It is unclear if U.S. policy makers and military leaders fully realize that we have already been thrust into an artificial intelligence (AI) race with authoritarian powers. Today, the United States’ peer adversaries—China and Russia—have made clear t...Loe edasi...
The authors describe how to secure the weights of frontier artificial intelligence and machine learning models (that is, models that match or exceed the capabilities of the most advanced models at the time of their development)....Loe edasi...
(Ilmumisaeg: 21-Oct-2024, Paperback / softback, Kirjastus: River Publishers, ISBN-13: 9788770045971)
Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and the constant attacks from viruses, hackers, and other invasive programs. Known terrorist grou...Loe edasi...
This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and insights to navigate the complex cybersecurity talent landscape. It illuminates the nuances of various cybersecurity roles, providing...Loe edasi...
The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity professionals. This guide delves deep into the ever-changing cybersecurity landscape, providing insights into the diverse ca...Loe edasi...
(Ilmumisaeg: 25-Apr-2024, Hardback, Kirjastus: Naval Institute Press, ISBN-13: 9781612515410)
It is unclear if U.S. policy makers and military leaders fully realize that we have already been thrust into an artificial intelligence (AI) race with authoritarian powers. Today, the United States’ peer adversaries—China and Russia—have made clear t...Loe edasi...
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensi...Loe edasi...
... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber th...Loe edasi...
The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Dont We Defend Better : Data Breaches, Risk Management, and Publi...Loe edasi...
Cyber Security Management: A Governance, Risk and Compliance Framework by Peter Trim and Yang-Im Lee has been written for a wide audience. Derived from research, it places security management in a holistic context and outlines how the strategic marke...Loe edasi...
The adoption of blockchain for the value chain, insurance, and healthcare domain is flourishing. However, one of the key challenges faced in blockchain development is securing them. The book will cover essential architectural considerations, system...Loe edasi...
Cybersecurity Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book that covers the very latest security threats and defense strategies, updated for 2020....Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Publishers Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product....Loe edasi...
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverage of...Loe edasi...
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensi...Loe edasi...
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those req...Loe edasi...
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks...Loe edasi...
Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications.Real-World Bug Hunting is...Loe edasi...
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensur...Loe edasi...