• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

The Ciso's Next Frontier: Ai, Post-Quantum Cryptography and Advanced Security Paradigms » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

The Ciso's Next Frontier: Ai, Post-Quantum Cryptography and Advanced Security Paradigms

ISBN-13: 9783030753566 / Angielski / Miękka / 2022

Raj Badhwar
The Ciso's Next Frontier: Ai, Post-Quantum Cryptography and Advanced Security Paradigms Badhwar, Raj 9783030753566 Springer International Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

The Ciso's Next Frontier: Ai, Post-Quantum Cryptography and Advanced Security Paradigms

ISBN-13: 9783030753566 / Angielski / Miękka / 2022

Raj Badhwar
cena 201,24
(netto: 191,66 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO’s perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security

The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks:  the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware.

CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability.

Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - Network Security
Computers > Artificial Intelligence - General
Science > Fizyka kwantowa
Wydawca:
Springer International Publishing
Język:
Angielski
ISBN-13:
9783030753566
Rok wydania:
2022
Waga:
0.66 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

"Raj Badhwar has written an interesting book meant to help those tasked with information security. ... This is a comprehensive book covering a wide range of topics. For the CISO or security professional looking to get a deeper understanding of the topics their security teams will have to deal with, The CISO's Next Frontier does a good job of helping senior information security professionals understand what their teams in the trenches face." (Ben Rothke, Security Management, sm.asisonline.org, August 23, 2022)

Are you ready for Quantum computing?.- The need for post-quantum cryptography.- Quantum Encryption is not a Paradox.- AI Code of Ethics for Cybersecurity.- The Case of AI/ML in Cybersecurity.- Security for Work-From-Home Technologies.- Secure video conferencing and online collaboration.- If you must work from home, do it securely!.- Security Controls for Remote Access Technologies.- Specialty Malware and backdoors for VDI.- The Future State of Data Security.- Cybersecurity enabled by Zero Trust.- Advanced Active Directory attacks and Prevention.- Cyber Deception Systems.- Hypervisor Introspection.- Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems.- The advanced malware prevention playbook.- The 768K Precipice.- MAC Address Randomization to limit user/device tracking.- Transport Layer Security 1.3.- The use of ESNI with TLS 1.3, is it a boon to privacy? Or does it raise security concerns.- Using FQDN vs IP addresses in FW rules and app configs.- Network Time Protocol (NTP) Security.- Domain Name System (DNS) Security.- Next Gen Wi-Fi and Security.- The next frontier for CA/Certificate security - DANE and Certificate Transparency.- Man-in-the-middle Attack Prevention.- Distributed Denial of Service (DDoS) Prevention.- Intro to API Security – Issues and Some Solutions!.- Windows subsystem for Linux - security risk and mitigation.- Common sense security measures for voice activated assistant devices.- The case for code signing and dynamic white-listing.- Biometrics - Commentary on data breach notification, threats, and data security.- Security requirements for RPA Bots.- Polymorphic and Metamorphic Malware.- Introduction to Cloud Monitoring Security Controls.- Cloud Monitoring Security Controls for AWS.- Cloud Monitoring Security Controls for Azure.- Cloud Policy Enforcement Point.- Dynamic measurement of cyber risk.- OEM and third-party sourced application and services risk.- Commentary on Insider Threat.- Simplified approach to calculate the probability of a cyber event.- Privacy concerns from publicly available meta-data.- Dark Web & Dark Net.- Risk-Based Vulnerability Management.

Raj Badhwar has 25+ years of experience within the Cybersecurity and IT industry. He is currently the CISO for Voya Financial, and has previously held senior Security and IT leadership roles at AIG, BAE Systems Inc., Bank of America, Time Warner Cable, AOL Time Warner, and Sprint. 

Raj is a currently a director and secretary of the board of the National Technology Security Coalition (NTSC). He also serves on the cybersecurity advisory boards of Pace University, Rutgers University, and Ithaca College; the customer advisory board for Venafi; and the CISO advisory council for Infosys. 

Raj is a certified information systems security professional (CISSP), a certified ethical hacker (CEH), and a FINRA licensed securities professional (Series 99). He has co-authored 14 security patents, and has written and presented in the areas of advanced encryption, post-quantum cryptography, zero trust networks, cloud security pat-terns, and secure remote work paradigms. He has also been inter-viewed as a cybersecurity subject matter expert by WSJ. Raj is proficient in three languages, and conversant in another three languages. 

Raj graduated from George Washington University (GWU) with an MS in Information Systems Technology and also holds a BS in Electrical and Electronics engineering from Karnatak University. Raj is an alumnus of St Francis College, Lucknow.

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO’s perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security

The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks:  the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware.

CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability.

Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia