Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Decolonizing the South African University: Towards Curriculum as Self Authentication

Posted By: arundhati
Decolonizing the South African University: Towards Curriculum as Self Authentication

Oscar Koopman, "Decolonizing the South African University: Towards Curriculum as Self Authentication "
English | ISBN: 3031312368 | 2023 | 221 pages | PDF | 4 MB

Advanced .NET Web API: Multi-Tenant Applications

Posted By: lucky_aut
Advanced .NET Web API: Multi-Tenant Applications

Advanced .NET Web API: Multi-Tenant Applications
Published 3/2024
Duration: 22h18m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 11.1 GB
Genre: eLearning | Language: English

Building Multitenant Web Apis with .NET

Continuous Biometric Authentication Systems: An Overview

Posted By: AvaxGenius
Continuous Biometric Authentication Systems: An Overview

Continuous Biometric Authentication Systems: An Overview by Max Smith-Creasey
English | PDF EPUB (True) | 2024 | 127 Pages | ISBN : 3031490703 | 6.2 MB

This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.

AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection

Posted By: AvaxGenius
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection

AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection by Francesco Bergadano andGiorgio Giacinto
English | PDF | 2023 | 210 Pages | ISBN : 3036582649 | 11.3 MB

Cybersecurity models include provisions for legitimate user and agent authentication, as well as algorithms for detecting external threats, such as intruders and malicious software. In particular, we can define a continuum of cybersecurity measures ranging from user identification to risk-based and multilevel authentication, complex application and network monitoring, and anomaly detection. We refer to this as the "anomaly detection continuum". Machine learning and other artificial intelligence technologies can provide powerful tools for addressing such issues, but the robustness of the obtained models is often ignored or underestimated. On the one hand, AI-based algorithms can be replicated by malicious opponents, and attacks can be devised so that they will not be detected (evasion attacks). On the other hand, data and system contexts can be modified by attackers to influence the countermeasures obtained from machine learning and render them ineffective (active data poisoning). This Special Issue presents ten papers that can be grouped under five main topics: (1) Cyber-Physical Systems (CPSs), (2) Intrusion Detection, (3) Malware Analysis, (4) Access Control, and (5) Threat intelligence.

Security in Computing Systems: Challenges, Approaches and Solutions

Posted By: AvaxGenius
Security in Computing Systems: Challenges, Approaches and Solutions

Security in Computing Systems: Challenges, Approaches and Solutions by Joachim Biskup
English | PDF (True) | 2009 | 706 Pages | ISBN : 3540784411 | 4.25 MB

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ‘‘global information infrastructure’’ on a large scale as well as by approp- ately configuring our personal computers on a small scale.

Web Authentication APIs

Posted By: IrGens
Web Authentication APIs

Web Authentication APIs
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 5h 4m | 827 MB
Instructor: Maximiliano Firtman

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Repost)

Posted By: AvaxGenius
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Repost)

Biometric User Authentication for IT Security: From Fundamentals to Handwriting by Claus Vielhauer
English | PDF(True) | 2006 | 288 Pages | ISBN : 038726194X | 18.3 MB

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.

Ten Laws for Security

Posted By: AvaxGenius
Ten Laws for Security

Ten Laws for Security by Eric Diehl
English | PDF(True) | 2016 | 290 Pages | ISBN : 3319426397 | 4.1 MB

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021

Posted By: AvaxGenius
Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021

Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021 by Udai Pratap Rao, Sankita J. Patel, Pethuru Raj, Andrea Visconti
English | EPUB | 2022 | 318 Pages | ISBN : 981169088X | 39.1 MB

This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments from researchers across industry and academia working in security, privacy, and data analytics from technological and social perspectives. The book will serve as a valuable reference resource for academics and researchers across the globe.

Build & Deploy Full Stack MERN Application | Redux-Toolkit | Auth, CRUD, Like, Search & Pagination

Posted By: lucky_aut
Build & Deploy Full Stack MERN Application | Redux-Toolkit | Auth, CRUD, Like, Search & Pagination

Build & Deploy Full Stack MERN Application | Redux-Toolkit | Auth, CRUD, Like, Search & Pagination
Duration: 7h 54m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 3.34 GB
Genre: eLearning | Language: English

Mobile Authentication: Problems and Solutions

Posted By: AvaxGenius
Mobile Authentication: Problems and Solutions

Mobile Authentication: Problems and Solutions by Markus Jakobsson
English | PDF | 2013 | 121 Pages | ISBN : 1461448778 | 5.3 MB

Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes.

Security and Privacy: Select Proceedings of ICSP 2020

Posted By: AvaxGenius
Security and Privacy: Select Proceedings of ICSP 2020

Security and Privacy: Select Proceedings of ICSP 2020 by Pantelimon Stănică
English | EPUB | 2020 | 183 Pages | ISBN : 9813367806 | 20.1 MB

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy.

Level 2 Node Authentication

Posted By: ELK1nG
Level 2 Node Authentication

Level 2 Node Authentication
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 23 Lessons (5h 18m) | Size: 944.7 MB

Welcome to Node Authentication part 2! If you haven’t seen the first series on authentication yet, make sure to check it out here.

Node Fundamentals Authentication

Posted By: ELK1nG
Node Fundamentals Authentication

Node Fundamentals Authentication
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 22 Lessons (4h 49m) | Size: 662.5 MB

Welcome to Node Fundamentals Authentication! In this series, we will dive into Node foundations and build an authentication system from scratch.

Complete JWT Authentication Course with Node, Mongo, Express

Posted By: ELK1nG
Complete JWT Authentication Course with Node, Mongo, Express

Complete JWT Authentication Course with Node, Mongo, Express
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 27 lectures (3h 8m) | Size: 1 GB

Build a complete JWT Authentication REST API using Node.js, MongoDB & Express.js