(Ilmumisaeg: 06-May-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040754757)
CISO: Evolution of a Vocation comprises three levels. The first level shares the authors personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and in CISO equivalent roles at some of Amer...Loe edasi...
(Ilmumisaeg: 06-May-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040600429)
Fire Brigades to Firewalls: A Public Safety Guide to Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The books core message is that cybersecurity isnt scary-its learnable, visual, and even fu...Loe edasi...
(Ilmumisaeg: 06-May-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040754719)
CISO: Evolution of a Vocation comprises three levels. The first level shares the authors personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and in CISO equivalent roles at some of Amer...Loe edasi...
(Ilmumisaeg: 06-May-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040600368)
Fire Brigades to Firewalls: A Public Safety Guide to Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The books core message is that cybersecurity isnt scary-its learnable, visual, and even fu...Loe edasi...
(Ilmumisaeg: 01-May-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040637883)
The New Face of Online Extremism offers an overview of cutting-edge empirical research around the intersection of extremism and the internet and addresses the challenges and opportunities faced by researchers working on online extremism. While changi...Loe edasi...
(Ilmumisaeg: 01-May-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040508039)
The New Face of Online Extremism offers an overview of cutting-edge empirical research around the intersection of extremism and the internet and addresses the challenges and opportunities faced by researchers working on online extremism. While changi...Loe edasi...
Victor Timchenko, Vladik Kreinovich, Yuriy Kondratenko
Sari: River Publishers Rapids Series in Computer Engineering and Information Science and Technology
(Ilmumisaeg: 01-May-2026, EPUB+DRM, Kirjastus: River Publishers, ISBN-13: 9788743810353)
This River Publishers Rapid monograph explores recent advances in intelligent technologies and optical computing methods for real-time decision-making systems handling large arrays of fuzzy input data. Developed through long-term collaboration betwee...Loe edasi...
Victor Timchenko, Vladik Kreinovich, Yuriy Kondratenko
Sari: River Publishers Rapids Series in Computer Engineering and Information Science and Technology
(Ilmumisaeg: 01-May-2026, PDF+DRM, Kirjastus: River Publishers, ISBN-13: 9788743810339)
This River Publishers Rapid monograph explores recent advances in intelligent technologies and optical computing methods for real-time decision-making systems handling large arrays of fuzzy input data. Developed through long-term collaboration betwee...Loe edasi...
(Ilmumisaeg: 30-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040679104)
Risk Management for Operational Technology (OT) Systems highlights the importance of applying risk assessments specifically tailored to OT environments, rather than relying solely on traditional IT-focused approaches.Conventional IT and enterprise ri...Loe edasi...
Sari: E-lemic: Routledge Critical Studies in Digital Crime, Culture and Control
(Ilmumisaeg: 30-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040716632)
This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform.Online platforms now constitute so significant a mode of wealth production that many argue a new kind of economic order - platform...Loe edasi...
Laxmi Shaw, D. Ajitha, Chinmay Chakraborty, S.M. Prabin
Sari: Advances in Computational Collective Intelligence
(Ilmumisaeg: 30-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040670705)
Internet of Things (IoT) systems create a massive attack surface with billions of connected devices that often have weak default credentials and limited security capabilities, making them easy targets for cybercriminals to exploit at scale. Compromis...Loe edasi...
(Ilmumisaeg: 30-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040573525)
Risk Management for Operational Technology (OT) Systems highlights the importance of applying risk assessments specifically tailored to OT environments, rather than relying solely on traditional IT-focused approaches.Conventional IT and enterprise ri...Loe edasi...
(Ilmumisaeg: 30-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040656693)
Artificial intelligence (AI) has become deeply embedded in modern life, with autonomous systems now controlling many crucial functions in healthcare, transportation, and industry. However, the incredible power of AI also enables new forms of manipula...Loe edasi...
Sari: E-lemic: Routledge Critical Studies in Digital Crime, Culture and Control
(Ilmumisaeg: 30-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040460412)
This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform.Online platforms now constitute so significant a mode of wealth production that many argue a new kind of economic order - platform...Loe edasi...
(Ilmumisaeg: 30-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040518496)
Artificial intelligence (AI) has become deeply embedded in modern life, with autonomous systems now controlling many crucial functions in healthcare, transportation, and industry. However, the incredible power of AI also enables new forms of manipula...Loe edasi...
Laxmi Shaw, D. Ajitha, Chinmay Chakraborty, S.M. Prabin
Sari: Advances in Computational Collective Intelligence
(Ilmumisaeg: 30-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040535240)
Internet of Things (IoT) systems create a massive attack surface with billions of connected devices that often have weak default credentials and limited security capabilities, making them easy targets for cybercriminals to exploit at scale. Compromis...Loe edasi...
(Ilmumisaeg: 29-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040580592)
Redefining Auditing in the Digital Era: Global Perspectives on Technology, Security, and Leadership explores how digital transformation is reshaping the audit profession across industries and regions. This book brings together leading scholars and pr...Loe edasi...
(Ilmumisaeg: 29-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040686270)
Redefining Auditing in the Digital Era: Global Perspectives on Technology, Security, and Leadership explores how digital transformation is reshaping the audit profession across industries and regions. This book brings together leading scholars and pr...Loe edasi...
(Ilmumisaeg: 26-Apr-2026, PDF+DRM, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662724170)
This book introduces a unified framework for control and detection that brings together concepts from the unified design of control and detection systems and extends them into a comprehensive methodology for analysing and synthesising control, fault...Loe edasi...
(Ilmumisaeg: 26-Apr-2026, EPUB+DRM, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662724170)
This book introduces a unified framework for control and detection that brings together concepts from the unified design of control and detection systems and extends them into a comprehensive methodology for analysing and synthesising control, fault...Loe edasi...
(Ilmumisaeg: 24-Apr-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798235602885)
No Ticket Left Undetected: Kerberos Attack Hunting for SOC TeamsActive Directory is the backbone of every enterprise network. Kerberos is its authentication engine. And attackers know it better than most defenders.Golden Tickets. Kerberoasting. DCSyn...Loe edasi...
(Ilmumisaeg: 23-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040817773)
This book bridges the critical gap between Enterprise Security Risk Management (ESRM) theory and practical implementation. While ESRM principles have gained widespread acceptance-particularly following ASIS Internationals endorsement-security profes...Loe edasi...
(Ilmumisaeg: 23-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040817667)
This book bridges the critical gap between Enterprise Security Risk Management (ESRM) theory and practical implementation. While ESRM principles have gained widespread acceptance-particularly following ASIS Internationals endorsement-security profes...Loe edasi...
This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.The 119 full papers inc...Loe edasi...
This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.The 119 full papers inc...Loe edasi...
(Ilmumisaeg: 22-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040914588)
ICTAR 2025 is the second international conference conducted by NSBM Green University in Sri Lanka under the theme, "e;Breaking boundaries: Breakthrough research in a changing world"e;. This is a multidisciplinary conference focuses on a diver...Loe edasi...
(Ilmumisaeg: 22-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040914625)
ICTAR 2025 is the second international conference conducted by NSBM Green University in Sri Lanka under the theme, "e;Breaking boundaries: Breakthrough research in a changing world"e;. This is a multidisciplinary conference focuses on a diver...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run an arbitrary computation on their combined inputs without compromising their privacy. Secure computation offers a theoretical solution to a vast array of problems whe...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run an arbitrary computation on their combined inputs without compromising their privacy. Secure computation offers a theoretical solution to a vast array of problems whe...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book constitutes the refereed proceedings of the 20th International Conference on Critical Information Infrastructures Security, CRITIS 2025, held in Jönköping, Sweden, during October 21–23, 2025.The 22 full papers presented in t...Loe edasi...
This book constitutes the refereed proceedings of the 20th International Conference on Critical Information Infrastructures Security, CRITIS 2025, held in Jönköping, Sweden, during October 21–23, 2025.The 22 full papers presented in t...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, PDF+DRM, Kirjastus: University of California Press, ISBN-13: 9780520425620)
Why does the problem of data privacy remain so intractable? Deep Dark Data explores how this contemporary problem begins with the ways we define and use personal data. Instead of debating how best to protect personal data, Alison Cool argues that we...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: University of California Press, ISBN-13: 9780520425620)
Why does the problem of data privacy remain so intractable? Deep Dark Data explores how this contemporary problem begins with the ways we define and use personal data. Instead of debating how best to protect personal data, Alison Cool argues that we...Loe edasi...
This book constitutes the refereed proceedings of the 18th International Conference on Software Quality, SWQD 2026, held in Vienna, Austria, during May 19–21, 2026.The Software Quality Days (SWQD) conference started in 2009 and has grown to bec...Loe edasi...
This book constitutes the refereed proceedings of the 18th International Conference on Software Quality, SWQD 2026, held in Vienna, Austria, during May 19–21, 2026.The Software Quality Days (SWQD) conference started in 2009 and has grown to bec...Loe edasi...
This book constitutes the refereed proceedings of the first International Conference on Cybersecurity, IoT, Data Science and Digital Forensics, CIDDF 2025, held in The Woodlands, Texas, USA, during October 2–4, 2025.The 13 full papers and one s...Loe edasi...
This book constitutes the refereed proceedings of the first International Conference on Cybersecurity, IoT, Data Science and Digital Forensics, CIDDF 2025, held in The Woodlands, Texas, USA, during October 2–4, 2025.The 13 full papers and one s...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, PDF+DRM, Kirjastus: De Gruyter, ISBN-13: 9783111734361)
Deepfake and image forgery technologies have advanced at an alarming rate, creating significant challenges for digital forensics and cybersecurity professionals. Beyond technical concerns, the abuse of these technologies poses profound societal risks...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: De Gruyter, ISBN-13: 9783111734330)
Deepfake and image forgery technologies have advanced at an alarming rate, creating significant challenges for digital forensics and cybersecurity professionals. Beyond technical concerns, the abuse of these technologies poses profound societal risks...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798235430815)
Master the ISC2 Certified in Cybersecurity (CC) exam with this extensive practice test collection. Whether you are starting your journey in cybersecurity or validating your foundational knowledge, this course provides the rigorous testing environment...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...