Master identity solutions and strategies and prepare to achieve Microsoft Identity and Access Administrator SC-300 certification Purchase of this book unlocks access to web-based exam prep resources such as mock exams, flashcards, and exam tips ...Loe edasi...
(Ilmumisaeg: 26-Feb-2025, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781119873341)
Take an evidence-based approach to cybersecurity control design A call to action for enterprises to demand a modern, data-driven approach to cybersecurity, Cybersecurity for the Enterprise: How to Design a Security Policy with Evidenc...Loe edasi...
To date, tech giants have invested heavily towards realizing the Metaverse as the successor to the mobile Internet. In 2021, Facebook was even rebranded as Meta as it reinvents itself to be a Metaverse company from a social media company. Furt...Loe edasi...
This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for...Loe edasi...
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important...Loe edasi...
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 0911, 2024. The 28 full and 11 short papers pres...Loe edasi...
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 0911, 2024. The 28 full and 11 short papers pres...Loe edasi...
(Ilmumisaeg: 15-Mar-2024, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031520631)
This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT services. Upon introducing the fundamentals of cyber resilience with important international standards and best practices, a...Loe edasi...
This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India,...Loe edasi...
This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16–20, 2024.The 18 full papers and 6 short papers included in this book...Loe edasi...
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, youll examine security best practices for multivendor cloud environments, whethe...Loe edasi...
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addre...Loe edasi...
Traditional secret-based credentials cant scale to meet the complexity and size of cloud and on-premises infrastructure. Todays applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers....Loe edasi...
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023....Loe edasi...
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023....Loe edasi...
With the increasing use of E-learning, technology has not only revolutionized the way corporate businesses operate but has also impacted the learning processes in the education sector. E-Learning is slowly replacing the traditional methods of teac...Loe edasi...
This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, youll learn how cloud evolution affected identity strateg...Loe edasi...
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023. The 18 full papers and 10 short papers included in this bo...Loe edasi...
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24–26, 2023. The book discusses...Loe edasi...
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to privacy and data protection law in the EU covers every aspect of the subject, including the protection of private life as a fundamental –...Loe edasi...