Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Aditya K Sood"'
Autor:
Aditya K. Sood
This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers prac
Autor:
Aditya K Sood, Michael Wiley
Publikováno v:
Network Security. 2023
Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can
Autor:
Rohit Chaturvedi, Aditya K Sood, Bharathasimha Reddy D, Ruthvik Reddy Sl, Srilekha Talluri, Amit Nagal
Publikováno v:
Computer Fraud & Security. 2021:10-15
Since the advent of Covid-19, the increase in working from home, online education and entertainment via online platforms has ramped up the number of Internet users worldwide. According to Forbes, Internet hits surged by 50-70%. 1 This phase shift cau
Publikováno v:
Network Security. 2022
Cyber attacks are occurring at an exponential rate. Adversaries are opting for advanced techniques to abuse network protocols for conducting unauthorised operations. Domain generation algorithms (DGAs) are designed by malware authors to trigger malic
This book, updated to include the latest research and developments in cloud security, is essential for security professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers. It offers practical approac
Autor:
Aditya K. Sood
This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that exist in Large Language Models (LLMs), Generative AI applications, and the AI infrastructure. The book highlights hands-on technical appro
Autor:
Aditya K. Sood
The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications.
Publikováno v:
Network Security. 2018:8-15
Improperly secured Internet of Things (IoT) devices have been commandeered by bot herders and other malicious attackers. Organisations need a way to identify and track these IoT devices, which are often brought in unofficially by users. But network a
Publikováno v:
IEEE Systems Journal. 11:415-426
Online social networks (OSNs) provide a new dimension to people's lives by giving birth to online societies. OSNs have revolutionized the human experience, but they have also created a platform for attackers to distribute infections and conduct cyber
Publikováno v:
IEEE Communications Magazine. 55:22-28
Cybercriminals deploy botnets for conducting nefarious operations on the Internet. Botnets are managed on a large scale and harness the power of compromised machines, which are controlled through centralized portals known as C&C panels. C&C panels ar