Chatterjee, 2020 - Google Patents
Red Hat and IT SecurityChatterjee, 2020
- Document ID
- 12562777366239019462
- Author
- Chatterjee R
- Publication year
External Links
Snippet
This book is intended for IT professionals in the domains of network and system administration, IT infrastructure, cybersecurity, DevOps, CISO, and similar profiles. Security is, more often than not, a neglected aspect in the IT industry. Organizations fail to realize the …
- 238000000034 method 0 description 85
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7369501B2 (en) | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence | |
| US12126643B1 (en) | Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment | |
| Mather et al. | Cloud security and privacy: an enterprise perspective on risks and compliance | |
| US11429727B2 (en) | Static security scanner for applications in a remote network management platform | |
| KR20220024758A (en) | Discovery and mapping of cloud-based authentication, authorization, and user management services | |
| US10063429B2 (en) | Systems and methods for optimizing computer network operations | |
| US12323449B1 (en) | Code analysis feedback loop for code created using generative artificial intelligence (‘AI’) | |
| US12309185B1 (en) | Architecture for a generative artificial intelligence (AI)-enabled assistant | |
| US11494488B2 (en) | Security incident and event management use case selection | |
| Diogenes et al. | Microsoft Azure security center | |
| Chatterjee | Red Hat and IT Security | |
| Sood | Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks | |
| Rahalkar | Certified Ethical Hacker (CEH) Foundation Guide | |
| Dunkerley et al. | Mastering Windows Security and Hardening | |
| Mytilinakis | Attack methods and defenses on Kubernetes | |
| Ots | Azure Security Handbook | |
| Priyam | Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack | |
| Modi | Azure for Architects: Implementing cloud design, DevOps, containers, IoT, and serverless solutions on your public cloud | |
| Vora | Enterprise cloud security and governance: efficiently set data protection and privacy principles | |
| Chatterjee | Security in devops and automation | |
| D'Agostino | Data Security in Cloud Computing, Volume I | |
| Smith | DevOps for the desperate: a hands-on survival guide | |
| Copeland | Cyber Security on Azure | |
| Balaganski | API Security Management | |
| Sandbu | Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender |