Computer and cyber security: principles, algorithm, applications, and perspectives BB Gupta CRC Press, 2018 | 187 | 2018 |
Handbook of computer networks and cyber security BB Gupta, GM Perez, DP Agrawal, D Gupta Springer 10, 978-3, 2020 | 110 | 2020 |
Decentralized identity using blockchain D Gupta https://venturebeat.com/datadecisionmakers/decentralized-identity-using …, 2022 | 2 | 2022 |
The Future of Password Managers and How AI Will Change The Game D Gupta https://guptadeepak.com/the-future-of-password-managers-and-how-ai-will …, 2022 | | 2022 |
Cyber Attack - The Anatomy of an Average Hack and The Most Common Entry Points D Gupta https://guptadeepak.com/cyber-attack-the-anatomy-of-an-average-hack-and-the …, 2022 | | 2022 |
Why Enterprises Should Shift Priorities Concerning Data Privacy D Gupta https://www.forbes.com/sites/forbestechcouncil/2022/08/01/why-enterprises …, 2022 | | 2022 |
Why is Data Privacy an Immediate Enterprise Priority? D Gupta https://guptadeepak.com/why-is-data-privacy-an-immediate-enterprise-priority/, 2022 | | 2022 |
Data Privacy: What Enterprises Need to Know? D Gupta https://www.amazon.com/Data-Privacy-What-Enterprises-Need-ebook/dp/B0B5XPD468/, 2022 | | 2022 |
5 data privacy imperatives for enterprise leaders D Gupta https://venturebeat.com/datadecisionmakers/5-data-privacy-imperatives-for …, 2022 | | 2022 |
Navigating a Corporate Data Breach D Gupta https://guptadeepak.com/navigating-a-corporate-data-breach/, 2022 | | 2022 |
It's a Jungle in the Cloud: Why Serverless Is The Next Big Thing For Developers D Gupta https://guptadeepak.com/its-a-jungle-in-the-cloud-why-serverless-is-the-next …, 2022 | | 2022 |
Cyber Security Working From Home D Gupta https://guptadeepak.com/cyber-security-working-from-home/, 2022 | | 2022 |
How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access D Gupta https://guptadeepak.com/how-to-use-multi-factor-authentication-when-you-dont …, 2022 | | 2022 |
Phishing Attacks: How to Identify & Avoid Phishing Scams D Gupta https://guptadeepak.com/phishing-attacks-how-to-identify-avoid-phishing-scams/, 2022 | | 2022 |
How Open Source Is Fueling the Future of Data Sovereignty and Digital Autonomy? D Gupta https://guptadeepak.com/how-open-source-is-fueling-the-future-of-data …, 2022 | | 2022 |
Corporate Account Takeover Attacks: Detecting and Preventing it D Gupta https://guptadeepak.com/corporate-account-takeover-attacks-detecting-and …, 2022 | | 2022 |
What is lazy registration and how it is solving the problem of early registration D Gupta https://guptadeepak.com/what-is-lazy-registration-and-how-it-is-solving-the …, 2022 | | 2022 |
Credential Stuffing: How To Detect And Prevent It D Gupta https://guptadeepak.com/credential-stuffing-how-to-detect-and-prevent-it …, 2022 | | 2022 |
Use of blockchain technology could increase human trust in AI D Gupta https://guptadeepak.com/use-of-blockchain-technology-could-increase-human …, 2022 | | 2022 |
Use of blockchain technology could increase human trust in AI D Gupta https://venturebeat.com/datadecisionmakers/use-of-blockchain-technology …, 2021 | | 2021 |