Tag: Securing

Azure AI Tips for Developers Securing Your Data


Free Download Azure AI Tips for Developers Securing Your Data
Released: 10/2023
Duration: 23m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 55 MB
Level: Intermediate | Genre: eLearning | Language: English
Security is paramount in Azure AI development, due to the vulnerability of machine learning models to adversarial attacks on training data. To mitigate these risks, it’s crucial to validate and sanitize training data, employ secure data transfer protocols, and protect sensitive or personal information within training data. In this course, programmer and UI designer Walt Ritscher presents useful security tips for developers. Understand the significance of security in Azure AI development and its implications for machine learning models. Go over techniques for validating and sanitizing training data to protect against adversarial attacks and maintain model accuracy. Explore secure data transfer protocols to ensure the integrity and confidentiality of data during system interactions. Plus, find out how to implement auditing, logging, and monitoring systems for anomaly detection, security maintenance, and regulatory compliance in Azure AI projects.

(more…)

Human Security Securing East Asia’s Future


Free Download Benny Teh Cheng Guan, "Human Security: Securing East Asia’s Future"
English | 2012 | pages: 265 | ISBN: 9401782822, 9400717989 | PDF | 2,0 mb
Human security is becoming increasingly pronounced in recent years due to changes in the security landscape of world politics. Yet, inter-state relations have continued to dominate security concerns in East Asia. This has, unfortunately, eluded the broader understanding of issues and challenges facing the peoples of East Asia.

(more…)

Securing the IoT Privacy (2023)


Free Download Securing the IoT Privacy (2023)
Released 8/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 1h 20m | Size: 179 MB
The Internet of Things (IoT) connects people, infrastructures, and things to improve our lives and enhance production of goods and services. The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings huge gaps in security. Along with limitless possibilities of the IoT in our business and personal lives, we also need to deal with the growing risks to our privacy.

(more…)

Securing Windows Server 2019


Free Download Securing Windows Server 2019
Duration: 1h 35m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 201 MB
Level: Intermediate | Genre: eLearning | Language: English
Security is a vital part of any enterprise environment. In this course, follow Ed Liberman as he explains how to keep Windows Server 2019 secure. Ed dives into a variety of essential topics, including server hardening, mitigating common network threats, and securing files services. Plus, he shows how to manage privileged identities-including how to delegate privileges and configure account lockout policies-and dives into advanced audit polices.
Homepage

(more…)

SSL/TLS for Beginners Securing Network Communications


Free Download SSL/TLS for Beginners Securing Network Communications
Duration: 2h 24m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 290 MB
Level: Beginner | Genre: eLearning | Language: English
Secure Sockets Layer (SSL) and the succeeding Transport Layer Security (TLS) provide the backbone of securing intranet and internet network communications through encryption and authentication. SSL and TLS standards are widely used to secure network communications for services such as websites, VoIP, VPNs, and email messages. In this course, learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates. Instructor Daniel Lachance dives into how to install and configure PKI solutions in both Windows and Linux. Learn about how certificates are issued and managed throughout their lifetime; how hashing provides integrity and digital signatures provide authentication; and more.
Homepage

(more…)

Securing the Borderless Network Security for the Web 2.0 World


Free Download Securing the Borderless Network: Security for the Web 2.0 World By Gillis, Tom
2010 | 148 Pages | ISBN: 1587058863 | PDF | 2 MB
Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for business advantage. However, they also introduce daunting new security issues – many of which are already being exploited by hackers, crackers, and other cybercriminals. Secure Collaboration is the first book entirely focused on understanding, managing, and mitigating the security risks associated with today’s new collaborative technologies. It brings together systematic, up-to-the-minute decision-making and technical guidance for companies of all sizes: specific information, techniques, and best practices for protecting today’s new systems without compromising their business benefits. Cisco security technology expert Tom Gillis guides you through several common collaborative scenarios, from Cisco Webex conferencing to social networking and ERP usage. For each, he systematically identifies new and emerging security risks, and presents proven best-practice responses – ranging from revised Acceptable Use and Data Loss Prevention policies to technology solutions.The book’s extensive high-level coverage of technology solutions covers Cisco offerings for managing identity, and for securing networks, contents, endpoints, applications, and more. Gillis concludes with a preview of Web 3.0 – and what it will take to secure those applications, too.

(more…)

Securing Cryptocurrencies (2023)


Free Download Securing Cryptocurrencies (2023)
Released: 07/2023
Duration: 51m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 121 MB
Level: Beginner | Genre: eLearning | Language: English
Cryptocurrencies have exploded in popularity for both individuals and organizations. With billions of dollars at stake, ensuring that cryptocurrencies aren’t stolen, that fraud is reduced, that hacking doesn’t become a persistent threat, and that a host of other security challenges are addressed has become vitally important. This short, introductory course explores some of the basic security requirements for cryptocurrencies and provides guidance on how to lower security risks. Upon completing this course, you’ll have a deeper understanding of cryptocurrency security, as well as some tools to reduce your own exposure to risk.

(more…)