Technology, China. The book covers areas like intelligent data analysis, computational intelligences, signal processing, and all associated applications of artificial intelligence.

  • af Bradley Wilson
    277,95 kr.

    U.S. Marine Corps Systems Command asked the RAND Corporation to assess the Marine Corps offensive cyber operations acquisition life cycle and identify ways to improve the transparency of related decisionmaking. The authors brought together data on operational capability, scheduling, and risk to develop a life-cycle cost-estimating framework. This framework should help Joint Cyber Weapons (JCW) program leadership understand the potential costs and provide additional guidance on budgeting considerations. It incorporates five classes of inputs and has three types of outputs. In creating the framework, the authors considered the demand for exploits from the operational user, as well as the type of cyber weapon (e.g., exploit, implant, payload), the weapon's target environment (e.g., desktop or mobile systems), vulnerability decay rate, the adversary's defense capabilities, weapon cost, and how various acquisitions are phased in and out of service over time. The framework also addresses the production of cyber weapons, their costs, and how uncertainties are distributed over a specified period. The authors conducted exploratory modeling and simulation to better understand associated uncertainties and model inputs.

  • af Ryan Leirvik
    440,95 kr.

    When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid.A plethora of cybersecurity management resources are available-many with sound advice, management approaches, and technical solutions-but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy foundational cyber risk management approach applicable to your entire organization.The book provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and helps practitioners pull cyber from a "e;technical"e; problem to a "e;business risk management"e; problem, equipping you with a simple approach to understand, manage, and measure cyber risk for your enterprise. What You Will LearnEducate the executives/board on what you are doing to reduce riskCommunicate the value of cybersecurity programs and investments through insightful risk-informative metricsKnow your key performance indicators (KPIs), key risk indicators (KRIs), and/or objectives and key resultsPrioritize appropriate resources through identifying program-related gapsLay down the foundational components of a program based on real examples, including pitfalls to avoidWho This Book Is ForCISOs, CROs, CIOs, directors of risk management, and anyone struggling to pull together frameworks or basic metrics to quantify uncertainty and address risk

  • af Maanak Gupta, Smriti Bhatt, Asma Hassan Alshehri & mfl.
    1.670,95 kr.

  • af Taek-Young Youn
    866,95 kr.

    This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022.The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.

  • af Fengjun Li
    1.341,95 kr.

    This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).

  • af Giuseppe Agapito
    708,95 kr.

    This volume constitutes the papers of several workshops which were held in conjunction with the ICWE 2022 International Workshops, BECS, SWEET and WALS, held in Bari, Italy, July 5¿8, 2022.The 14 revised full papers and 1 short paper presented in this book were carefully reviewed and selected from 25 submissions. ICWE 2022 presents the following three workshops:Second International Workshop on Big Data driven Edge Cloud Services (BECS 2022)First International Workshop on the Semantic WEb of Everything (SWEET 2022)First International Workshop on Web Applications for Life Sciences (WALS 2022)

  • af Arthur B. Cooper Jr.
    476,95 kr.

    This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor¿known as a Qualified Security Assessor (QSA)¿needs to know. This book is the first reference to detail the specific documentation needed for every PCI requirement. The authors provide real-world examples of complying with the 12 main PCI requirements and clarify many of the gray areas within the PCI DSS.Any merchant or service provider that stores, processes, or transmits credit card data must comply with the PCI Data Security Standard. PCI DSS 1.0 was first published in 2004, yet many of those tasked with PCI compliance still encounter difficulties when trying to make sense of it. PCI DSS version 4 was published in March 2022, and at 360 pages, it has numerous additional requirements, leaving many people struggling to know what they need to do to comply.PCI DSS v4.0 has a transition period in which PCI DSS version 3.2.1 will remain active for two years from the v4.0 publication date. Although the transition period ends on March 31, 2024, and may seem far away, those tasked with PCI compliance will need every bit of the time to acquaint themselves with the many news updates, templates, forms, and more, that PCI v4.0 brings to their world.What Yoüll LearnKnow what it takes to be PCI compliantUnderstand and implement what is in the PCI DSSGet rid of cardholder dataEverything you need to know about segmenting your cardholder data networkKnow what documentation is needed for your PCI compliance effortsLeverage real-world experience to assist PCI compliance workWho This Book Is For Compliance managers and those tasked with PCI compliance, information security managers, internal auditors, chief security officers, chief technology officers, and chief information officers. Readers should have a basic understanding of how credit card payment networks operate, in addition to basic security concepts.

  • af Paolo Mori
    607,95 kr.

    This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022.The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.

  • af Maurizio Martellini & Stanislav Abaimov
    1.000,95 kr.

  • af Tobias Schneider
    717,95 kr.

    This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022. The conference took place in Birmingham, United Kingdom. The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.

  • af ¿Árka Ho¿ková-Mayerová
    1.978,95 kr.

    This book aims to inform about the current empirical results of the work of experts in the field security and emergency management and risk management in connecting science, theory and practice in various fields related to security management and emergency management. The chapters present research work and case studies from international, state as well as regional levels. The book is divided into five sections, which deal with Safety and Security Science, Security and Emergency managment, Threats and Risks, Cyber Risks and Extraordinary Event, Preparation and Solutions.The book is intended primarily for scientific communities established in security sciences, theorists and experts working in various positions and levels of security organizations, universities with specializations in security studies, but also for the expert public interested in security issues or entities directly responsible for security and emergency management.

  • af Miguel Botto-Tobar, Benjamin Durakovic, Marcelo Zambrano Vizuete, mfl.
    1.016,95 - 1.226,95 kr.

  • af Nigel Thomas
    711,95 kr.

    This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.The 14 papers presented in this volume together with one invited talk were carefully reviewed and selected from 14 submissions. The papers presented at the workshop reflect the diversity of modern performance engineering. The sessions covered a wide range of topics including robustness analysis, machine learning, edge and cloud computing, as well as more traditional topics on stochastic modelling, techniques and tools.

  • af Wei Wei, Tasos Dagiuklas, Honghao Gao & mfl.
    1.123,95 - 1.124,95 kr.

  • af Dongdai Lin & Shweta Agrawal
    1.133,95 - 1.341,95 kr.

  • af Ernesto Damiani, Kim-Kwang Raymond Choo, Jie Wu & mfl.
    1.125,95 kr.

    This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28-31, 2022.The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

  • af Kunal Sehgal
    387,95 kr.

    Build a blue team for efficient cyber threat management in your organizationKey Features:Explore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook Description:We've reached a point where all organizational data is connected through some network. With advancements and connectivity comes ever-evolving cyber threats - compromising sensitive data and access to vulnerable systems. Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch.Through the course of this book, you'll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization's cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid, this book will provide an in-depth understanding of how cyber attackers can penetrate your systems and gain access to sensitive information. Beginning with a brief overview of the importance of a blue team, you'll learn important techniques and best practices a cybersecurity operator or a blue team practitioner should be aware of. By understanding tools, processes, and operations, you'll be equipped with evolving solutions and strategies to overcome cybersecurity challenges and successfully manage cyber threats to avoid adversaries.By the end of this book, you'll have enough exposure to blue team operations and be able to successfully set up a blue team in your organization.What You Will Learn:Understand blue team operations and its role in safeguarding businessesExplore everyday blue team functions and tools used by themBecome acquainted with risk assessment and management from a blue team perspectiveDiscover the making of effective defense strategies and their operationsFind out what makes a good governance programBecome familiar with preventive and detective controls for minimizing riskWho this book is for:This book is for cybersecurity professionals involved in defending an organization's systems and assets against attacks. Penetration testers, cybersecurity analysts, security leaders, security strategists, and blue team members will find this book helpful. Chief Information Security Officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. To get the most out of this book, basic knowledge of IT security is recommended.

  • - Skills for the Next-Generation Network Engineer
    af Jason Edelman, Scott S. Lowe & Matt Oswalt
    473,95 kr.

    Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical guide shows network engineers how to use a range of technologies and toolsincluding Linux, Python, JSON, and XMLto automate their systems through code.Network programming and automation will help you simplify tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, youll learn the basic skills and tools you need to make this critical transition.This book covers:Python programming basics: data types, conditionals, loops, functions, classes, and modulesLinux fundamentals to provide the foundation you need on your network automation journeyData formats and models: JSON, XML, YAML, and YANG for networkingJinja templating and its applicability for creating network device configurationsThe role of application programming interfaces (APIs) in network automationSource control with Git to manage code changes during the automation processHow Ansible, Salt, and StackStorm open source automation tools can be used to automate network devicesKey tools and technologies required for a Continuous Integration (CI) pipeline in network operations

  • af Luis Bathen, Gokay Saldamli, Alex J. Nelson, mfl.
    510,95 kr.

    This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17¿19, 2022.The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment.This is an open access book.

  • af Nadhem AlFardan
    487,95 kr.

    Cyber Threat Hunting teaches you how to identify potential breaches of your security. You will learn by exploring real-life scenarios drawn from author Nadhem AlFardan's twenty years in information security. Beginning with the fundamentals, you will build a practical hunting framework and discover good practices for optimising and improving expeditions. You will learn to employ advanced techniques that draw on machine learning and statistical analysis to help spot anomalies. Best of all, this practical book comes with downloadable datasets and scenario templates to practice and hone your threat-hunting techniques. About the reader For security, network, and systems professionals familiar with security tools and Python.

  • af Zhengchun Zhou
    866,95 kr.

    This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August ¿ September 2022.The 19 revised full papers and 3 invited talks presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections: structures in finite fields; efficient finite field arithmetic; coding theory; cryptography; sequences.

  • af Jun Cai, Yuan Xu, Jin Li, mfl.
    1.130,95 - 1.136,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.