Listing 1 - 10 of 46 << page
of 5
>>
Sort by

Book
Hands-On Industrial Internet of Things : create a powerful industrial IoT infrastructure using industry 4.0
Authors: ---
Year: 2018 Publisher: Birmingham, UK: Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Build a strong and efficient IoT infrastructure at industrial and enterprise level by mastering Industrial IoT network Key Features Gain hands-on experience working with industrial architecture Explore the potential of cloud-based Industrial IoT platforms, analytics, and protocols Improve business models and transform your workforce with Industry 4.0 Book Description We live in an era where advanced automation is used to achieve accurate results. To set up an automation environment, you need to first configure a network that can be accessed anywhere and by any device. This book is a practical guide that helps you discover the technologies and use cases for Industrial Internet of Things (IIOT). Hands-On Industrial Internet of Things takes you through the implementation of industrial processes and specialized control devices and protocols. You'll study the process of identifying and connecting to different industrial data sources gathered from different sensors. Furthermore, you'll be able to connect these sensors to cloud network, such as AWS IoT, Azure IoT, Google IoT, and OEM IoT platforms, and extract data from the cloud to your devices. As you progress through the chapters, you'll gain hands-on experience in using open source Node-Red, Kafka, Cassandra, and Python. You will also learn how to develop streaming and batch-based Machine Learning algorithms. By the end of this book, you will have mastered the features of Industry 4.0 and be able to build stronger, faster, and more reliable IoT infrastructure in your Industry. What you will learn Explore industrial processes, devices, and protocols Design and implement the I-IoT network flow Gather and transfer industrial data in a secure way Get to grips with popular cloud-based platforms Understand diagnostic analytics to answer critical workforce questions Discover the Edge device and understand Edge and Fog computing Implement equipment and process management to achieve business-specific goals Who this book is for If you're an IoT architect, developer, or stakeholder working with architectural aspects of Industrial Internet of Things, this book is for you." -- Publisher's description.


Book
Practical industrial Internet of Things security : a practitioner's guide for securing connected industries
Author:
ISBN: 1523125322 Year: 2018 Publisher: Birmingham : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware
Authors: ---
ISBN: 1484261933 1484261925 Year: 2020 Publisher: New York : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. You will: Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative.

Advances in cryptology, 1981-1997 : electronic proceedings and index of the crypto and eurocrypt conferences, 1981-1997
Authors: ---
ISSN: 03029743 ISBN: 3540650695 9783540650690 3540496777 Year: 1998 Volume: 1440 Publisher: Berlin, Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community.


Book
Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3319417622 3319417630 9783319417622 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.


Book
Five technological forces disrupting security
Author:
ISBN: 0128050969 0128050950 9780128050965 9780128050958 Year: 2018 Publisher: Oxford, United Kingdom Cambridge, MA, United States

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. Explores the five major technological forces driving digital change in commercial security; Shows practitioners how to align security strategies with these inevitable changes; Examines how the consumerization of security will change the vendor playing field; Illustrates how security professionals can leverage these changes in their own careers; Provides an adoption scorecard that ranks trends and timeline for impact.

Keywords

Computer networks --- Computer security. --- Cloud computing --- Security measures. --- Electronic data processing --- Web services --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Distributed processing --- Protection --- Security measures --- Redes de ordenadores --- Medios sociales --- Informática en la nube, --- Datos masivos. --- Sistemas de comunicaciones móviles --- Medidas de seguridad --- Medidas de seguridad. --- Vehículos --- Sistemas móviles de comunicación --- Sistemas de comunicaciones inalámbricos --- Big Data --- Datos a gran escala --- Macrodatos --- Bases de datos --- Proceso de datos --- Seguridad de las redes de ordenadores --- Seguridad informática --- Cortafuegos (Seguridad informática) --- Sistemas de comunicación --- Online social networks --- Mobile computing --- Big data --- Context-aware computing --- Portable computers --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Data sets, Large --- Large data sets --- Data sets --- Communities, Online (Online social networks) --- Communities, Virtual (Online social networks) --- Online communities (Online social networks)


Book
Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings
Authors: ---
ISBN: 3319459309 3319459317 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.


Book
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II
Authors: --- --- ---
ISBN: 3319457403 3319457411 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.


Book
Security and Trust Management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
Authors: --- ---
ISBN: 3642380034 3642380042 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Listing 1 - 10 of 46 << page
of 5
>>
Sort by