Browse Results

Showing 28,976 through 29,000 of 53,282 results

Identity, Authentication, and Access Management in OpenStack

by Henry Nash Brad Topol Steve Martinelli

Keystone--OpenStack's Identity service--provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer--as well as key practices for safeguarding your cloud's ongoing security.Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after features--support for federated identity

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

by Morey J. Haber Darran Rolls

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives.As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged attacks and asset vulnerabilities. Identity Attack Vectors details the risks associated with poor identity management practices, the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises, and to develop an effective identity governance program. What You Will Learn Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vectorImplement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory complianceSee where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards to integrate key identity management technologies into a corporate ecosystemPlan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments

Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition

by Morey J. Haber Darran Rolls

Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization’s entire Identity Fabric. What You Will Learn Understand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments

Identity and Play in Interactive Digital Media: Ergodic Ontogeny (Routledge Advances in Game Studies)

by Sara M. Cole

Recent shifts in new literacy studies have expanded definitions of text, reading/viewing, and literacy itself. The inclusion of non-traditional media forms is essential, as texts beyond written words, images, or movement across a screen are becoming ever more prominent in media studies. Included in such non-print texts are interactive media forms like computer or video games that can be understood in similar, though distinct, terms as texts that are read by their users. This book examines how people are socially, culturally, and personally changing as a result of their reading of, or interaction with, these texts. This work explores the concept of ergodic ontogeny: the mental development resulting from interactive digital media play experiences causing change in personal identity.

Identity and Digital Communication: Concepts, Theories, Practices

by Rob Cover

This comprehensive text explores the relationship between identity, subjectivity and digital communication, providing a strong starting point for understanding how fast-changing communication technologies, platforms, applications and practices have an impact on how we perceive ourselves, others, relationships and bodies. Drawing on critical studies of identity, behaviour and representation, Identity and Digital Communication demonstrates how identity is shaped and understood in the context of significant and ongoing shifts in online communication. Chapters cover a range of topics including advances in social networking, the development of deepfake videos, intimacies of everyday communication, the emergence of cultures based on algorithms, the authenticities of TikTok and online communication’s setting as a site for hostility and hate speech. Throughout the text, author Rob Cover shows how the formation and curation of self-identity is increasingly performed and engaged with through digital cultural practices, affirming that these practices must be understood if we are to make sense of identity in the 2020s and beyond. Featuring critical accounts, everyday examples and analysis of key platforms such as TikTok, this textbook is an essential primer for scholars and students in media studies, psychology, cultural studies, sociology, anthropology, computer science, as well as health practitioners, mental health advocates and community members.

Identity and Data Security for Web Development: Best Practices

by Jonathan Leblanc Tim Messerschmidt

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity--without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security todayDesign security password encryption, and combat password attack vectorsCreate digital fingerprints to identify users through browser, device, and paired device detectionBuild secure data transmission systems through OAuth and OpenID ConnectUse alternate methods of identification for a second factor of authenticationHarden your web applications against attackCreate a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography

#identity: Hashtagging Race, Gender, Sexuality, and Nation

by Abigail De Kosnik Keith Feldman

Since its launch in 2006, Twitter has served as a major platform for political performance, social justice activism, and large-scale public debates over race, ethnicity, gender, sexuality, and nationality. It has empowered minoritarian groups to organize protests, articulate often-underrepresented perspectives, and form community. It has also spread hashtags that have been used to bully and silence women, people of color, and LGBTQ people. #identity is among the first scholarly books to address the positive and negative effects of Twitter on our contemporary world. Hailing from diverse scholarly fields, all contributors are affiliated with The Color of New Media, a scholarly collective based at the University of California, Berkeley. The Color of New Media explores the intersections of new media studies, critical race theory, gender and women’s studies, and postcolonial studies. The essays in #identity consider topics such as the social justice movements organized through #BlackLivesMatter, #Ferguson, and #SayHerName; the controversies around #WhyIStayed and #CancelColbert; Twitter use in India and Africa; the integration of hashtags such as #nohomo and #onfleek that have become part of everyday online vernacular; and other ways in which Twitter has been used by, for, and against women, people of color, LGBTQ, and Global South communities. Collectively, the essays in this volume offer a critically interdisciplinary view of how and why social media has been at the heart of US and global political discourse for over a decade.

Identifying the Complex Causes of Civil War: A Machine Learning Approach

by Atin Basuchoudhary James T. Bang John David Tinni Sen

This book uses machine-learning to identify the causes of conflict from among the top predictors of conflict. This methodology elevates some complex causal pathways that cause civil conflict over others, thus teasing out the complex interrelationships between the most important variables that cause civil conflict. Success in this realm will lead to scientific theories of conflict that will be useful in preventing and ending civil conflict. After setting out a current review of the literature and a case for using machine learning to analyze and predict civil conflict, the authors lay out the data set, important variables, and investigative strategy of their methodology. The authors then investigate institutional causes, economic causes, and sociological causes for civil conflict, and how that feeds into their model. The methodology provides an identifiable pathway for specifying causal models. This book will be of interest to scholars in the areas of economics, political science, sociology, and artificial intelligence who want to learn more about leveraging machine learning technologies to solve problems and who are invested in preventing civil conflict.

Identifying Product and Process State Drivers in Manufacturing Systems Using Supervised Machine Learning

by Thorsten Wuest

The book reports on a novel approach for holistically identifying the relevant state drivers of complex, multi-stage manufacturing systems. This approach is able to utilize complex, diverse and high-dimensional data sets, which often occur in manufacturing applications, and to integrate the important process intra- and interrelations. The approach has been evaluated using three scenarios from different manufacturing domains (aviation, chemical and semiconductor). The results, which are reported in detail in this book, confirmed that it is possible to incorporate implicit process intra- and interrelations on both a process and programme level by applying SVM-based feature ranking. In practice, this method can be used to identify the most important process parameters and state characteristics, the so-called state drivers, of a manufacturing system. Given the increasing availability of data and information, this selection support can be directly utilized in, e. g. , quality monitoring and advanced process control. Importantly, the method is neither limited to specific products, manufacturing processes or systems, nor by specific quality concepts.

Identification Of Research Needs Relating To Potential Biological Or Adverse Health Effects Of Wireless Communication Devices

by National Research Council of the National Academies

In recent years there has been a rapid increase in the use of wireless communications devices and a great deal of research has been carried out to investigate possible biological or human health effects resulting from their use. The U.S. Food and Drug Administration asked the National Research Council to organize a workshop to identify research needs and gaps in knowledge in the areas of dosimetry and exposure, epidemiology, human laboratory studies, mechanisms, and animal and cell biology. The workshop did not include the evaluation of health effects or the generation of recommendations relating to how identified research needs should be met. Some needs and gaps identified at the workshop include: (1) characterization of exposures from wireless devices and RF base station antennas in juveniles, children, fetuses, and pregnant women and (2) evaluation of devices that use newer technologies (e.g., texting, web-surfing).

Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction (SpringerBriefs in Computer Science)

by Hamidreza Alvari Elham Shaabani Paulo Shakarian

This book sheds light on the challenges facing social media in combating malicious accounts, and aims to introduce current practices to address the challenges. It further provides an in-depth investigation regarding characteristics of “Pathogenic Social Media (PSM),”by focusing on how they differ from other social bots (e.g., trolls, sybils and cyborgs) and normal users as well as how PSMs communicate to achieve their malicious goals. This book leverages sophisticated data mining and machine learning techniques for early identification of PSMs, using the relevant information produced by these bad actors. It also presents proactive intelligence with a multidisciplinary approach that combines machine learning, data mining, causality analysis and social network analysis, providing defenders with the ability to detect these actors that are more likely to form malicious campaigns and spread harmful disinformation. Over the past years, social media has played a major role in massive dissemination of misinformation online. Political events and public opinion on the Web have been allegedly manipulated by several forms of accounts including “Pathogenic Social Media (PSM)” accounts (e.g., ISIS supporters and fake news writers). PSMs are key users in spreading misinformation on social media - in viral proportions. Early identification of PSMs is thus of utmost importance for social media authorities in an effort toward stopping their propaganda. The burden falls to automatic approaches that can identify these accounts shortly after they began their harmful activities. Researchers and advanced-level students studying and working in cybersecurity, data mining, machine learning, social network analysis and sociology will find this book useful. Practitioners of proactive cyber threat intelligence and social media authorities will also find this book interesting and insightful, as it presents an important and emerging type of threat intelligence facing social media and the general public.

Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web

by Giovanni Bartolomeo Tatiana Kovacikova

Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collat

Ideen Für Passive Einkommen: 50 Wege um Online Geld Zu Machen Analysiert

by Michael Ezeanaka

Viele Menschen machen den Fehler, passives Einkommen mit dem schnellen Geld gleichzusetzen. Ich hoffe, dass Sie nicht denselben Fehler machen. Aus diesem Grund habe ich diesen Leitfaden über die gängigsten Möglichkeiten, passives Einkommen zu erzielen, zusammengestellt. Meine Absicht ist es, Ihnen bei der Entscheidung zu helfen, ob eine Gelegenheit für Sie geeignet ist oder nicht. Ich möchte Ihnen auch dabei helfen, die Mythen und Missverständnisse rund um diese einkommensschaffenden Methoden zu entlarven. Die Informationen und Analysen, die Sie in diesem Buch finden, beruhen auf Fakten und beobachtbaren Trends. Ich möchte sicherstellen, dass Sie auf dem richtigen Weg sind, wenn Sie sich schließlich entscheiden, einen Weg zu finden, passives Einkommen zu generieren.

Ideas That Created the Future: Classic Papers of Computer Science

by Harry R. Lewis

Classic papers by thinkers ranging from from Aristotle and Leibniz to Norbert Wiener and Gordon Moore that chart the evolution of computer science.Ideas That Created the Future collects forty-six classic papers in computer science that map the evolution of the field. It covers all aspects of computer science: theory and practice, architectures and algorithms, and logic and software systems, with an emphasis on the period of 1936-1980 but also including important early work. Offering papers by thinkers ranging from Aristotle and Leibniz to Alan Turing and Nobert Wiener, the book documents the discoveries and inventions that created today's digital world. Each paper is accompanied by a brief essay by Harry Lewis, the volume's editor, offering historical and intellectual context.

Ideas for the Animated Short: Finding and Building Stories

by Karen Sullivan Gary Schumer

Follow from start to finish the creation of an animated short from the pre-production thought process to story development and character design. Explore the best practices and avoid the common pitfalls of creating two to five minute shorts. Watch a specially created animated short, demonstrating the core techniques and principles at the companion website! Packed with illustrated examples of idea generation, character and story development, acting, dialogue and storyboarding practice this is your conceptual toolkit proven to meet the challenges of this unique art form. The companion website includes in-depth interviews with industry insiders, 18 short animations (many with accompanying animatics, character designs and environment designs) and an acting workshop to get your animated short off to a flying start! With all NEW content on script writing, acting, sound design and visual storytelling as well as stereoscopic 3D storytelling, further enhance your animated shorts and apply the industry best practices to your own projects and workflows.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Second Edition)

by Chris Eagle

<P>No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use. <P>Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage. <P>Save time and effort as you learn to: <br>–Navigate, comment, and modify disassembly <br>–Identify known library routines, so you can focus your analysis on other areas of the code <br>–Use code graphing to quickly make sense of cross references and function calls <br>–Extend IDA to support new processors and filetypes using the SDK <br>–Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more <br>–Use IDA's built-in debugger to tackle hostile and obfuscated code <P>Whether you're analyzing malware, conducting vulnerability research, or reverse engineering software, a mastery of IDA is crucial to your success. Take your skills to the next level with this 2nd edition of The IDA Pro Book.

The ID CaseBook: Case Studies in Instructional Design

by Peggy A. Ertmer James A. Quinn Krista D. Glazewski

First Published in 2017. Routledge is an imprint of Taylor & Francis, an Informa company.The Fourth Edition of this highly regarded problem-solving text presents 30 realistic case studies in a wide range of authentic contexts, from K-12 to post-secondary, corporate, and manufacturing. The cases and their accompanying discussion questions encourage ID students to analyze the available information, develop conclusions, and consider alternative possibilities in resolving ID problems.

ICWE 2021 Workshops: ICWE 2021 International Workshops, BECS and Invited Papers, Biarritz, France, May 18–21, 2021, Revised Selected Papers (Communications in Computer and Information Science #1508)

by Maxim Bakaev In-Young Ko Michael Mrissa Cesare Pautasso Abhishek Srivastava

This book constitutes the thoroughly refereed post-workshop proceedings of the 21th International Conference on Web Engineering, ICWE 2021, held in Biarritz, France, in May 2021.*The first international workshop on Big data-driven Edge Cloud Services (BECS 2021) was held to provide a venue in which scholars and practitioners can share their experiences and present on-going work on providing value-added Web services for users by utilizing big data in edge cloud environments. The 5 revised full papers and 1 revised short contribution selected from 11 submissions are presented with 2 invited papers.*The conference was held virtually due to the COVID-19 pandemic.

ICTs in Developing Countries: Research, Practices and Policy Implications

by Bidit Dey Karim Sorour Raffaele Filieri

ICTs in Developing Countries is a collection of conceptual and empirical works on the adoption and impacts of ICT use in developing societies. Bringing together a wide range of disciplines and contributors, it offers a rich examination of digital divide and ICT for development both in terms of contextual information and disciplinary perspectives.

ICTs for Improving Patients Rehabilitation Research Techniques

by Habib M. Fardoun Victor M R. Penichet Daniyal M. Alghazzawi

Thisbook constitutes the thoroughly refereed proceedings of the secondInternational Workshop on ICTs for Improving Patients Rehabilitation ResearchTechniques, REHAB 2014, held in Oldenburg, Germany, in May 2014. The 26 revised full paperspresented were carefully reviewed and selected from 69 submissions. The papersfocus on virtual and enhanced environments, covering topics such as motorrehabilitation; neuroimaging in rehabilitation; virtual rehabilitation;clinical assessment; cognitive rehabilitation; communication and language;ambisonics and audio environments; haptic devices; sensory impairment; medicalsystems; input devices; sensors and actuators; multi-user systems for userinteraction; computer access; virtual humans; balance, posture and mobility;communications aids; tools for architectural/CAD design; product design,testing and prototyping; training tools for rehabilitation; augmented realityapplications; human factors; rehabilitation robotics.

ICTs for Improving Patients Rehabilitation Research Techniques

by Habib M. Fardoun Victor M. R. Penichet Daniyal M. Alghazzawi M. Elena De la Guia

4th Workshop on ICTs for Improving Patients Rehabilitation Research Techniques Oct 13, 2016-Oct 14, 2016 Lisbon, Portugal. You can view more information about this proceeding and all of ACM#65533;s other published conference proceedings from the ACM Digital Library: http://www. acm. org/dl.

ICTs and the Millennium Development Goals

by Harleen Kaur Xiaohui Tao

This book attempts to create awareness about the UN-MDGs and how various ICT can be harnessed to appeal to different demographics. Current empirical evidence suggests that MDG awareness is relatively low particularly in developed countries, and that the levels of MDG awareness vary considerable across socioeconomic variables or demographics from United Nations perspective. It also examines how ICT can be used to bring about technical and social innovations strengthen livelihoods, support economic development, water and climate resilience and improve the education and health sectors and enhance development opportunities. Several studies are highlighted that reinforce the view that government support and private sector expertise and funding are important factors in ICT-based e-government solutions in developing countries. The book also builds on the thesis that a strong connection between competencies in mathematics, science, and information communication/technology is required to build logical concepts and critical thinking skills. It also examines the opportunities and barriers of promoting students' learning skills, including communication, cooperation, collaboration and connection using the Wiki tool under the blackboard platform. Finally, the book also highlights the challenges involved in application of ICT in education. This is significant for educators in order to surmount these obstacles and consequently successfully incorporate ICT into the educational system. The chapters present the relevant literature on ICTs and the perceived barriers to ICT integration in basic education. They also focus on the implications of incorporating ICT in the basic educational system. The challenges confronting the integration of ICT in education are equally identified with a view to ensuring a more efficient application of ICT in attaining education for all.

ICTs and Indian Social Change: Diffusion, Poverty, Governance

by Ashwani Saith M. Vijayabaskar V. Gayathri

ICTs and Indian Social Change: Diffusion, Poverty, Governance is the first book of its kind that puts together the optimistic voices of techno-idealists, critical social science perspectives on technology and a range of empirical material on the impact of Information and Communication Technologies (ICTs) on the lives of people. The book traces these processes across urban and rural spaces of work, consumption, e-governance, and highlights the new kinds of social identities they are fostering in India. It opens up an arena for dialogue between activists, technologists, policy makers and academia on using ICTs for development. The book is a logical sequel to ICTs and Indian Economic Change: Economy, Work, Regulation that addressed the implications of the growth of ICT-based sectors in India for macro-economic development and industrial efficiency. This volume views the diffusion of ICTs in India primarily in the socio cultural realm. In responding to the pioneering voices of innovators in ICTs, it provides empirical and theoretical assessments and critiques of some of the important though often latent, premises that underlie these powerful initiatives.

ICTERI 2021 Workshops: ITER, MROL, RMSEBT, TheRMIT, UNLP 2021, Kherson, Ukraine, September 28–October 2, 2021, Proceedings (Communications in Computer and Information Science #1635)

by Oleksii Ignatenko Vyacheslav Kharchenko Vitaliy Kobets Hennadiy Kravtsov Yulia Tarasich Vadim Ermolayev David Esteban Vitaliy Yakovyna Aleksander Spivakovsky

This book contains the workshops papers presented at the 17th International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications, ICTERI 2021, held in Kherson, Ukraine, in September-October 2021. The 33 revised full papers and 4 short papers included in this volume were carefully reviewed and selected from 105 initial submissions. The papers are organized according to the following workshops: ​9th International Workshop on Information Technology in Economic Research (ITER 2021); 5th International Workshop on Methods, Resources and Technologies for Open Learning and Research (MROL 2021); International Workshop RMSEBT 2021: Rigorous Methods in Software Engineering and Blockchain Technologies; 7th International Workshop on Theory of Reliability and Markov Modeling for Information Technologies (TheRMIT 2021); 1st Ukrainian Natural Language Processing Workshop (UNLP 2021).

ICT with Intelligent Applications: ICTIS 2023, Volume 1 (Lecture Notes in Networks and Systems #719)

by Jyoti Choudrie Parikshit N. Mahalle Thinagaran Perumal Amit Joshi

This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis. It presents the outcomes of the Seventh International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2023), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.

Refine Search

Showing 28,976 through 29,000 of 53,282 results