Over 100 recipes for penetration testing using Metasploit and virtual machines About This Book • Special focus on the latest operating systems, exploits, and penetration testing techniques • Learn n……続きを見る
This SpringerBrief mainly focuses on effective big data analytics for CPS, and addresses the privacy issues that arise on various CPS applications. The authors develop a series of privacy preserving……続きを見る
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices
Key Features
Explore useful r……続きを見る
This book discusses the state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has received attention from governments, ind……続きを見る
Know how to design and use identity management to protect your application and the data it manages.
At a time when security breaches result in increasingly onerous penalties, it is paramount that ap……続きを見る
Know how to design and use identity management to protect your application and the data it manages.
At a time when security breaches result in increasingly onerous penalties, it is paramount that ap……続きを見る
On June 4, Federal Police raided the home of Walkley award-winning journalist Annika Smethurst, changing her life forever.
Police claim they were investigating the publication of classified informat……続きを見る
Modern internet-enabled devices and fast communication technologies have ushered in a revolution in sharing of digital images and video. This may be for social reasons or for commercial and industri……続きを見る
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality. This book showcases examples of……続きを見る