|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Protecting Privacy in Video Surveillance offers the state of the
art from leading researchers and experts in the field. This broad
ranging volume discusses the topic from various technical points of
view and also examines surveillance from a societal
perspective.
A comprehensive introduction carefully guides the reader through
the collection of cutting-edge research and current thinking. The
technical elements of the field feature topics from MERL blind
vision, stealth vision and privacy by de-identifying face images,
to using mobile communications to assert privacy from video
surveillance, and using wearable computing devices for data
collection in surveillance environments. Surveillance and society
is approached with discussions of security versus privacy, the rise
of surveillance, and focusing on social control.
This rich array of the current research in the field will be an
invaluable reference for researchers, as well as graduate
students.
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
Achieve the gold standard in penetration testing with Kali using
this masterpiece, now in its fourth edition Key Features Rely on
the most updated version of Kali to formulate your pentesting
strategies Test your corporate network against threats Explore new
cutting-edge wireless penetration tools and features Book
DescriptionKali Linux is a comprehensive penetration testing
platform with advanced tools to identify, detect, and exploit the
vulnerabilities uncovered in the target network environment. With
Kali Linux, you can apply the appropriate testing methodology with
defined business objectives and a scheduled test plan, resulting in
successful penetration testing project engagement. This fourth
edition of Kali Linux 2018: Assuring Security by Penetration
Testing starts with the installation of Kali Linux. You will be
able to create a full test environment to safely practice scanning,
vulnerability assessment, and exploitation. You'll explore the
essentials of penetration testing by collecting relevant data on
the target network with the use of several footprinting and
discovery tools. As you make your way through the chapters, you'll
focus on specific hosts and services via scanning and run
vulnerability scans to discover various risks and threats within
the target, which can then be exploited. In the concluding
chapters, you'll apply techniques to exploit target systems in
order to gain access and find a way to maintain that access. You'll
also discover techniques and tools for assessing and attacking
devices that are not physically connected to the network, including
wireless networks. By the end of this book, you will be able to use
NetHunter, the mobile version of Kali Linux, and write a detailed
report based on your findings. What you will learn Conduct the
initial stages of a penetration test and understand its scope
Perform reconnaissance and enumeration of target networks Obtain
and crack passwords Use Kali Linux NetHunter to conduct wireless
penetration testing Create proper penetration testing reports
Understand the PCI-DSS framework and tools used to carry out
segmentation scans and penetration testing Carry out wireless
auditing assessments and penetration testing Understand how a
social engineering attack such as phishing works Who this book is
forThis fourth edition of Kali Linux 2018: Assuring Security by
Penetration Testing is for pentesters, ethical hackers, and IT
security professionals with basic knowledge of Unix/Linux operating
systems. Prior knowledge of information security will help you
understand the concepts in this book
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
Secure your Amazon Web Services (AWS) infrastructure with
permission policies, key management, and network security, along
with following cloud security best practices Key Features Explore
useful recipes for implementing robust cloud security solutions on
AWS Monitor your AWS infrastructure and workloads using CloudWatch,
CloudTrail, config, GuardDuty, and Macie Prepare for the AWS
Certified Security-Specialty exam by exploring various security
models and compliance offerings Book DescriptionAs a security
consultant, securing your infrastructure by implementing policies
and following best practices is critical. This cookbook discusses
practical solutions to the most common problems related to
safeguarding infrastructure, covering services and features within
AWS that can help you implement security models such as the CIA
triad (confidentiality, integrity, and availability), and the AAA
triad (authentication, authorization, and availability), along with
non-repudiation. The book begins with IAM and S3 policies and later
gets you up to speed with data security, application security,
monitoring, and compliance. This includes everything from using
firewalls and load balancers to secure endpoints, to leveraging
Cognito for managing users and authentication. Over the course of
this book, you'll learn to use AWS security services such as Config
for monitoring, as well as maintain compliance with GuardDuty,
Macie, and Inspector. Finally, the book covers cloud security best
practices and demonstrates how you can integrate additional
security services such as Glacier Vault Lock and Security Hub to
further strengthen your infrastructure. By the end of this book,
you'll be well versed in the techniques required for securing AWS
deployments, along with having the knowledge to prepare for the AWS
Certified Security - Specialty certification. What you will learn
Create and manage users, groups, roles, and policies across
accounts Use AWS Managed Services for logging, monitoring, and
auditing Check compliance with AWS Managed Services that use
machine learning Provide security and availability for EC2
instances and applications Secure data using symmetric and
asymmetric encryption Manage user pools and identity pools with
federated login Who this book is forIf you are an IT security
professional, cloud security architect, or a cloud application
developer working on security-related roles and are interested in
using AWS infrastructure for secure application deployments, then
this Amazon Web Services book is for you. You will also find this
book useful if you're looking to achieve AWS certification. Prior
knowledge of AWS and cloud computing is required to get the most
out of this book.
|
|