語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The CISO'S next frontierAI, post-qua...
~
Badhwar, Raj.
The CISO'S next frontierAI, post-quantum cryptography and advanced security paradigms /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The CISO'S next frontierby Raj Badhwar.
其他題名:
AI, post-quantum cryptography and advanced security paradigms /
作者:
Badhwar, Raj.
出版者:
Cham :Springer International Publishing :2021.
面頁冊數:
xliii, 387 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer security.
電子資源:
https://doi.org/10.1007/978-3-030-75354-2
ISBN:
9783030753542
The CISO'S next frontierAI, post-quantum cryptography and advanced security paradigms /
Badhwar, Raj.
The CISO'S next frontier
AI, post-quantum cryptography and advanced security paradigms /[electronic resource] :by Raj Badhwar. - Cham :Springer International Publishing :2021. - xliii, 387 p. :ill., digital ;24 cm.
Are you ready for Quantum computing? -- The need for post-quantum cryptography -- Quantum Encryption is not a Paradox -- AI Code of Ethics for Cybersecurity -- The Case of AI/ML in Cybersecurity -- Security for Work-From-Home Technologies -- Secure video conferencing and online collaboration -- If you must work from home, do it securely! -- Security Controls for Remote Access Technologies -- Specialty Malware and backdoors for VDI -- The Future State of Data Security -- Cybersecurity enabled by Zero Trust -- Advanced Active Directory attacks and Prevention -- Cyber Deception Systems -- Hypervisor Introspection -- Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems -- The advanced malware prevention playbook -- The 768K Precipice -- MAC Address Randomization to limit user/device tracking -- Transport Layer Security 1.3 -- The use of ESNI with TLS 1.3, is it a boon to privacy? Or does it raise security concerns -- Using FQDN vs IP addresses in FW rules and app configs -- Network Time Protocol (NTP) Security -- Domain Name System (DNS) Security -- Next Gen Wi-Fi and Security -- The next frontier for CA/Certificate security - DANE and Certificate Transparency -- Man-in-the-middle Attack Prevention -- Distributed Denial of Service (DDoS) Prevention -- Intro to API Security - Issues and Some Solutions! -- Windows subsystem for Linux - security risk and mitigation -- Common sense security measures for voice activated assistant devices -- The case for code signing and dynamic white-listing -- Biometrics - Commentary on data breach notification, threats, and data security -- Security requirements for RPA Bots -- Polymorphic and Metamorphic Malware -- Introduction to Cloud Monitoring Security Controls -- Cloud Monitoring Security Controls for AWS -- Cloud Monitoring Security Controls for Azure -- Cloud Policy Enforcement Point -- Dynamic measurement of cyber risk -- OEM and third-party sourced application and services risk -- Commentary on Insider Threat -- Simplified approach to calculate the probability of a cyber event -- Privacy concerns from publicly available meta-data -- Dark Web & Dark Net -- Risk-Based Vulnerability Management.
This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO's perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks: the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware. CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability. Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.
ISBN: 9783030753542
Standard No.: 10.1007/978-3-030-75354-2doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
The CISO'S next frontierAI, post-quantum cryptography and advanced security paradigms /
LDR
:05396nmm a2200325 a 4500
001
607804
003
DE-He213
005
20210805210037.0
006
m d
007
cr nn 008maaau
008
220119s2021 sz s 0 eng d
020
$a
9783030753542
$q
(electronic bk.)
020
$a
9783030753535
$q
(paper)
024
7
$a
10.1007/978-3-030-75354-2
$2
doi
035
$a
978-3-030-75354-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
B135 2021
100
1
$a
Badhwar, Raj.
$3
904970
245
1 4
$a
The CISO'S next frontier
$h
[electronic resource] :
$b
AI, post-quantum cryptography and advanced security paradigms /
$c
by Raj Badhwar.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xliii, 387 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Are you ready for Quantum computing? -- The need for post-quantum cryptography -- Quantum Encryption is not a Paradox -- AI Code of Ethics for Cybersecurity -- The Case of AI/ML in Cybersecurity -- Security for Work-From-Home Technologies -- Secure video conferencing and online collaboration -- If you must work from home, do it securely! -- Security Controls for Remote Access Technologies -- Specialty Malware and backdoors for VDI -- The Future State of Data Security -- Cybersecurity enabled by Zero Trust -- Advanced Active Directory attacks and Prevention -- Cyber Deception Systems -- Hypervisor Introspection -- Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems -- The advanced malware prevention playbook -- The 768K Precipice -- MAC Address Randomization to limit user/device tracking -- Transport Layer Security 1.3 -- The use of ESNI with TLS 1.3, is it a boon to privacy? Or does it raise security concerns -- Using FQDN vs IP addresses in FW rules and app configs -- Network Time Protocol (NTP) Security -- Domain Name System (DNS) Security -- Next Gen Wi-Fi and Security -- The next frontier for CA/Certificate security - DANE and Certificate Transparency -- Man-in-the-middle Attack Prevention -- Distributed Denial of Service (DDoS) Prevention -- Intro to API Security - Issues and Some Solutions! -- Windows subsystem for Linux - security risk and mitigation -- Common sense security measures for voice activated assistant devices -- The case for code signing and dynamic white-listing -- Biometrics - Commentary on data breach notification, threats, and data security -- Security requirements for RPA Bots -- Polymorphic and Metamorphic Malware -- Introduction to Cloud Monitoring Security Controls -- Cloud Monitoring Security Controls for AWS -- Cloud Monitoring Security Controls for Azure -- Cloud Policy Enforcement Point -- Dynamic measurement of cyber risk -- OEM and third-party sourced application and services risk -- Commentary on Insider Threat -- Simplified approach to calculate the probability of a cyber event -- Privacy concerns from publicly available meta-data -- Dark Web & Dark Net -- Risk-Based Vulnerability Management.
520
$a
This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO's perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks: the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware. CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability. Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.
650
0
$a
Computer security.
$3
184416
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Quantum computing.
$3
725269
650
0
$a
Artificial intelligence.
$3
194058
650
1 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Systems and Data Security.
$3
274481
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-75354-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000204711
電子館藏
1圖書
電子書
EB QA76.9.A25 B135 2021 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-75354-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入