Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Machine learning ; Artificial intelligence ; Computer networks ; Security measures ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: For security professionals seeking reliable ways to combat persistent threats to their networks, there's encouraging news. Tools that employ AI and machine learning have begun to replace the older rules- and signature-based tools that can no longer combat today's sophisticated attacks. In this ebook, Oracle's Laurent Gil and Recorded Future's Allan Liska look at the strengths (and limitations) of AI- and ML-based security tools for dealing with today's threat landscape. This high-level overview demonstrates how these new tools use AI and ML to quickly identify threats, connect attack patterns, and allow operators and analysts to focus on their core mission. You'll also learn how managed security service providers (MSSPs) use AI and ML to identify patterns from across their customer base. This ebook explains: Why rules-based, signature-based, and firewall solutions have fallen short How automated bots enable cybercriminals and nation-state actors to attack your network The evolution of the botnet: how threat actors constantly change their attack strategy How AI and ML techniques in web applications help you observe, quantify, and classify inbound requests How to detect insider threats and advanced persistent threat actors with AI and ML tools Case studies that show how a media company, an airline, and a university use AL and ML in security
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed March 19, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (56 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you’re considering a multicloud approach to host applications, you’re in good company. According to a recent survey, 42% of the world’s organizations have adopted this strategy. But there are significant challenges and complexities to overcome. This practical report walks you through the pros and cons of migrating to these environments, particularly for securing your applications. Cybersecurity experts Laurent Gil and Allan Liska show you how to orchestrate and manage multicloud environments, including edge technologies designed to secure and protect your environment. Managers and leaders will learn methods for distributing workloads across cloud providers as well as ways to avoid potential pitfalls when pursuing this strategy. Understand the benefits of adopting a multicloud architecture—along with the trade-offs and short-term costs Learn how orchestration lets you manage dozens of applications across thousands of containers in a multicloud environment Explore ways to apply a consistent security policy across all cloud platforms Implement layered security that includes vulnerability scanning, API gateway deployment, and web application firewalls Delve into specific use cases for delivering web application security across all cloud providers
    Note: Online resource; Title from title page (viewed November 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...