Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to…mehr
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry.
Dr. Akashdeep Bhardwaj is currently working as Professor of Cybersecurity & Digital Forensics with University of Petroleum & Energy Studies (UPES) in Dehradun, India. Akash holds PhD in Cloud Security, Masters in Business Administration and Bachelor of Engineering in Computer Science. Akash has over 25 years of Academic & IT Industry experience working for global multinational organizations including British Telecom, Fiserv, Cvent, Motricity, and SafeNet Asia. Akash has published over 55 research papers, books and patents, in areas of Cyber Security, IT Operations Management, Cybercrime Investigations, IT Infrastructure and Cloud Computing.
Varun Sapra is an Assistant Professor of Computer Science at the University of Petroleum & Energy Studies, Dehradun, India. Varun is pursuing his PhD in Computer Science Jagannath University, Jaipur and has over 15 years of experience in the field of Software Development, Social Media Branding, and Academics. Varun has worked as Assistant Professor at uru Gobind Singh Indraprastha University, andalso worked in the IT Software Industry with CMA, BSA Logistics, WebOpac Applications and Cupid Software.
Inhaltsangabe
Introduction.- By Failing to Prepare – You are preparing to Fail.- Authentication Methods and Applications.- Design of Blockchain Polynomial Digests to Secure Method Authentication.- Need of Cybersecurity for ERP Systems.- IoT – Architecture Vulnerabilities and Security Measures.- Cybersecurity Advanced Persistent Threat Attacks.- Securing Deep Learning Neural Networks.- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments.- Conclusion.
Introduction.- By Failing to Prepare - You are preparing to Fail.- Authentication Methods and Applications.- Design of Blockchain Polynomial Digests to Secure Method Authentication.- Need of Cybersecurity for ERP Systems.- IoT - Architecture Vulnerabilities and Security Measures.- Cybersecurity Advanced Persistent Threat Attacks.- Securing Deep Learning Neural Networks.- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments.- Conclusion.
Introduction.- By Failing to Prepare – You are preparing to Fail.- Authentication Methods and Applications.- Design of Blockchain Polynomial Digests to Secure Method Authentication.- Need of Cybersecurity for ERP Systems.- IoT – Architecture Vulnerabilities and Security Measures.- Cybersecurity Advanced Persistent Threat Attacks.- Securing Deep Learning Neural Networks.- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments.- Conclusion.
Introduction.- By Failing to Prepare - You are preparing to Fail.- Authentication Methods and Applications.- Design of Blockchain Polynomial Digests to Secure Method Authentication.- Need of Cybersecurity for ERP Systems.- IoT - Architecture Vulnerabilities and Security Measures.- Cybersecurity Advanced Persistent Threat Attacks.- Securing Deep Learning Neural Networks.- Three Tier Architecture to Mitigate DDoS attacks on Hybrid Cloud Environments.- Conclusion.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497