Filter
Nätverkssäkerhet
Filter
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military …
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, held as a virtual event from March 11-13, 2024.The 14 full …
Before an enterprise answers “How can we achieve a Zero Trust architecture?” they should be asking “Why are we looking at Zero Trust as an access model? Does it align with our …
Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. CompTIA Security+ …
Become an AWS certified security specialist, strengthen your cloud defenses, and unlock advanced techniques for incident response, logging, identity management, and more Key …
Get ready to master Microsoft Intune and revolutionize your endpoint management strategy with this comprehensive guide and provide next-level security with the Intune Suite. …
As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle …
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary …
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, held as a virtual event from March 11-13, 2024.The 14 full …
This volume introduces students to the technologies and controls that protect our hardware, software, and data from cyber threats. With everything from schools to financial …