Month: April 2020

https://editorialia.com/wp-content/uploads/2020/04/iii_congreso_auditorc38da_y_grc_the_bible_ai.jpg

III CONGRESO AUDITORÍA Y GRC (ISACA Madrid Chapter)

Este congreso, motivado por la creciente sensibilidad de las compañías en materia de Gobierno, Riesgo y Cumplimiento, se enfoca en generar una visión global de los procesos, gestión de riesgos, fraude, control interno y cumplimiento normativo y legislativo, sin dejar de lado la metodología y ejecución de revisiones y auditorías de los mismos

https://editorialia.com/wp-content/uploads/2020/04/e74ee944-e7de-480c-9b60-665e97c78261.png

Encrypted Traffic Analysis

This report explores the current state of affairs in Encrypted Traffic Analysis and in particular discusses research and methods in 6 key use cases; viz. application identification, network analytics, user information identification, detection of encrypted malware, file/device/website/location fingerprinting and DNS tunnelling detection.

https://editorialia.com/wp-content/uploads/2020/06/scipy-programming-succinctly.jpg

SciPy Programming Succinctly

The SciPy library, accompanied by its interdependent NumPy, offers Python programmers advanced functions that work with arrays and matrices. Each section presents a complete demo program for programmers to experiment with, carefully chosen examples to best illustrate each function, and resources for further learning. Use this e-book to install and edit SciPy, and use arrays, matrices, and combinatorics in Python programming.

https://editorialia.com/wp-content/uploads/2020/06/data-structures-succinctly-part-2.jpg

Data Structures Succinctly Part 2

Data Structures Succinctly Part 2 is your concise guide to skip lists, hash tables, heaps, priority queues, AVL trees, and B-trees. As with the first book, you’ll learn how the structures behave, how to interact with them, and their performance limitations. Starting with skip lists and hash tables, and then moving to complex AVL trees and B-trees, author Robert Horvick explains what each structure’s methods and classes are, the algorithms behind them, and what is necessary to keep them valid.

https://editorialia.com/wp-content/uploads/2020/04/cmglee_cambridge_science_festival_2015_da_vinci.jpg

The need for a system view to regulate artificial intelligence/machine learning-based software as medical device

FDA need to widen their scope from evaluating medical AI/ML-based products to assessing systems. This shift in perspective—from a product view to a system view—is central to maximizing the safety and efficacy of AI/ML in health care, but it also poses significant challenges for agencies like the FDA who are used to regulating products, not systems. We offer several suggestions for regulators to make this challenging but important transition

https://editorialia.com/wp-content/uploads/2020/06/data-structuressuccinctly-part-1.jpg

Data Structures Succinctly Part 1

Data Structures Succinctly Part 1 is your first step to a better understanding of the different types of data structures, how they behave, and how to interact with them. Starting with simple linked lists and arrays, and then moving to more complex structures like binary search trees and sets, author Robert Horvick explains what each structure’s methods and classes are and the algorithms behind them. Horvick goes a step further to detail their operational and resource complexity, ensuring that you have a clear understanding of what using a specific data structure entails.

https://editorialia.com/wp-content/uploads/2020/04/when-autonomous-vehicles-are-hacked-who-is-liable.jpg

When Autonomous Vehicles Are Hacked, Who Is Liable?

Who might face civil liability if autonomous vehicles (AVs) are hacked to steal data or inflict mayhem, injuries, and damage? How will the civil justice and insurance systems adjust to handle such claims? RAND researchers addressed these questions to help those in the automotive, technology, legal, and insurance industries prepare for the shifting roles and responsibilities that the era of AVs may bring.

https://editorialia.com/wp-content/uploads/2020/04/logo_cyber_security.png

Free Cybersecurity Training

Provides instruction in the basic of network security in depth. Includes security objectives, security architecture, security models and security layers; risk management, network security policy, and security training. Includes the give security keys, confidentiality integrity, availability, accountability and auditability. Lecture 3 hours per week.

https://editorialia.com/wp-content/uploads/2020/06/standardisation-in-support-of-the-cybersecurity-certification.jpg

Standardisation in support of the Cybersecurity Certification

The document presents the value of the cybersecurity standardisation efforts for certification, the roles and responsibilities of Standards Developing Organisations (SDOs) in this context, and discusses various ways how standardisation can support efficiently the process of certification schemes creation by following a step by step methodology.