Catalog Search Results
Author
Pub. Date
2015.
Language
English
Description
IntroductionAim and ScopeGeneral Electronic Measurements and Frequency LimitationsApplications and Importance of Microwave MeasurementsOverview of State-of-the-Art Microwave MeasurementsReferencesBackground InformationS-Parameters and Related Black-Box RepresentationSpectra of Commonly Encountered SignalsMicrowave Filters and Directional CouplersMicrowave Mixers, Switches, Attenuators, and ConnectorsConclusionProblemsReferencesTraditional Measurement...
Pub. Date
2013
Language
English
Description
This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly...
Author
Series
Language
English
Description
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database, consisting of multiple layers of protection. Learn to perform threat analysis, and to encrypt sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data that is confidential and important to the business....
Author
Pub. Date
2007
Language
English
Description
"If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see." "From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft and Second Life. This no-holds-barred book comes fully loaded with code examples, debuggers,...
Author
Language
English
Formats
Description
"With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques...
Author
Pub. Date
[2021]
Language
English
Description
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack
Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure. Throughout the work hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge...
Author
Pub. Date
2001
Language
English
Description
Oscilloscopes are essential tools for checking circuit operation and diagnosing faults, and an enormous range of models are available. But which is the right one for a particular application? Which features are essential and which not so important? Ian Hickman has the answers.This handy guide to oscilloscopes is essential reading for anyone who has to use a 'scope for their work or hobby: electronics designers, technicians, anyone in industry involved...
Author
Series
Language
English
Formats
Description
"Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and...
Author
Series
Language
English
Description
Keep your Mac safe from intruders, malware, and more! Version 1.0.1, updated February 10, 2021 Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn...
Author
Pub. Date
2013
Language
English
Description
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability....
Author
Pub. Date
2014.
Language
English
Description
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Most database security models focus on protecting against external unauthorized users. Because multilevel secure databases provide internal security according to user access type, they are a viable option for the security needs of modern database systems. Covering key concepts in database security,...
Author
Pub. Date
2023.
Language
English
Formats
Description
Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks Key Features Leverage best practices and emerging technologies to effectively audit a cloud environment Get better at auditing and unlock career opportunities in cloud audits and compliance Explore multiple assessments of various features in a cloud environment to see how it's done Book Description As more and more companies...
Pub. Date
2022.
Language
English
Description
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use....
Author
Pub. Date
2022
Language
English
Description
Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture management, and zero trust for your hybrid cloud deployments Key Features Secure cloud infrastructure, applications, data, and shift left security to create DevSecOps Explore patterns for continuous security, automated threat detection and accelerated incident response Leverage hybrid cloud security patterns...
Author
Pub. Date
©2014
Language
English
Description
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program...
Pub. Date
[2022]
Language
English
Description
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use....
Author
Pub. Date
2023
Language
English
Description
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces you to Falco, the open source standard for continuous risk and threat detection across Kubernetes, containers,...
Author
Pub. Date
2022.
Language
English
Description
With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring true, their implementation has become unrecognizable. This practical book provides recipes for AWS, Azure, and GCP to help you enhance the security of your own cloud native systems. Based on his hard-earned experience working with some of the world's biggest...
Author
Pub. Date
2024
Language
English
Description
Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environment Key Features Choose the right CSPM tool to rectify cloud security misconfigurations based on organizational requirements Optimize your security posture with expert techniques for in-depth cloud security insights Improve your...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request