Résultats de recherche de titre
Articles 1 à 20 sur 2825
The Code of Honor: Embracing Ethics in Cybersecurity
Par Paul J. Maurer, Ed Skoudis. 2024
A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions – including medicine, law, and engineering…
– have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, President of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, President of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world. This practical book tells numerous engaging stories that highlight ethically complex situations many cybersecurity and tech professionals commonly encounter. It also contains compelling real-world case studies – called Critical Applications – at the end of each chapter that help the reader determine how to apply the hands-on skills described in the book. You'll also find: A complete system of cybersecurity ethics relevant to C-suite leaders and executives, front-line cybersecurity practitioners, and students preparing for careers in cybersecurity. Carefully crafted frameworks for ethical decision-making in cybersecurity. Timeless principles based on those adopted in countless professions, creeds, and civilizations. Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day.Azure Arc Systems Management: Governance and Administration of Multi-cloud and Hybrid IT Estates
Par Ramona Maxwell. 2024
This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The…
book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author’s approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable directionWho This BookIs ForEnterprise and solution architects, systems integrators, and anyone else looking to solve enterprise-scale administration problems across a multi-cloud or hybrid architectureDatenbanken für Nichtinformatiker: Eine praxisnahe Einführung
Par Jörg Mielebacher. 2024
Daten sind zu einem wichtigen Rohstoff in vielen Bereichen geworden. Auch Nichtinformatiker müssen große Datenbestände pflegen und nach den für…
sie relevanten Informationen durchsuchen. Dieses praxisnahe Lehrbuch zeigt, wie man hierfür Datenbanken einsetzt, wie man deren Inhalte mit der Abfragesprache SQL auswertet und worauf man bei Entwurf und Betrieb von Datenbanken achten muss.Zahlreiche Abbildungen und Anwendungsbeispiele vermitteln einen gut verständlichen Einblick in dieses wichtige Thema. Aber auch Berufspraktiker mit Interesse an Datenbanken finden wichtige Hinweise und Lösungsansätze für ihre Arbeit.Implementation and Benefits of Digital Twin on Decision Making and Data Quality Management
Par Florian Blaschke. 2024
Digital twin technology is becoming important for the realization of Industry 4.0 using cyber-physical systems (CPS) and information technology. CPS…
form the backbone to support the creation of a network for decentralized and autonomous decision-making. The design principles for Industry 4.0 serve as guidelines for virtualization concepts that are virtual copies of the physical world and create a link between the real and virtual worlds to collect data and monitor processes, the so-called digital twin. In this book, a theoretical digital twin-driven decision-making model has been developed that combines corporate data quality management, a process digital twin, and a model-driven decision support system. It leverages the benefits of the digital twin to create, test and build a process in the virtual world that supports decision making by combining data, analytics and visualization of insights to help managers make better decisionsNetworks of today are going through a rapid evolution and there are many emerging areas of information networking and their…
applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence, and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design and applications of computer networks, distributed computing, and information systems. The aim of the book “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.Frame Theory in Data Science (Advances in Science, Technology & Innovation)
Par Zhihua Zhang, Palle E. Jorgensen. 2024
This book establishes brand-new frame theory and technical implementation in data science, with a special focus on spatial-scale feature extraction,…
network dynamics, object-oriented analysis, data-driven environmental prediction, and climate diagnosis. Given that data science is unanimously recognized as a core driver for achieving Sustainable Development Goals of the United Nations, these frame techniques bring fundamental changes to multi-channel data mining systems and support the development of digital Earth platforms. This book integrates the authors' frame research in the past twenty years and provides cutting-edge techniques and depth for scientists, professionals, and graduate students in data science, applied mathematics, environmental science, and geoscience.Digital Communication and Soft Computing Approaches Towards Sustainable Energy Developments: Proceedings of ISSETA 2023 (Innovations in Sustainable Technologies and Computing)
Par Gayadhar Panda, Thaiyal Naayagi Ramasamy, Seifeddine Ben Elghali, Shaik Affijulla. 2024
This book is a second volume and contains selected papers presented at Second International Symposium on Sustainable Energy and Technological…
Advancements (ISSETA 2023), organized by the Department of Electrical Engineering, NIT Meghalaya, Shillong, India, during 24 – 25 February 2023. The topics covered in the book are the cutting-edge research involved in sustainable energy technologies, smart buildingtechnology, integration and application of multiple energy sources; advanced power converter topologies and their modulation techniques; and information and communication technologies for smart microgrids.Information Technology Convergence: Security, Robotics, Automations and Communication (Lecture Notes in Electrical Engineering #253)
Par James J. Jong Hyuk Park, Leonard Barolli, Fatos Xhafa, Hwa Young Jeong. 2013
Information technology and its convergence issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing…
and communication services. This area will be the most comprehensive topics with various aspects of advances in information technology and its convergence services. This book covers all topics as computational science and applications, electronics engineering, manufacturing technology, services, technical skill to control the robot, automatic operation and application, simulation and testing communication and many more.Web and Big Data: 7th International Joint Conference, APWeb-WAIM 2023, Wuhan, China, October 6–8, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14334)
Par Xiangyu Song, Ruyi Feng, Yunliang Chen, Jianxin Li, Geyong Min. 2024
The 4-volume set LNCS 14331, 14332, 14333, and 14334 constitutes the refereed proceedings of the 7th International Joint Conference, APWeb-WAIM…
2023, which took place in Wuhan, China, in October 2023. The total of 138 papers included in the proceedings were carefully reviewed and selected from 434 submissions. They focus on innovative ideas, original research findings, case study results, and experienced insights in the areas of the World Wide Web and big data, covering Web technologies, database systems, information management, software engineering, knowledge graph, recommend system and big data.Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on relevant activities in three main subject areas: Healthcare and Emotion, Mental Health, and Nurse Care Records.The editors are experts in these arenas and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.Developments and Advances in Defense and Security: MICRADS 2023 (Smart Innovation, Systems and Technologies #380)
Par Álvaro Rocha, Carlos Hernán Fajardo-Toro, José María Riola Rodríguez. 2024
This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2023), held…
at Graduate School of the Colombian Air Force, in Bogota, Colombia, during July 6–8, 2023. It covers a broad range of topics in systems, communication, and defense; strategy and political–administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.Good Practices and New Perspectives in Information Systems and Technologies: WorldCIST 2024, Volume 1 (Lecture Notes in Networks and Systems #985)
Par Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda. 2024
This book is composed by a selection of articles from the 12th World Conference on Information Systems and Technologies (WorldCIST'24),…
held between 26 and 28 of March 2024, at Lodz University of Technology, Lodz, Poland. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, together with their technological development and applications. The main and distinctive topics covered are: A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) Human-Computer Interaction; J) Ethics, Computers and Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications. The primary market of this book are postgraduates and researchers in Information Systems and Technologies field. The secondary market are undergraduates and professionals as well in Information Systems and Technologies field.Modelling and Mining Networks: 19th International Workshop, WAW 2024, Warsaw, Poland, June 3–6, 2024, Proceedings (Lecture Notes in Computer Science #14671)
Par Megan Dewar, Bogumił Kamiński, Daniel Kaszyński, Łukasz Kraiński, Paweł Prałat, François Théberge, Małgorzata Wrzosek. 2024
This book constitutes the refereed proceedings of the 19th International Workshop on Modelling and Mining Networks, WAW 2024, held in…
Warsaw, Poland, during June 3–6, 2024. The 12 full papers presented in this book were carefully reviewed and selected from 19 submissions. The aim of this workshop was to further the understanding of networks that arise in theoretical as well as applied domains. The goal was also to stimulate the development of high-performance and scalable algorithms that exploit these networks.Advances in Intelligent Computing Techniques and Applications: Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #211)
Par Faisal Saeed, Fathey Mohammed, Yousef Fazea. 2024
This book presents the papers included in the proceedings of the 7th International Conference of Reliable Information and Communication Technology…
2023 (IRICT 2023) that was held in Pulai Springs Resorts, Johor, Malaysia on 27-28, December 2023. IRICT 2023 is organized by the Yemeni Scientists Research Group (YSRG) and Big Data Center in Universiti Teknologi Malaysia (Malaysia) in collaboration with Association for Information Systems – Malaysia Chapter (MyAIS) and College of Engineering, IT and Environment at Charles Darwin University (Australia). IRICT2023 is a forum for the presentation of technological advances in the field of Information and Communication Technology. The main theme of the conference is “Advances in Intelligent Computing Techniques and Applications”. The book discusses several research topics such as Health Informatics, Artificial Intelligence, Soft Computing, Data Science, Big Data Analytics, Internet of Things (IoT), Intelligent Communication Systems, Cyber Security, and Information System. These papers were presented in three parallel sessions during the two days.Intelligent Systems and Computing (Lecture Notes on Data Engineering and Communications Technologies #207)
Par Bing-Yuan Cao, Shu-Feng Wang, Seyed Hadi Nasseri, Yu-Bin Zhong. 2024
This book includes high quality research papers submitted at the 2022 “Four Session (ICFIE, ICORG, GDORS, CGHMORS) Celebration” Joint International…
Conference held on December 28, 2022 and the online meeting of the Fuzzy Information and Engineering Branch of the China Operations Research Society on September 17, 2022. It covers topics in the fields of certainty, stochastic uncertainty, and fuzzy uncertainty, including computer science and mathematics, operations research and control, artificial intelligence, information and engineering technology, barrier-free communication for people with disabilities, digital logistics and knowledge representation, medical applications, queuing theory and game theory, algorithms and optimization methods. The book is a valuable reference book for scholars, engineers, management professionals, and graduate, undergraduate, and vocational students interested in computer science, mathematics, and fuzzy mathematics and operations research, as well as their applications in information technology and engineering.Introduction to Data Science in Biostatistics: Using R, the Tidyverse Ecosystem, and APIs
Par Thomas W. MacFarland. 2024
Introduction to Data Science in Biostatistics: Using R, the Tidyverse Ecosystem, and APIs defines and explores the term "data science"…
and discusses the many professional skills and competencies affiliated with the industry. With data science being a leading indicator of interest in STEM fields, the text also investigates this ongoing growth of demand in these spaces, with the goal of providing readers who are entering the professional world with foundational knowledge of required skills, job trends, and salary expectations. The text provides a historical overview of computing and the field's progression to R as it exists today, including the multitude of packages and functions associated with both Base R and the tidyverse ecosystem. Readers will learn how to use R to work with real data, as well as how to communicate results to external stakeholders. A distinguishing feature of this text is its emphasis on the emerging use of APIs to obtain data.This book constitutes the refereed post-proceedings of the 11th International Conference on Industrial Engineering and Applications, ICIEA 2024, held in…
Nice, France, during January 10-12, 2024. The 16 full papers and 3 short papers included in this book were carefully reviewed and selected from 90 submissions. They focus on the most recent and relevant research, theories and practices in industrial engineering and its applications.Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Par Andy Greenberg. 2019
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the…
cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of DemocracyThe true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.Practical Handbook for Professional Investigators
Par Rory J. McMahon CLI CFE, Randy Dickson. 2014
The third edition of this popular volume continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday…
reference for investigative professionals at all levels. More relevant than ever, this edition adds two new chapters on death and terrorism investigations and several new sections, including insurance fraud, fire and arson investigation; indicators of online marital infidelity; obtaining governmental reports; service of subpoenas for witnesses in federal courts; the Rules of Professional Conduct; niche markets in the investigative industry; and managing and marketing an investigative practice.Learn Ansible: Automate cloud, security, and network infrastructure using Ansible 2.x
Par Russ McKendrick. 2018
Run Ansible playbooks to launch complex multi-tier applications hosted in public cloudsKey FeaturesBuild your learning curve using AnsibleAutomate cloud, network,…
and security infrastructures with easeGain hands-on exposure on AnsibleBook DescriptionAnsible has grown from a small, open source orchestration tool to a full-blown orchestration and configuration management tool owned by Red Hat. Its powerful core modules cover a wide range of infrastructures, including on-premises systems and public clouds, operating systems, devices, and services—meaning it can be used to manage pretty much your entire end-to-end environment. Trends and surveys say that Ansible is the first choice of tool among system administrators as it is so easy to use.This end-to-end, practical guide will take you on a learning curve from beginner to pro. You'll start by installing and configuring the Ansible to perform various automation tasks. Then, we'll dive deep into the various facets of infrastructure, such as cloud, compute and network infrastructure along with security.By the end of this book, you'll have an end-to-end understanding of Ansible and how you can apply it to your own environments.What you will learnWrite your own playbooks to configure servers running CentOS, Ubuntu, and WindowsIdentify repeatable tasks and write playbooks to automate themDefine a highly available public cloud infrastructure in code, making it easy to distribute your infrastructure configurationDeploy and configure Ansible Tower and Ansible AWXLearn to use community contributed rolesUse Ansible in your day-to-day role and projectsWho this book is forLearn Ansible is perfect for system administrators and developers who want to take their current workflows and transform them into repeatable playbooks using Ansible. No prior knowledge of Ansible is required.