Prolegomena to the Adages

Prolegomena to the Adages

Author: Desiderius Erasmus

Publisher: University of Toronto Press

Published: 2017-08-21

Total Pages: 857

ISBN-13: 1442648775

DOWNLOAD EBOOK

The essay that begins this introductory volume to the Adages explores the development of the Collectanea and its transformation into the Adagiorum chiliades.


Information Security Practice and Experience

Information Security Practice and Experience

Author: Swee-Huay Heng

Publisher: Springer Nature

Published: 2019-11-19

Total Pages: 493

ISBN-13: 3030343391

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019. The 21 full and 7 short papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized into the following topical sections: Cryptography I, System and Network Security, Security Protocol and Tool, Access Control and Authentication, Cryptography II, Data and User Privacy, Short Paper I, and Short Paper II.


Application Performance Management (APM) in the Digital Enterprise

Application Performance Management (APM) in the Digital Enterprise

Author: Rick Sturm

Publisher: Morgan Kaufmann

Published: 2017-02-11

Total Pages: 304

ISBN-13: 0128040815

DOWNLOAD EBOOK

Application Performance Management (APM) in the Digital Enterprise enables IT professionals to be more successful in managing their company's applications. It explores the fundamentals of application management, examines how the latest technological trends impact application management, and provides best practices for responding to these changes. The recent surge in the use of containers as a way to simplify management and deploy applications has created new challenges, and the convergence of containerization, cloud, mobile, virtualization, analytics, and automation is reshaping the requirements for application management. This book serves as a guide for understanding these dramatic changes and how they impact the management of applications, showing how to create a management strategy, define the underlying processes and standards, and how to select the appropriate tools to enable management processes. - Offers a complete framework for implementing effective application management using clear tips and solutions for those responsible for application management - Draws upon primary research to give technologists a current understanding of the latest technologies and processes needed to more effectively manage large-scale applications - Includes real-world case studies and business justifications that support application management investments


Computer Security – ESORICS 2023

Computer Security – ESORICS 2023

Author: Gene Tsudik

Publisher: Springer Nature

Published: 2024-01-10

Total Pages: 444

ISBN-13: 3031514823

DOWNLOAD EBOOK

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.


Computational Science and Its Applications – ICCSA 2020

Computational Science and Its Applications – ICCSA 2020

Author: Osvaldo Gervasi

Publisher: Springer Nature

Published: 2020-09-28

Total Pages: 1085

ISBN-13: 3030588114

DOWNLOAD EBOOK

The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event. Computational Science is the main pillar of most of the present research, industrial and commercial applications, and plays a unique role in exploiting ICT innovative technologies. The 466 full papers and 32 short papers presented were carefully reviewed and selected from 1450 submissions. Apart from the general track, ICCSA 2020 also include 52 workshops, in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as software engineering, security, machine learning and artificial intelligence, blockchain technologies, and of applications in many fields.


Cyber-Security Threats, Actors, and Dynamic Mitigation

Cyber-Security Threats, Actors, and Dynamic Mitigation

Author: Nicholas Kolokotronis

Publisher: CRC Press

Published: 2021-04-04

Total Pages: 392

ISBN-13: 100036660X

DOWNLOAD EBOOK

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.