Published by : Baturi | Views: 14 | Category: eBooks


Securing Mobile Devices and Technology
English | 2021 | ISBN: 1032136111 | 277 pages | True PDF | 12.1 MB
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.



Read More     
Published by : Baturi | Views: 14 | Category: eBooks


Securing IoT in Industry 4.0 Applications with Blockchain
English | 2021 | ISBN: 1032008105 , 978-1032008103 | 351 pages | True PDF | 20.1 MB
The Industry 4.0 revolution is changing the world around us. Artificial intelligence and machine learning, automation and robotics, big data, Internet of Things, augmented reality, virtual reality, and creativity are the tools of Industry 4.0. Improved collaboration is seen between smart systems and humans, which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation.



Read More     
Published by : Baturi | Views: 32 | Category: eBooks


Dictators and Autocrats Securing Power across Global Politics
English | 2021 | ISBN: 0367607867 | 465 pages | pdf | 4.08 MB
In order to truly understand the emergence, endurance, and legacy of autocracy, this volume of engaging essays explores how autocratic power is acquired, exercised, and transferred or abruptly ended through the careers and politics of influential figures in more than 20 countries and six regions.



Read More     
Published by : Baturi | Views: 40 | Category: eBooks


Securing India in the Cyber Era (The Gateway House Guide to India in the 2020s)
English | 2021 | ISBN: 9781003152910 | 85 pages | pdf | 1.22 MB
This book explores the geopolitics of the global cyber space to analyse India's cyber security landscape. As conflicts go more online, nation-states are manipulating the cyber space to exploit each other's dependence on information, communication and digital technologies. All the major powers have dedicated cyber units to breach computer networks, harvest sensitive data and proprietary information, and disrupt critical national infrastructure operations.
This volume reviews threats to Indian computer networks, analyses the country's policy responses to these threats, and suggests comprehensive measures to build resilience in the system. India constitutes the second largest internet user base in the world, and this expansion of the user base also saw an accompanying rise in cyber crimes. The book discusses how the country can protect this user base, the data-dependent critical infrastructure, build resilient digital payment systems, and answer the challenges of the dark net. It also explores India's cyber diplomacy, as an emerging economy with a large IT industry and a well-established technological base.



Read More     
Published by : Baturi | Views: 49 | Category: Tutorials

Securing Microservices in ASP.NET Core
Kevin Dockx | Duration: 3:37 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 866 MB | Language: English + SUB
This course will teach you how to secure your ASP.NET Core microservices using a variety of best practice patterns for authentication and authorization.
Authentication and authorization are two very important aspects of a secure microservices architecture. In this course, Securing Microservices in ASP.NET Core, you'll learn how to secure your microservices using a variety of best practice techniques for authentication and authorization. You'll learn how to work with an identity microservice, how to apply security with and without an API gateway, and how to improve upon the default security approach to reach a best-of-class implementation. By the end of this course you'll be comfortable implementing best-practice security techniques in microservices architectures.



Read More     
Published by : Baturi | Views: 41 | Category: eBooks

Securing China's Northwest Frontier Identity and Insecurity in Xinjiang
David Tobin, "Securing China's Northwest Frontier: Identity and Insecurity in Xinjiang"
English | ISBN: 1108488404 | 2020 | 288 pages | PDF | 10 MB
In the first study to incorporate majority Han and minority Uyghur perspectives on ethnic relations in Xinjiang following mass violence during July 2009, David Tobin analyses how official policy shapes identity and security dynamics on China's northwest frontier. He explores how the 2009 violence unfolded and how the party-state responded to ask how official identity narratives and security policies shape practices on the ground. Combining ethnographic methodology with discourse analysis and participant-observation with in-depth interviews, Tobin examines how Han and Uyghurs interpret and reinterpret Chinese nation-building. He concludes that by treating Chinese identity as a security matter, the party-state exacerbates cycles of violence between Han and Uyghurs who increasingly understand each other as threats.



Read More     
Published by : Baturi | Views: 44 | Category: eBooks


Securing Social Networks in Cyberspace
English | 2021 | ISBN: 0367681730 | 317 pages | True PDF | 13.07 MB
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount.Securing Social Networks in Cyberspacediscusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book.
This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.



Read More     
Published by : Baturi | Views: 28 | Category: eBooks


Securing Livelihoods Informal Economy Practices and Institutions
Securing Livelihoods: Informal Economy Practices and Institutions By Isabelle Hillenkamp; Frédéric Lapeyre; Andreia Lemaitre
2013 | 352 Pages | ISBN: 0199687013 | PDF | 3 MB
Far from the vision of popular actors in the popular economy as reactionary and archaic, stubbornly resisting any move towards change, this book's overall aim is to contribute to a broadening and deepening of our understanding of the logic and socio-economic practices of those operating in the informal economy. It focuses on the vulnerabilities of these participants, resulting from high exposure to different risks combined with low social protection, and on the interactions between vulnerability and poverty. It considers security of livelihoods as the guiding principle for multiple practices in the informal economy. Thirteen studies, based on careful analyses of empirical data in different contexts in Africa, Latin America, and Asia, contribute to this multidisciplinary discussion.This book describes how people develop their own strategies to solve their problems through the use of interpersonal networks, associations, and other community-based arrangements. Moreover, it shows that informal economy actors systematically reposition themselves vis-a-vis the State, markets, international, and national policies with the aim of enhancing their economic and social security, and they may do this either individually or collectively. The book emphasizes how adaptability of the informal economy can be influenced by such factors as the macroeconomic context, access to financial, technological, and information resources, infrastructure, social protection schemes, and the institutional environment within which adaptations occur. Case studies stress the need to reformulate questions relating to policy intervention based on a more thorough understanding of the perspective of informal economy actors.



Read More     
Published by : Baturi | Views: 28 | Category: Tutorials


Pluralsight - Securing Connected Devices with AWS IoT Device Defender
Duration: 58m | Video: .MP4, 1280x720 30 fps | Audio: AAC, 48 kHz, 2ch | Size: 100 MB
Level: Intermediate | Genre: eLearning | Language: English
Being aware of issues within an environment with many devices can be a challenging task. Internet of Things (IoT) can be especially difficult due to the scale opportunities that exist. AWS has provided a tool called Device Defender to help you stay on top of potential security issues that may exist in your IoT environments. In this course, Securing Connected Devices with AWS IoT Device Defender, you will explore configuring Device Defender to monitor and secure your IoT environment. First, you will learn how to configure and use Device Defender Audit to set up audits to monitor your IoT environments using industry best practice checks. Next, you will discover how to configure and use Device Defender Detect to monitor IoT device metrics to alarm on anomalies. Finally, you will learn how to configure Mitigation Actions to automatically react to a variety of issues that can occur in your environment. When you're finished with this course, you will have the skills and knowledge to configure Audit, Detect, and Mitigation Actions within AWS IoT Device Defender to monitor and secure your IoT environment.



Read More     
Published by : Baturi | Views: 28 | Category: Tutorials


O'Reilly - Securing Your Network from Attacks

Duration: 6h 2m | Author(s): Jeff Minakata | Video: 1920x1080, 48kHz | 2.3 GB
Genre: eLearning | Language: English
Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years.



Read More     
← Previous    1 2 3 4 5 6 7 8 9    Next →

To Page :

Recent

Searches