Related Books

Empirical Cloud Security, Second Edition
Language: en
Pages: 490
Authors: Aditya K. Sood
Categories: Computers
Type: BOOK - Published: 2023-08-21 - Publisher: Walter de Gruyter GmbH & Co KG

GET EBOOK

The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and indep
Empirical Cloud Security
Language: en
Pages: 479
Authors: Aditya K. Sood
Categories: Computers
Type: BOOK - Published: 2023-06-30 - Publisher: Mercury Learning and Information

GET EBOOK

The second edition of the book has been updated with the latest research and developments in the field of cloud security. The content has been refined and strea
Targeted Cyber Attacks
Language: en
Pages: 159
Authors: Aditya Sood
Categories: Computers
Type: BOOK - Published: 2014-04-18 - Publisher: Syngress

GET EBOOK

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attack
Blockchain for Distributed Systems Security
Language: en
Pages: 352
Authors: Sachin Shetty
Categories: Computers
Type: BOOK - Published: 2019-04-16 - Publisher: John Wiley & Sons

GET EBOOK

AN ESSENTIAL GUIDE TO USING BLOCKCHAIN TO PROVIDE FLEXIBILITY, COST-SAVINGS, AND SECURITY TO DATA MANAGEMENT, DATA ANALYSIS, AND INFORMATION SHARING Blockchain
Privileged Attack Vectors
Language: en
Pages: 403
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2020-06-13 - Publisher: Apress

GET EBOOK

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks c