libristo advances in cyber security 4941260

- znaleziono 5 produktów w 1 sklepie

Cyber Security and Network Security - 2877407504

626,08 zł

Cyber Security and Network Security John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

CYBER SECURITY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.

Sklep: Libristo.pl

SELinux - 2877505158

208,42 zł

SELinux O'Reilly Media

Książki / Literatura obcojęzyczna

The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With "SELinux," a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.

Sklep: Libristo.pl

Threat Hunting in the Cloud - Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks - 2865319242

197,47 zł

Threat Hunting in the Cloud - Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting prosIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation.With this book you'll learn:* Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment* Metrics available to assess threat hunting effectiveness regardless of an organization's size* How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations* A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks* Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs)* Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration* Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies* Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers* The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices.Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.

Sklep: Libristo.pl

Industrial IoT - 2867144264

1035,81 zł

Industrial IoT Springer Nature Switzerland AG

Książki / Literatura obcojęzyczna

Proliferation of Internet of Things (IoT) enabled rapid enhancements for the applications not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to the industrial scenarios, applications ranging from remote sensing and actuating to de-centralization and autonomy. In this book, the editor aims at presenting the IIoT and its place during the industrial revolution (Industry 4.0), while they are taking us to a better, sustainable, automated and safer world. The book will cover the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, practical use-case scenarios from the industry, for the application of IIoT on smart factories, smart cities and smart grid are presented. Especially, IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as a specific example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented not only to give a better understanding of the enabling technologies, potential advantages and challenges of the Industry 4.0 and IIoT but also to foster interest on exploring this promising area. Finally yet importantly, security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. First, user privacy, data ownership, proprietary information handling related to IIoT networks will be investigated. Then, the intrusion prevention, detection and mitigation part will conclude the book.

Sklep: Libristo.pl

Biometric-Based Physical and Cybersecurity Systems - 2876117985

866,57 zł

Biometric-Based Physical and Cybersecurity Systems Springer Nature Switzerland AG

Książki / Literatura obcojęzyczna

This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.

Sklep: Libristo.pl

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z libristo pl advances in cyber security 4941260

2. Szukaj na wszystkich stronach serwisu

t1=0.014, t2=0, t3=0, t4=0, t=0.014

Dla sprzedawców

copyright © 2005-2024 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER