Home > Tags: security (Total 1747 Records)
WordPress security + multi-backups : My automated 4-destination strategy
Security By:Allan Tepper 2017-08-07 00:00:00
WordPress is one of the most popular platforms for websites, with or without blogs. WordPress is getting better all the time. But thanks to its popularity, WordPress is also a big target for hackers, with 6 million password attack attempts every 16 hours according to an industry leader. Thats why we Security
From CIA to APT: An Introduction to Cyber Security
Security By:Amoroso and Amoroso 2017-08-10 00:00:00
Most introductory books on cyber security are either too technical for popular readers, or too casual for professional ones. This book, in contrast, is intended to reside somewhere in the middle. That is, while concepts are explained in a friendly manner for any educated adult, the book also necessa Security
Introduction to Artificial Intelligence for Security Professionals
Security By:Cylance Data Team 2017-10-03 00:00:00
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence is a field of study that is adept at applying intelligence to vast amounts of data and deriv Security
Tags: security intelligence artificial
Take Control of A Practical Guide to Networking Privacy & Security iOS 11 (Full)
Networking By:Glenn Fleishman 2017-00-00 00:00:00
Are you concerned about people and companies gaining access to your personal data—contacts, photos, videos, and more—stored on your iPhone and iPad, and about keeping private information private? A Practical Guide to Networking, Privacy & Security in iOS 11 helps with every dimension of controll Networking
Network Security Through Data Analysis: From Data to Action
Security By:Michael Collins 2017-10-02 00:00:00
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network tra Security
Predictive Computing and Information Security
Security By:P.K. Gupta 2017-09-29 00:00:00
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innova Security
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 12th International Conference, QShine 2016, Seoul, Korea, July 78, 2016, ... and Telecommunications Engineering)
Telecommunications By:Jong-Hyouk LeeSangheon Pack 2017-09-13 00:00:00
This book constitutes the refereed conference proceedings of the 12th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2016, held in Seoul, South Korea, in July 2016. The 27 full papers, 5 short papers and 18 workshop papers were selecte Telecommunications
Tags: telecommunications network security engineering quality conference robustness reliability heterogeneous korea seoul qshine
Lab Manual for Security+ Guide to Network Security Fundamentals, 5th
Security By:Mark Ciampa 2015-03-20 00:00:00
The Laboratory Manual is a valuable tool designed to enhance your lab experience. Lab activities, objectives, materials lists, step-by-step procedures, illustrations, and review questions are commonly found in a Lab Manual. Security
Security Operations Center - Analyst Guide: SIEM Technology, Use Cases and Practices
Security By:Arun Thomas 2017-09-27 00:00:00
Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accompl Security
Tags: security guide technology practice cases analyst center siem
Mobile Application Development, Usability, and Security (Advances in Multimedia and Interactive Technologies)
Mobile Devices By:Sougata Mukherjea 2016-10-19 00:00:00
The development of mobile technology has experienced exponential growth in recent years. Mobile devices are ubiquitous in modern society, impacting both our personal and professional lives. Mobile Application Development, Usability, and Security provides a thorough overview on the different facets Mobile Devices
Tags: security application technology mobile interactive development usability multimedia