Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
581,619
result(s) for
"DATA SECURITY"
Sort by:
Facing cyber threats head on : protecting yourself and your business
\"Facing Cyber Threats Head On explains battle against hackers as a fight between people, not technologies. Brian Minick offers a new approach to defending against cyber attacks, one that balances business risk with the cost of creating defenses that can change as quickly and often as attackers can.\"-- Provided by publisher.
Correction: Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls
2022
[This corrects the article DOI: 10.1371/journal.pone.0208857.].[This corrects the article DOI: 10.1371/journal.pone.0208857.].
Journal Article
Introduction to computer and network security : navigating shades of gray
\"This text provides a classroom-tested, practical introduction to software design and implementation, cryptographic tools, and networking issues while addressing social, economic, and political implications. It covers cutting-edge topics, such as wireless security and attacks on websites, privacy and digital rights management, and recent work on security and economics. The text includes hands-on projects to help students better understand how computers and networks function. It also contains a number of case studies and discussion points\"-- Provided by publisher.
SQL Injection Strategies
by
Galluccio, Ettore
,
Lombari, Gabriele
,
Caselli, Edoardo
in
Computer security
,
COMPUTERS / Security / General
,
Database management
2020,2024
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacks
Key Features
* Understand SQL injection and its effects on websites and other systems
* Get hands-on with SQL injection using both manual and automated tools
* Explore practical tips for various attack and defense strategies relating to SQL injection
Book Description
SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective.
You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks.
By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
What you will learn
* Focus on how to defend against SQL injection attacks
* Understand web application security
* Get up and running with a variety of SQL injection concepts
* Become well-versed with different SQL injection scenarios
* Discover SQL injection manual attack techniques
* Delve into SQL injection automated techniques
Who this book is for
This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. No prior knowledge of SQL injection is needed to get started with this book.
Cybersecurity Blue Team toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as Ping, Tracert, PuTTY, PathPing, Sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Wireshark, Solarwinds Kiwi, Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions - Straightforward explanations of the theory behind cybersecurity best practices - Designed to be an easily navigated tool for daily use - Includes training appendix on Linux, how to build a virtual lab and glossary of key terms. The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.
Building Trust in Fintech: An Analysis of Ethical and Privacy Considerations in the Intersection of Big Data, AI, and Customer Trust
by
Aldboush, Hassan H. H.
,
Ferdous, Marah
in
Artificial intelligence
,
artificial intelligence (AI)
,
Bank technology
2023
This research paper explores the ethical considerations in using financial technology (fintech), focusing on big data, artificial intelligence (AI), and privacy. Using a systematic literature-review methodology, the study identifies ethical and privacy issues related to fintech, including bias, discrimination, privacy, transparency, justice, ownership, and control. The findings emphasize the importance of safeguarding customer data, complying with data protection laws, and promoting corporate digital responsibility. The study provides practical suggestions for companies, including the use of encryption techniques, transparency regarding data collection and usage, the provision of customer opt-out options, and the training of staff on data-protection policies. However, the study is limited by its exclusion of non-English-language studies and the need for additional resources to deepen the findings. To overcome these limitations, future research could expand existing knowledge and collect more comprehensive data to better understand the complex issues examined.
Journal Article
Security Governance of Data Element Circulation: System Architecture and Practical Approach
by
MA Lecun, PEI Lei, LI Baiyang
in
data elements|data security|data flows|governance systems|security risks
2024
[Purpose/Significance] Research on the governance system and policy of data elements circulation is an important issue to be solved in the field of data governance in China at present, and research on the policy formulation and governance system of its circulation plays an important role in grasping the security of data circulation in China and promoting the market-oriented allocation of data elements. [Method/Process] First, this study is based on the reality of China's data factor market security and trustworthy, autonomous and controllable requirements. Based on the analysis of the security risk of data circulation, we put forward the data factor market risk governance countermeasures of the \"security-fairness-efficiency\" triangular structure. Then, based on the three-level system and five-dimensional standards of data factor market governance, we put forward the method of docking the security governance with the trusted ecosystem and the international data governance rule system for cross-border data flow, and constructed a governance system with Chinese characteristics for the national unified data factor market. [Results/Conclusions] Facing the security risks in data sovereignty, data market and data circulation, we should identify and monitor data sovereignty disputes and the operation situation of the circulation market, and establish a multi-party cooperative and joint governance model led by the government, operated by the platform owner, the main body of the enterprise and the participation of users. When assessing the market for data elements, a mixed assessment approach should be adopted, combining qualitative and quantitative aspects, combining expert opinion with objective data, and comparing objectives with results. For different types of data, the control boundaries and scope of use should be clarified in a hierarchical manner, and data ownership, use and income should be clarified; at the same time, a confirmation platform of data rights should be established to audit and register and certify the data service subject, data circulation process, and data circulation rules so as to ensure that the normative nature of data circulation is maintained.
Journal Article
Security analytics : a data centric approach to information security
\"The book gives useful insight on various machine learning techniques for cyber security analytics. Nowadays around 98% objects and devices are connected with the outside world through sensors and actuators. They are increasingly networked with one another and on the internet.This book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security. It also aids to plunge into a career in cybersecurity to even the unlearned. This book also expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. It also expounds on how to analyse in order to recover information after a cybercrime\"-- Provided by publisher.
A Secure Medical Data Framework Integrating Blockchain and Edge Computing: An Attribute-Based Signcryption Approach
by
Zheng, Zhiming
,
Qiu, Wangjie
,
Ge, Chunxia
in
Access control
,
attribute-based signcryption
,
Blockchain
2025
With the rapid digitization of healthcare information, ensuring the security and privacy of patient data has become a critical research focus. This study introduces a novel Attribute-Based Signcryption (ABSC) framework combining blockchain and edge computing technologies to efficiently and securely manage medical data. The framework collects data via smart devices, which is then processed and encrypted at edge nodes and stored securely on the blockchain. Access to sensitive information is controlled with precision by predefined attribute sets, ensuring that only authorized users can retrieve the data. The experimental results demonstrate the significant advantages of this framework in improving data security, reducing computational overhead, and enhancing access efficiency.
Journal Article