Tag: Securing

Securing the Seas the Soviet Naval Challenge and Western Alliance Options


Free Download Securing the Seas: the Soviet Naval Challenge and Western Alliance Options By Paul H. Nitze; Leonard Sullivan; Atlantic Council Working Group on Securing the Seas
2019 | 499 Pages | ISBN: 0367286904 | PDF | 51 MB
This book is the effort of experts brought together by the Atlantic Council to analyze the capabilities of the Western Alliance to defend sea lines of communication under various conditions of peace, tension, and war. It reviews the way in which Soviet naval forces have been used in the Alliance.

(more…)

ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference


Free Download ISSE 2009 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2009 Conference By Vittorio Bertocci (auth.), Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (eds.)
2010 | 368 Pages | ISBN: 3834809586 | PDF | 88 MB
This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: – Economics of Security and Identity Management – Security Services and Large Scale Public Applications – Privacy and Data Protection and Awareness Raising – Standards and Technical Solutions – Secure Software, Trust and Assurance Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2009. Content/noch mit MS abgleichen!! Economics of Security and Identity Management – Security Services and Large Scale Public Applications – Privacy and Data Protection and Awareness Raising – Standards and Technical Solutions – Secure Software, Trust and Assurance Target Group: – Developers of Electronic Business Processes – IT Managers – IT Security Experts – Researchers Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT Abouth the Editors: Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT

(more…)

Securing Unmanned Aerial Vehicle Networks Models and Algorithms


Free Download Securing Unmanned Aerial Vehicle Networks: Models and Algorithms by Bin Duo , Xiaojun Yuan , Yifan Liu
English | PDF EPUB (True) | 2023 (2024 Edition) | 130 Pages | ISBN : 3031456041 | 21.9 MB
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.

(more…)

vSphere 6.7 Professional Part 04 – Securing a Deployment


Free Download vSphere 6.7 Professional Part 04 – Securing a Deployment
Duration: 52m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 128 MB
Level: Beginner | Genre: eLearning | Language: English
VMware vSphere is an integral part of any modern networking environment. vSphere offers a virtualized data center that helps administrators scale infrastructure to meet business needs. This course is the fourth in a nine-part series designed to teach you all the essentials of configuring, managing, securing, and troubleshooting a vSphere 6.7 environment with the new HTML5 vSphere Client. In this course, instructor Rick Crisci reviews the foundations of securing your vSphere deployment. Learn how to configure and use vCenter 6.7 Single Sign-On (SSO) to grant access to multiple solutions with a single login. Plus, find out how to configure virtual machine encryption and storage policies, set up encrypted vMotion, invoke Secure Boot, configure the security profile of an ESXi host, enable lockdown mode, and more.
Note: This series is also designed to prepare candidates for the VMware Certified Professional – Data Center Virtualization 2019 (VCP-DCV 2019) exam.

(more…)

Securing the Use of Generative AI in Your Organization


Free Download Securing the Use of Generative AI in Your Organization
Released 12/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 1h 19m | Size: 195 MB
As generative AI continues to transform industries and drive innovation, it becomes increasingly crucial for organizations to understand how to secure its usage effectively. This course with instructor Jerich Beason seeks to equip you with the knowledge and skills to navigate the evolving landscape of AI security, enabling you to confidently leverage generative AI while mitigating risks, safeguarding sensitive information, and fortifying their organization’s digital resilience. Learn about the cybersecurity risks of generative AI, how to implement effective governance, risk, and compliance (GRC) processes for LLMs, the fundamentals for detecting and mitigating attacks on generative AI, and the ethical considerations of generative AI. Jerich ends the course with a look at some important AI security strategies and frameworks.

(more…)

Securing SQL Server Applications


Free Download Securing SQL Server Applications
Released 11/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Beginner | Genre: eLearning | Language: English + vtt | Duration: 2h 6m | Size: 369 MB
Dive deep into SQL Server application security! Learn vital techniques to protect data, detect vulnerabilities, and implement robust security practices to safeguard your applications.

(more…)