The CISO'S next frontier = AI, post-...
Badhwar, Raj.

FindBook      Google Book      Amazon      博客來     
  • The CISO'S next frontier = AI, post-quantum cryptography and advanced security paradigms /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: The CISO'S next frontier/ by Raj Badhwar.
    其他題名: AI, post-quantum cryptography and advanced security paradigms /
    作者: Badhwar, Raj.
    出版者: Cham :Springer International Publishing : : 2021.,
    面頁冊數: xliii, 387 p. :ill., digital ;24 cm.
    內容註: Are you ready for Quantum computing? -- The need for post-quantum cryptography -- Quantum Encryption is not a Paradox -- AI Code of Ethics for Cybersecurity -- The Case of AI/ML in Cybersecurity -- Security for Work-From-Home Technologies -- Secure video conferencing and online collaboration -- If you must work from home, do it securely! -- Security Controls for Remote Access Technologies -- Specialty Malware and backdoors for VDI -- The Future State of Data Security -- Cybersecurity enabled by Zero Trust -- Advanced Active Directory attacks and Prevention -- Cyber Deception Systems -- Hypervisor Introspection -- Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems -- The advanced malware prevention playbook -- The 768K Precipice -- MAC Address Randomization to limit user/device tracking -- Transport Layer Security 1.3 -- The use of ESNI with TLS 1.3, is it a boon to privacy? Or does it raise security concerns -- Using FQDN vs IP addresses in FW rules and app configs -- Network Time Protocol (NTP) Security -- Domain Name System (DNS) Security -- Next Gen Wi-Fi and Security -- The next frontier for CA/Certificate security - DANE and Certificate Transparency -- Man-in-the-middle Attack Prevention -- Distributed Denial of Service (DDoS) Prevention -- Intro to API Security - Issues and Some Solutions! -- Windows subsystem for Linux - security risk and mitigation -- Common sense security measures for voice activated assistant devices -- The case for code signing and dynamic white-listing -- Biometrics - Commentary on data breach notification, threats, and data security -- Security requirements for RPA Bots -- Polymorphic and Metamorphic Malware -- Introduction to Cloud Monitoring Security Controls -- Cloud Monitoring Security Controls for AWS -- Cloud Monitoring Security Controls for Azure -- Cloud Policy Enforcement Point -- Dynamic measurement of cyber risk -- OEM and third-party sourced application and services risk -- Commentary on Insider Threat -- Simplified approach to calculate the probability of a cyber event -- Privacy concerns from publicly available meta-data -- Dark Web & Dark Net -- Risk-Based Vulnerability Management.
    Contained By: Springer Nature eBook
    標題: Computer security. -
    電子資源: https://doi.org/10.1007/978-3-030-75354-2
    ISBN: 9783030753542
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入