Narrow your search

Library

KBC (10)

ULiège (1)


Resource type

book (11)


Language

English (11)


Year
From To Submit

2024 (5)

2023 (1)

2022 (1)

2021 (2)

2019 (1)

More...
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
How to start your own cybersecurity consulting business : first-hand lessons from a burned-out ex-CISO
Author:
ISBN: 100330530X 100330530X 1000625656 Year: 2023 Publisher: Boca Raton, Florida : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Practical ai for cybersecurity
Author:
ISBN: 9780367708597 Year: 2021 Publisher: Boca Raton, Florida ; Abingdon, Oxon : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of this book is to explore the ways and methods as to how AI can be used in cybersecurity, with an emphasis upon its subcomponents of machine learning, computer vision, and neural networks. It also explores how AI can be used to automate tasks encountered by both penetration testing and threat hunting teams.


Book
The science of biometrics : security technology for identity verification
Author:
ISBN: 0429946368 0429487584 0429946376 Year: 2018 Publisher: Boca Raton, FL : Routledge, an imprint of Taylor and Francis,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities.Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review.This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.


Book
Business recovery and continuity in a mega disaster : cybersecurity lessons learned from the COVID-19 pandemic
Author:
ISBN: 1003279147 1003279147 1000574598 Year: 2022 Publisher: Boca Raton, Florida : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The zero trust framework : threat hunting and quantum mechanics
Author:
ISBN: 1003392962 1000922472 1003392962 Year: 2024 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Even despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not to participate in. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography"--


Book
Protecting Information Assets and IT Infrastructure in the Cloud
Author:
ISBN: 1003822207 Year: 2024 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Ransomware : Penetration Testing and Contingency Planning
Author:
ISBN: 1003824544 9781003824541 Year: 2024 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Deploying the Zero Trust Framework in MSFT Azure
Author:
ISBN: 1003824528 Year: 2024 Publisher: Boca Raton, FL : Taylor & Francis Group, LLC,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems. However, given its stature, it has also become a prime target for the cyberattacker. Thus, a Zero Trust Framework is strongly needed. Deploying the Zero Trust Framework in MSFT Azure takes a closer look at the Cloud, the Zero Trust Framework, and how to deploy from both the technical and psychological perspectives.

Keywords

Cloud computing.


Book
The Zero Trust Framework and Privileged Access Management (PAM).
Author:
ISBN: 104001870X Year: 2024 Publisher: Milton : Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses.

Keywords


Book
The science of biometrics : security technology for identity verification
Author:
ISBN: 9781138594425 9781498761246 Year: 2019 Publisher: New York, NY : Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review. This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics." [Publisher]

Listing 1 - 10 of 11 << page
of 2
>>
Sort by