eufy Security Cloud‑Backup‑Service Plus Jährlich (alle Geräte) (10 Geräte)
149.99 EUR
Durchsuchen Sie die detaillierte Karte mit umfassenden Informationen, vergleichen Sie die Preise und finden Sie die Merkmale von eufy Security Cloud‑Backup‑Service Plus Jährlich (alle Geräte) (10 Geräte), vorgeschlagen zum Preis von 149.99 EUR; gehört zur Kategorie Software; der Verkäufer ist Eufylife.com und der Hersteller ist Eufy.
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
Versandkosten: 0 EUR
Verfügbarkeit: in stock
Lieferzeit: 3 to 7 days
Zustand: new
Vergleich ähnlicher Produkte
eufy Security Cloud‑Backup‑Service Plus Monatlich (alle Geräte) (10 Geräte)
14.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
eufy Security Cloud‑Backup‑Service Basic Jährlich (1 Gerät) (1 Gerät)
44.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
eufy Security Cloud‑Backup‑Service Basic Monatlich (1 Gerät) (1 Gerät)
3.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
eufy Security Cloud‑Backup‑Service Basic Jährlich (2 Geräte) (2 Geräte)
89.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
eufy Security Cloud‑Backup‑Service Basic Jährlich (1 Gerät) Einmalkauf (1 Gerät)
44.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
eufy Security Cloud Backup Basic Jährlicher Service (10 Geräte) Einmalkauf (10 Geräte)
99.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecke Tarife, die genau auf dich zugeschnitten sind, ob für ein einzelnes eufy Gerät oder eine ganze Sicherheitsflotte von bis zu zehn Stück. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
eufy Security Cloud‑Backup‑Service Basic Monatlich (2 Geräte) (2 Geräte)
8.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
eufy Security Cloud Backup Basic Jährlicher Service (2 Geräte) Einmalkauf (2 Geräte)
89.99 EUR
Doppeltes Backup, doppelte SicherheitBenötigst du mehr Platz für Event-Videos? Abonniere eufy Security Cloud-Backup. Speichert Videos für 30 Tage. So hast du genügend Zeit, die aufgenommenen Videos zu überprüfen. Immer zugänglich, selbst wenn die Geräte offline sind. AWS Hochsichere Verschlüsselung garantiert, dass deine Daten stets geschützt und nur für dich einsehbar sind. Entdecken Sie Pläne, die auf Ihre Bedürfnisse zugeschnitten sind, egal ob für ein einzelnes eufy-Gerät oder alle Geräte. Für den Schutz mehrerer Geräte benötigst du ein Paket, das diesen unterstützt. Das gleiche Paket erneut zu kaufen, verlängert nur den Dienst für das ursprüngliche Gerät.
Springer Berlin Heidelberg Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
160.49 EUR
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
Springer Berlin Heidelberg Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
160.49 EUR
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
Springer Berlin Heidelberg Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
117.69 EUR
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
Springer International Publishing Security with Intelligent Computing and Big-Data Services 2019
160.49 EUR
This book aims to attract researchers and practitioners who are working in Information Technology and Computer Science. This edited book is about basics and high level concepts regarding Blockchain Technology and Application, Multimedia Security, Information Processing, Security of Network, Cloud and IoT, Cryptography and Cryptosystem, Learning and Intelligent Computing, Information Hiding. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure and privacy-aware mechanisms in high performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security related areas. We believe that this volume not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas.
Springer International Publishing Security with Intelligent Computing and Big-Data Services 2019
117.69 EUR
This book aims to attract researchers and practitioners who are working in Information Technology and Computer Science. This edited book is about basics and high level concepts regarding Blockchain Technology and Application, Multimedia Security, Information Processing, Security of Network, Cloud and IoT, Cryptography and Cryptosystem, Learning and Intelligent Computing, Information Hiding. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure and privacy-aware mechanisms in high performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security related areas. We believe that this volume not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas.
Springer Nature Singapore Security and Data Storage Aspect in Cloud Computing
85.59 EUR
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
Springer International Publishing Cloud Computing and Big Data: Technologies, Applications and Security
267.49 EUR
This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data. Cloud computing, which can be seen as any subscription-based or pay-per-use service that extends the Internet’s existing capabilities, has gained considerable attention from both academia and the IT industry as a new infrastructure requiring smaller investments in hardware platforms, staff training, or licensing software tools. It is a new paradigm that has ushered in a revolution in both data storage and computation. In parallel to this progress, Big Data technologies, which rely heavily on cloud computing platforms for both data storage and processing, have been developed and deployed at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy. Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. They involve and impact a host of fields, including business, scientific research, and public and private administration. Gathering extended versions of the best papers presented at the Third International Conference on Cloud Computing Technologies and Applications (CloudTech’17), this book offers a valuable resource for all Information System managers, researchers, students, developers, and policymakers involved in the technological and application aspects of cloud computing and Big Data.
Springer Berlin Heidelberg Security, Privacy and Trust in Cloud Systems
85.59 EUR
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.
Springer New York Security for Cloud Storage Systems
42.79 EUR
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.
Springer International Publishing Cloud Computing and Big Data: Technologies, Applications and Security
203.29 EUR
This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data. Cloud computing, which can be seen as any subscription-based or pay-per-use service that extends the Internet’s existing capabilities, has gained considerable attention from both academia and the IT industry as a new infrastructure requiring smaller investments in hardware platforms, staff training, or licensing software tools. It is a new paradigm that has ushered in a revolution in both data storage and computation. In parallel to this progress, Big Data technologies, which rely heavily on cloud computing platforms for both data storage and processing, have been developed and deployed at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy. Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. They involve and impact a host of fields, including business, scientific research, and public and private administration. Gathering extended versions of the best papers presented at the Third International Conference on Cloud Computing Technologies and Applications (CloudTech’17), this book offers a valuable resource for all Information System managers, researchers, students, developers, and policymakers involved in the technological and application aspects of cloud computing and Big Data.
Springer Berlin Heidelberg Security, Privacy and Trust in Cloud Systems
106.99 EUR
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.
Springer New York Security for Cloud Storage Systems
32.09 EUR
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.
Springer Nature Singapore Security and Data Storage Aspect in Cloud Computing
106.99 EUR
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
Springer Berlin Heidelberg Security, Privacy and Trust in Cloud Systems
106.99 EUR
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.
Springer Fachmedien Wiesbaden Secure ICT Service Provisioning for Cloud, Mobile and Beyond
32.09 EUR
This book introduces a reference architecture that enhances the security of services offered in the information and communication technology (ICT) market. It enables customers to compare offerings and to assess risks when using third-party ICT services including cloud computing and mobile services. Service providers are given a comprehensive blueprint for security implementation and maintenance covering service portfolio management, bid phases and realization projects as well as service delivery management. The architecture is completely modular and hierarchical. It contains a security taxonomy organizing all aspects of modern industrialized ICT production. The book also describes a wealth of security measures derived from real-world challenges in ICT production and service management.
omajin Wireless Security Camera - 2er-Set
201.95 EUR
Die Vorteile des Produktes im Überblick: Kabellos und mit wenigen Handgriffen installiert 2K-Auflösung für gestochen scharfe Bilder Zwei-Wege-Kommunikation und Personenerkennung Lokaler- und Cloud-Speicher plus Nachtsicht Bequeme App- und Sprachsteuerung
ESET Smart Security Premium
170 EUR
ESET Liveguard Dieser spezifische Service erkennt und verhindert selbst unbekannte Gefahren. Erkennt verschiedene Arten von Dateien, einschließlich Dokumente, Skripte, Installationsprogramme und ausführbare Dateien. Verdächtige Dateien werden in einer sicheren Sandbox-Umgebung innerhalb der ESET HQ-Cloud ausgeführt. ESET Smart Security Premium Diese App hilft dir deine Passwörter zu speichern, Formulare automatisch auszufüllen und sehr stark verschlüsselte Passwörter zu generieren um deine Accounts und Daten zu schützen. Hocheffiziente Verschlüsselung Verschlüsselt Ihre Dateie...
ESET Smart Security Premium
90 EUR
ESET Liveguard Dieser spezifische Service erkennt und verhindert selbst unbekannte Gefahren. Erkennt verschiedene Arten von Dateien, einschließlich Dokumente, Skripte, Installationsprogramme und ausführbare Dateien. Verdächtige Dateien werden in einer sicheren Sandbox-Umgebung innerhalb der ESET HQ-Cloud ausgeführt. ESET Smart Security Premium Diese App hilft dir deine Passwörter zu speichern, Formulare automatisch auszufüllen und sehr stark verschlüsselte Passwörter zu generieren um deine Accounts und Daten zu schützen. Hocheffiziente Verschlüsselung Verschlüsselt Ihre Dateie...
ESET Smart Security Premium
235 EUR
ESET Liveguard Dieser spezifische Service erkennt und verhindert selbst unbekannte Gefahren. Erkennt verschiedene Arten von Dateien, einschließlich Dokumente, Skripte, Installationsprogramme und ausführbare Dateien. Verdächtige Dateien werden in einer sicheren Sandbox-Umgebung innerhalb der ESET HQ-Cloud ausgeführt. ESET Smart Security Premium Diese App hilft dir deine Passwörter zu speichern, Formulare automatisch auszufüllen und sehr stark verschlüsselte Passwörter zu generieren um deine Accounts und Daten zu schützen. Hocheffiziente Verschlüsselung Verschlüsselt Ihre Dateie...
Apress Cyber Security on Azure
46.99 EUR
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. What You'll Learn This book provides step-by-step guidance on how to: Support enterprise security policies Improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures Who This Book Is For IT, cloud, and security administrators; CEOs, CIOs, and other business professionals
Apress Azure Security Handbook
64.19 EUR
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization. This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigueand confusion. Throughout the book you will learn how to secure your applications using Azure’s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure. What You Will Learn Remediate security risks of Azure applications by implementing the right security controls at the right time Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations Protect the most common reference workloads according to security best practices Design secure access control solutions for your Azure administrative access, as well as Azure application access Who This Book Is For Cloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise.
Apress Azure Security Handbook
49.99 EUR
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization. This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigueand confusion. Throughout the book you will learn how to secure your applications using Azure’s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure. What You Will Learn Remediate security risks of Azure applications by implementing the right security controls at the right time Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations Protect the most common reference workloads according to security best practices Design secure access control solutions for your Azure administrative access, as well as Azure application access Who This Book Is For Cloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise.
Apress Cloud Computing with AWS
64.19 EUR
Embark on a ground-up journey to cloud computing and the Amazon Web Services (AWS) eco-system, including all the other systems, services, and the security associated with it. This book provides you with the practical know-how to become an AWS Cloud practitioner. Your exploration will take you from key fundamentals of identity and access, storage, networking, architectures, databases, security and compute services all the way through to more advanced topics. The book is organized into easy-to-follow and engaging chapters with simple examples to make complex concepts very easy to understand followed by simple step-by-step demonstrations and case studies to make you proficient in every area of AWS. You'll manage databases in your on-prem data centers and set up, operate, and scale relational database in the cloud. All the services and resources taught in this book come from the AWS Free Tier, so you will not have to pay anything to use andlearn from this book. What You'll Learn Understand key concepts and benefits of cloud computing Employ key cloud computing models and services Review the concept of virtual machines in a cloud computing context Study compute services that meet your requirements Who This Book Is For IT professionals looking to change their domain to cloud computing as well as those who are looking to utilize AWS for their systems and projects.
Springer International Publishing Trusted Cloud Computing
53.49 EUR
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on “Security and Privacy”, “Software Engineering and Software Quality”, “Platforms, Middleware and Integration”, and “Social Aspects, Business Models and Standards”. It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.
Apress Cloud Computing with AWS
49.99 EUR
Embark on a ground-up journey to cloud computing and the Amazon Web Services (AWS) eco-system, including all the other systems, services, and the security associated with it. This book provides you with the practical know-how to become an AWS Cloud practitioner. Your exploration will take you from key fundamentals of identity and access, storage, networking, architectures, databases, security and compute services all the way through to more advanced topics. The book is organized into easy-to-follow and engaging chapters with simple examples to make complex concepts very easy to understand followed by simple step-by-step demonstrations and case studies to make you proficient in every area of AWS. You'll manage databases in your on-prem data centers and set up, operate, and scale relational database in the cloud. All the services and resources taught in this book come from the AWS Free Tier, so you will not have to pay anything to use andlearn from this book. What You'll Learn Understand key concepts and benefits of cloud computing Employ key cloud computing models and services Review the concept of virtual machines in a cloud computing context Study compute services that meet your requirements Who This Book Is For IT professionals looking to change their domain to cloud computing as well as those who are looking to utilize AWS for their systems and projects.
Springer International Publishing Trusted Cloud Computing
53.49 EUR
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on “Security and Privacy”, “Software Engineering and Software Quality”, “Platforms, Middleware and Integration”, and “Social Aspects, Business Models and Standards”. It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.
Apress Cloud Defense Strategies with Azure Sentinel
69.54 EUR
Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender's many security layers. This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement. After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel. What You Will Learn Understand Azure Sentinel technical benefits and functionality Configure to support incident response Integrate with Azure Security standards Be aware of challenges and costs for the Azure log analytics workspace Who This Book Is For Security consultants, solution architects, cloud security architects, and IT security engineers
Springer International Publishing Trusted Cloud Computing
42.79 EUR
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on “Security and Privacy”, “Software Engineering and Software Quality”, “Platforms, Middleware and Integration”, and “Social Aspects, Business Models and Standards”. It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.
Apress Cloud Defense Strategies with Azure Sentinel
54.99 EUR
Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender's many security layers. This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement. After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel. What You Will Learn Understand Azure Sentinel technical benefits and functionality Configure to support incident response Integrate with Azure Security standards Be aware of challenges and costs for the Azure log analytics workspace Who This Book Is For Security consultants, solution architects, cloud security architects, and IT security engineers
omajin Wireless Security camera - Weiß
103.77 EUR
Die Vorteile des Produktes im Überblick: Kabellos und mit wenigen Handgriffen installiert 2K-Auflösung für gestochen scharfe Bilder Zwei-Wege-Kommunikation und Personenerkennung Lokaler- und Cloud-Speicher plus Nachtsicht Bequeme App- und Sprachsteuerung