Catalog Search Results
Author
Publisher
Apress
Pub. Date
2022.
Language
English
Description
To succeed, teams must assure the quality of IoT systems. The world of technology continually moves from one hot area to another; this book considers the next explosionof IoTfrom a quality testing viewpoint. You'll first gain an introduction to the Internet of Things (IoT), V&V, and testing. Next, you'll be walked through IoT test planning and strategy over the full life cycle, including the impact of data analytics and AI. You will then delve deeper...
Author
Publisher
Packt Publishing
Pub. Date
2018.
Language
English
Description
This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
Author
Publisher
Packt Publishing
Pub. Date
2019.
Language
English
Description
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.
Author
Publisher
Editions First
Pub. Date
2019
Language
English
Description
L'apprentissage automatique, un champ d'étude essentiel aux développements de l'Intelligence artificielle - MACHINE LEARNING N°2 DES VENTES FIRST AU 1ER NIV Le sujet le plus chaud du moment L'Intelligence Artificielle (IA), les Big Data et le Machine Learning ont le vent en poupe ces derniers mois. Cette technologie a fait une entrée fracassante dans l'industrie, là ou la cybersécurité a une importance capitale.. Des entreprises de plus en...
Author
Publisher
BCS, The Chartered Institute for IT
Pub. Date
2022
Language
English
Description
Cybercrime is a sad, ever-developing reality of our digital lives. Cybercriminals are ruthless and know how to use persuasion and manipulation to get what they want. We are all in danger of falling victim to their tricks, which can lead to serious consequences for our business, our family and ourselves.This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business,...
Author
Publisher
Academic Press
Pub. Date
[2019]
Language
English
Description
Digital Asset Valuation and Cyber Risk Measurement: Principles of Cybernomics is a book about the future of risk and the future of value. It examines the indispensable role of economic modeling in the future of digitization, thus providing industry professionals with the tools they need to optimize the management of financial risks associated with this megatrend. The book addresses three problem areas: the valuation of digital assets, measurement...
Author
Publisher
BCS, The Chartered Institute for IT
Pub. Date
[2020]
Language
English
Description
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.
Author
Publisher
Apress
Pub. Date
[2020]
Language
English
Description
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace,...
Author
Publisher
Apress L.P
Pub. Date
©2020
Language
English
Description
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives. As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security....
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2019.
Language
English
Description
Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process. Guy Podjarny and...
Publisher
BCS
Pub. Date
2019.
Language
English
Description
This essential guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book brings together a wide range of expertise, insight, and tips for setting up a penetration testing programme, maintaining it, and responding to the results of penetration tests.
Author
Publisher
John Wiley & Sons, Inc
Pub. Date
2022.
Language
English
Description
Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and sustainable data erasure while complying with regulatory, legal, and industry requirements. In the book, you'll discover the why, how, and when of data sanitization, including why it...
Author
Publisher
John Wiley & Sons, Incorporated
Pub. Date
2018
Language
English
Description
The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding...
Author
Publisher
O'Reilly Media
Pub. Date
2018.
Language
English
Description
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security specialists...
Author
Publisher
ISTE Ltd
Pub. Date
2022.
Language
English
Description
This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks, and encourages them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools to secure legacy software and hardware. Computing has infiltrated all fields nowadays. No one can escape this wave and be immune to security attacks, which...
Author
Publisher
John Wiley & Sons, Inc
Pub. Date
2023.
Language
English
Description
Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you'll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of...
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2022.
Language
English
Description
The cybersecurity arms race is escalating. As businesses turn to technologies like cloud computing and mobile devices, security threats such as ransomware are increasing in both number and sophistication. The cloud age is forcing companies to embrace a new approach that includes automation, analytics, and context-aware capabilities for providing advanced threat protection. In this report, Christina Morillo examines why companies today need to take...
Author
Publisher
John Wiley & Sons, Incorporated
Pub. Date
[2019]
Language
English
Description
A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request