We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Security and Privacy

    Computer security or cybersecurity is concerned with the proper functioning of computer systems despite the actions of adversaries. Privacy is about...
    Chapter Open access 2024
  2. Planning for Alternative Networks: Cloud Security and Zero Trust

    This chapter discusses alternative network configurations: cloud computing and the advanced network configuration: zero trust. The vast majority of...
    Chapter 2024
  3. Preparing for Forensic Analysis

    This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important...
    Chapter 2024
  4. Complying with HIPAA and HITECH

    The Health Insurance Portability & Accountability Act (HIPAA) of 1996 was a bipartisan bill implemented as part of United States law. HIPAA addressed...
    Chapter 2024
  5. Complying with the European Union General Data Protection Regulation (GDPR)

    Europe has a common overarching regulation that focuses on data privacy and is exemplary in the rights it affords its constituents. This chapter...
    Chapter 2024
  6. Planning for Secure Software Requirements and Design with UML

    It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and...
    Chapter 2024
  7. Security Awareness: Brave New World

    Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close...
    Chapter 2024
  8. Complying with the PCI DSS Standard

    It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card...
    Chapter 2024
  9. Designing Information Security

    Criminals and spies concentrate on stealing, modifying or destroying financial account information, trade secrets, and internal organization data....
    Chapter 2024
  10. AI Instruments for Risk of Recidivism Prediction and the Possibility of Criminal Adjudication Deprived of Personal Moral Recognition Standards: Sparse Notes from a Layman

    In what follows lies a recount of a concerned criminal lawyer, a layman, as he observes the change foreshadowed by AI in the field of individual risk...
    Chapter Open access 2024
  11. Liability for AI Driven Systems

    This article tries to assess if the current civil liability regimes provide a sound framework to tackle damages when AI systems—especially those...
    Ana Taveira da Fonseca, Elsa Vaz de Sequeira, Luís Barreto Xavier in Multidisciplinary Perspectives on Artificial Intelligence and the Law
    Chapter Open access 2024
  12. Microsoft Azure Lab

    The chapter instructs how to develop and manage cloud resources using the Microsoft Azure cloud platform. You will follow step-by-step instructions...
    M. Scott Kingsley in Cloud Technologies and Services
    Chapter 2024
  13. Numbering Systems and Subnetting

    Machines communicate using digital bits or “ones” and “zeros.” Of course, people do not naturally communicate that way. Therefore, to more easily...
    M. Scott Kingsley in Cloud Technologies and Services
    Chapter 2024
  14. Amazon Web Services (AWS) Lab

    This chapter contains step-by-step instructions with snapshots of an AWS three-tier web architecture lab utilizing the Free Tier service provided by...
    M. Scott Kingsley in Cloud Technologies and Services
    Chapter 2024
  15. Cloud Platform

    The Google Cloud Platform (GCP) global infrastructure is presented in this chapter. Google’s global infrastructure presently includes 35 regions that...
    M. Scott Kingsley in Cloud Technologies and Services
    Chapter 2024
  16. Amazon Web Services (AWS)

    This chapter first examines the AWS global infrastructure, which includes availability zones, regions, edge locations, and regional edge caches. It...
    M. Scott Kingsley in Cloud Technologies and Services
    Chapter 2024
  17. Cloud Computing Concepts

    This chapter examines the fundamentals of cloud computing and its applications. Beginning with the National Institute of Standards and Technology...
    M. Scott Kingsley in Cloud Technologies and Services
    Chapter 2024
  18. Challenges of Usable Privacy

    A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  19. Complying with U.S. Security Regulations

    What security regulation(s) must your organization adhere to? What must you implement as part of that regulation? How important is it to adhere to...
    Chapter 2024
  20. Maturing Ethical Risk

    The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects...
    Chapter 2024
Did you find what you were looking for? Share feedback.