Udvidet returret til d. 31. januar 2025

Bøger af Ashish Mishra

Filter
Filter
Sorter efterSorter Populære
  • af Ashish Mishra
    78,95 kr.

    This book is applicable for the study in Computer Science and Engineering students for UG level and PG level of all Indian Universities. The book contains a wireless sensor network and attacks possible in that, intrusion detection system to find a single black hole attacker also cluster-based approach for intrusion detection to detect multiple black hole attackers. The book determines that there are several efficient methods in the area of intrusion detection in wireless sensor networks before. Most work has focused on local detection, i.e., allowing nodes to locally detect specific attacks. Corporative Intrusion Detection scheme IDS is discussed in the book, where all nodes participate in intrusion detection. Further cluster formation and cluster shuffling approach is discussed in the book to detect multiple intruders in the network. And it is elaborated by Branch and bound tree, graphs and results.

  • af Ashish Mishra
    398,95 kr.

    DESCRIPTIONCloud platforms face unique security issues and opportunities because of their evolving designs and API-driven automation. We will learn cloud-specific strategies for securing platforms such as AWS, Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure, and others. The book will help you implement data asset management, identity and access management, network security, vulnerability management, incident response, and compliance in your cloud environment.WHAT WILL YOU LEARN ¿ Understand the critical role of Identity and Access Management (IAM) in cloud environments.¿ Address different types of security vulnerabilities in the cloud.¿ Develop and apply effective incident response strategies for detecting, responding to, and recovering from security incidents.¿ Establish a robust and secure security system by selecting appropriate security solutions for your cloud ecosystem.TABLE OF CONTENTS SECTION I: Overview and Need to Transform to Cloud Landscape1. Evolution of Cloud Computing and its Impact on Security 2. Understanding the Core Principles of Cloud Security and its Importance3. Cloud Landscape Assessment and Choosing the Solution for Your EnterpriseSECTION II: Building Blocks of Cloud Security Framework and Adoption Path4. Cloud Security Architecture and Implementation Framework5. Native Cloud Security Controls and Building Blocks6. Examine Regulatory Compliance and Adoption path for Cloud 7. Creating and Enforcing Effective Security PoliciesSECTION III: Maturity Path8. Leveraging Cloud-based Security Solutions for Security-as-a-Service9. Cloud Security Recommendations and Best Practices

  • af Ashish Mishra
    398,95 kr.

    Security is a shared responsibility, and we must all own itKey FeaturesExpert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.DescriptionOnce a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks, Intellectual Property thefts, and others.This book will help and guide the readers through the process of creating and integrating a secure cyber ecosystem into their digital business operations. In addition, it will help readers safeguard and defend the IT security infrastructure by implementing the numerous tried-and-tested procedures outlined in this book.The tactics covered in this book provide a moderate introduction to defensive and offensive strategies, and they are supported by recent and popular use-cases on cyberattacks. The book provides a well-illustrated introduction to a set of methods for protecting the system from vulnerabilities and expert-led measures for initiating various urgent steps after an attack has been detected.What you will learnAdopt MITRE ATT&CK and MITRE framework and examine NIST, ITIL, and ISMS recommendations.Understand all forms of vulnerabilities, application security mechanisms, and deployment strategies.Know-how of Cloud Security Posture Management (CSPM), Threat Intelligence, and modern SIEM systems.Learn security gap analysis, Cybersecurity planning, and strategy monitoring.Who this book is forProfessionals in IT security, Cybersecurity, and other related fields working to improve the organization''s overall security will find this book a valuable resource and companion.This book will guide young professionals who are planning to enter Cybersecurity with the right set of skills and knowledge.Table of ContentsSection - I: Overview and Need for Cybersecurity1. Overview of Information Security and Cybersecurity2. Aligning Security with Business Objectives and Defining CISO RoleSection - II: Building Blocks for a Secured Ecosystem and Identification of Critical Components3. Next-generation Perimeter Solutions4. Next-generation Endpoint Security5. Security Incident Response (IR) Methodology6. Cloud Security & Identity Management7. Vulnerability Management and Application Security8. Critical Infrastructure Component of Cloud and Data ClassificationSection - III: Assurance Framework (the RUN Mode) and Adoption of Regulatory Standards9. Importance of Regulatory Requirements and Business Continuity10. Risk management- Life Cycle11. People, Process, and Awareness12. Threat Intelligence & Next-generation SIEM Solution13. Cloud Security Posture Management (CSPM)Section - IV: Cybersecurity Strategy Guidelines, Templates, and Recommendations14. Implementation of Guidelines & Templates15. Best Practices and RecommendationsRead more

  • af Ashish Mishra
    1.553,95 kr.

    This book provides insights into contemporary issues and challenges in Multi-Criteria decision Models. It is a useful guide for identifying, understanding and categorizing Multi-Criteria Decision Models, and ultimately implementing the analysis for effective decision-making.

  • af Ashish Mishra
    454,95 kr.

    This book is applicable for the study in Computer Science and Engineering students for UG level and PG level of all Indian Universities. Book contains Fingerprint Image Enhancement, Fingerprint Classification Techniques and Basic concept of Fingerprint Feature Extraction. The book presents a biometric, an automated way of recognizing an individual based on a physiological or behavioral characteristic. Fingerprints are most widely used biometric feature for identification and authentication. The book determines that there are several efficient methods for fingerprint recognition has ever remained a source of great attraction to many workers due to their wide application in various fields. The book describes the concept of the fingerprint feature extraction, it has been observed that most of the existing work is aimed to feature extraction the fingerprint database based on the minutiae sets, singular points and other techniques.

  • af Ashish Mishra
    415,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.