(Ilmumisaeg: 26-Mar-2025, Hardback, Kirjastus: SAP Press, ISBN-13: 9781493225927)
Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAPs secure operations map and the NIST Cybersecurity Fram...Loe edasi...
Statistical agencies, research organizations, companies, and other data stewards that seek to share data with the public face a challenging dilemma. They need to protect the privacy and confidentiality of data subjects and their attributes while pr...Loe edasi...
Mark S. Ciminello, Yassar Albarakat, Holden Canet, Julian Lasher, Lauren Yang
(Ilmumisaeg: 31-Jul-2024, Hardback, Kirjastus: SAP Press, ISBN-13: 9781493225286)
Tailor-fit a security program for your business requirements, whether your SAP system runs on-premise or in the cloud! Walk through each aspect of enterprise security, from data protection to identity management. Evaluate key SAP security tools,...Loe edasi...
An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company 9.48 million, organizations are desperate for qualified database admin...Loe edasi...
This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India,...Loe edasi...
Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a cr...Loe edasi...
(Ilmumisaeg: 26-Jul-2023, Hardback, Kirjastus: SAP Press, ISBN-13: 9781493223701)
Manage on-premise user access with this comprehensive guide to SAP Access Control. Begin with step-by-step installation and configuration instructions. Then implement key SAP Access Control modules, including access risk analysis, emergency access m...Loe edasi...
This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15–17, 2024.The 14 full papers and 6 short papers pres...Loe edasi...
(Ilmumisaeg: 31-Jan-2023, Hardback, Kirjastus: World Scientific Europe Ltd, ISBN-13: 9781800612853)
Regulating Cyber Matters Is A Complex Task, As Cyberspace Is An Intricate World Full Of New Threats Related To A PersonS Identity, Finance, And Private Information. Algorithm Manipulation, Hate Crimes, Cyber-Laundering, And Data Theft Are Strong...Loe edasi...
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24–26, 2023. The book discusses...Loe edasi...
?The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8–10, 2023. The...Loe edasi...
?The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August...Loe edasi...
(Ilmumisaeg: 23-Oct-2022, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031161261)
Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a cr...Loe edasi...
This book centers on the basics of cybersecurity innovation alongside the methods and strategies for organizations to adopt, allowing readers to have a more profound comprehension of cybersecurity in the business world--...Loe edasi...
Considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more....Loe edasi...
This book discusses the evolution of cloud computing through grid computing and cluster computing. The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers and students and those in indu...Loe edasi...
This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19–21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed a...Loe edasi...
This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022.The 26 full papers were carefully revi...Loe edasi...
?This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022.The 25 papers presented in this volume w...Loe edasi...
This book focuses on the Visa Information System (VIS): a large-scale data infrastructure interconnecting a multiplicity of state authorities that enact border security and migration management in the European Union. The VIS is embedded within a sett...Loe edasi...
Differential privacy is a promising approach to formalizing privacy - that is, for writing down what privacy means as a mathematical equation. This book serves as an overview of the state-of-the-art in techniques for differential privacy....Loe edasi...
This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2022, held in Newark, NJ, USA, in July 2022.The 12 full papers and 6 short papers presented were careful...Loe edasi...
Self-Sovereign Identity gives you a radical new perspective on how we represent ourselves in the world.In a world of changing privacy regulations, identity theft, and online anonymity, identity is a precious and complex concept. Sel...Loe edasi...
Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcin...Loe edasi...
The artificial intelligence subset machine learning has become a popular technique in professional fields as many are finding new ways to apply this trending technology into their everyday practices. Two fields that have majorly benefited from this...Loe edasi...