Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Building Role-Based Access using AI for Java Developers

    Posted By: IrGens
    Building Role-Based Access using AI for Java Developers

    Building Role-Based Access using AI for Java Developers
    .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 49m | 471 MB
    Instructor: Harit Himanshu

    Databricks Access Control and Security

    Posted By: IrGens
    Databricks Access Control and Security

    Databricks Access Control and Security
    .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 45m | 134 MB
    Instructor: Dayo Bamikole

    Keycloak Essential Knowledge for Beginners 100

    Posted By: TiranaDok
    Keycloak Essential Knowledge for Beginners 100

    Keycloak Essential Knowledge for Beginners 100 by Bunka Publishing, Kamiya Ryousuke, Azuma Misaki
    English | August 17, 2024 | ISBN: N/A | ASIN: B0DDJ599P8 | 247 pages | EPUB | 0.88 Mb

    Fundamentals of Computer Security

    Posted By: AvaxGenius
    Fundamentals of Computer Security

    Fundamentals of Computer Security by Josef Pieprzyk , Thomas Hardjono , Jennifer Seberry
    English | PDF | 2003 | 686 Pages | ISBN : 3540431012 | 3.9 MB

    This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.

    Understanding Zero Trust [Updated: 6/15/2023]

    Posted By: IrGens
    Understanding Zero Trust [Updated: 6/15/2023]

    Understanding Zero Trust [Updated: 6/15/2023]
    .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 59m | 102 MB
    Instructor: Malcolm Shore

    Security in Computing Systems: Challenges, Approaches and Solutions

    Posted By: AvaxGenius
    Security in Computing Systems: Challenges, Approaches and Solutions

    Security in Computing Systems: Challenges, Approaches and Solutions by Joachim Biskup
    English | PDF (True) | 2009 | 706 Pages | ISBN : 3540784411 | 4.25 MB

    This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ‘‘global information infrastructure’’ on a large scale as well as by approp- ately configuring our personal computers on a small scale.

    Access Control in Data Management Systems

    Posted By: AvaxGenius
    Access Control in Data Management Systems

    Access Control in Data Management Systems by Elena Ferrari
    English | PDF | 2010 | 117 Pages | ISBN : 1608453758 | 0.5 MB

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated.

    Security Basics for Computer Architects

    Posted By: AvaxGenius
    Security Basics for Computer Architects

    Security Basics for Computer Architects by Ruby B. Lee
    English | PDF | 2013 | 113 Pages | ISBN : 1627051554 | 5.5 MB

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures.

    Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021

    Posted By: AvaxGenius
    Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021

    Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021 by Udai Pratap Rao, Sankita J. Patel, Pethuru Raj, Andrea Visconti
    English | EPUB | 2022 | 318 Pages | ISBN : 981169088X | 39.1 MB

    This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments from researchers across industry and academia working in security, privacy, and data analytics from technological and social perspectives. The book will serve as a valuable reference resource for academics and researchers across the globe.

    Information Flow Based Security Control Beyond RBAC

    Posted By: AvaxGenius
    Information Flow Based Security Control Beyond RBAC

    Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) by Klaus-Peter Fischer-Hellmann
    English | PDF | 178 Pages | ISBN : 3834826170 | 1.7 MB

    The book shows a way of providing more refined methods of information flow control than those offered by role-based access control (RBAC). For granting access to information or resources, former or further information flow in a business process requesting this access is taken into account. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows in Grid and Cloud computing.Contents

    Access Control and Identity Management (Information Systems Security & Assurance), 3rd Edition

    Posted By: yoyoloit
    Access Control and Identity Management (Information Systems Security & Assurance), 3rd Edition

    Access Control and Identity Management
    by Chapple, Mike;

    English | 2021 | ISBN: ‎ 1284198359 , 978-1284198355 | 376 pages | True EPUB | 35.09 MB

    Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

    Posted By: Underaglassmoon
    Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

    Artificial Intelligence Paradigms for Smart Cyber-Physical Systems
    IGI Global | English | 2021 | ISBN-10: 179985101X | 392 pages | PDF | 15.90 MB

    by Ashish Kumar Luhach (Editor), Atilla Elçi (Editor)
    Cyber-physical systems (CPS) have emerged as a unifying name for systems where cyber parts (i.e., the computing and communication parts) and physical parts are tightly integrated, both in design and during operation

    Internet of Things and Access Control: Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems

    Posted By: AvaxGenius
    Internet of Things and Access Control: Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems

    Internet of Things and Access Control: Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems by Shantanu Pal
    English | PDF,EPUB | 2021 | 215 Pages | ISBN : 3030649970 | 12.9 MB

    This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large-scale IoT systems, in particular, the need for access control, identity management, delegation of access rights and the provision of trust within such systems.