Rapid digital advances have made image security crucial, especially in fields like banking, biometrics, and social media. This study proposes a novel image cryptosystem combining DNA and chaos-based……続きを見る
Explore practical cryptographic methods using Python to secure data, encrypt communications, and implement real-world security techniques for modern applicationsKey FeaturesLearn cryptographic techn……続きを見る
A no-fluff guide to implementing best security practices for microservices in the cloud written by a team of experienced security engineers at Snapchat.
This book takes you through every step of sec……続きを見る
Les attaques cyber s’accélèrent et gagnent en sophistication. 80 % des entreprises françaises déclarent avoir été victime d’au moins un incident cyber.
Il est désormais avéré que toute entreprise es……続きを見る
En un mundo cada vez más conectado, el 'Minimalismo digital' se ha convertido en una necesidad para recuperar nuestro bienestar y productividad. Este libro ofrece una guía práctica y detallada para ……続きを見る
Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors com……続きを見る
The must-have test prep for the new CompTIA PenTest+ certification
CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerab……続きを見る
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI). Specifically, it describes how explainabl……続きを見る
Strategie und Reifegradmodelle sind zeit- und ressourcenintensiv. Die Autoren legen einen Ansatz vor, der bekannte Modelle umsetzbar macht. Im Zentrum steht der IT-Leistungserbringer, der auf Basis ……続きを見る
A broad introduction to cryptographyーwhat it is, how it really works, what its future holds, and why every informed citizen should understand its basics.
We all keep secretsーfrom our gym locker co……続きを見る
This book provides professionals and students with practical guidance for the development of safety-critical computer-based systems. It covers important aspects ranging from complying with standards……続きを見る
This book will provide you with an in-depth understanding of MLOps and how you can use it inside an enterprise. Each tool discussed in this book has been thoroughly examined, providing examples of h……続きを見る
An introduction to Quantum Cryptography is an essential guide for anyone interested in the field of quantum cryptography. The book provides a comprehensive overview of the fundamental principles and……続きを見る
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES
Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identifica……続きを見る
This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.
The volume features both original research and survey ……続きを見る
This SpringerBrief mainly focuses on effective big data analytics for CPS, and addresses the privacy issues that arise on various CPS applications. The authors develop a series of privacy preserving……続きを見る
Modernize your apps, run them in containers on Kubernetes, and understand the business value and the nitty-gritty of the VMware Tanzu portfolio with hands-on instructions Purchase of the print or ki……続きを見る
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such……続きを見る
著者:Pankaj Patidar
出版社: Arts & Science Academic Publishing
発売日: 2015年06月30日
You can hack is the book which tells you the step by step hacking tutorials with screenshot. this book is written in simple language which can be easily understand by anyone. this book is best for b……続きを見る
Introduction to the Cyber Ranges provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena. It expands on various concepts like cybe……続きを見る
Get to grips with network-based attacks and learn to defend your organization's network and network devices Key Features • Exploit vulnerabilities and use custom modules and scripts to crack authent……続きを見る
Large-scale data loss and data privacy compliance breaches continue to make headline news, highlighting the need for stringent data protection policies, especially when personal or commercially sens……続きを見る
Exploring techniques and tools and best practices used in the real world.
KEY FEATURES
● Explore private and public key-based solutions and their applications in the real world.
● Learn about securi……続きを見る
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of……続きを見る
Both enterprise and consumer cloud adoption will lead the market into new realms. From the “cloud to the ground,” each chapter of our ebook looks back at the short history of cloud computing from th……続きを見る
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In m……続きを見る
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owin……続きを見る
A Sybex guide to Windows Security concepts, perfect for IT beginners
Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Ce……続きを見る
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deceptio……続きを見る
This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless net……続きを見る