(Ilmumisaeg: 27-Apr-2023, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394173082)
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that...Loe edasi...
Since 2000, many governments, parliaments, and ministries have worked diligently to define effective guidelines that safeguard both public and private sector information systems, as well as information assets, from unwanted cyberattacks and unauth...Loe edasi...
Sari: SUNY series in Ethics and the Challenges of Contemporary Warfare
(Ilmumisaeg: 02-Jul-2023, Paperback / softback, Kirjastus: State University of New York Press, ISBN-13: 9781438491400)
Explores the effects of the cyber revolution for security in the Americas. Cybersecurity Governance in Latin America discusses how the massification of the Internet has exposed emerging democracies high-tech vulnerabilities to...Loe edasi...
(Ilmumisaeg: 27-Apr-2023, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394173082)
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that...Loe edasi...
Sari: SUNY series in Ethics and the Challenges of Contemporary Warfare
(Ilmumisaeg: 01-Jan-2023, Hardback, Kirjastus: State University of New York Press, ISBN-13: 9781438491417)
Explores the governance of cybersecurity in Latin America-- Explores the effects of the cyber revolution for security in the Americas. Cybersecurity Governance in Latin America discusses how the massification of the In...Loe edasi...
The book begins by identifying the technological features from which security issues arise. It describes how the Internet may be compromised by malware and examines some of the more common security issues. It looks at aspects of human persuasion,...Loe edasi...
This research evaluates 43 countries cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries cybersecurity public policy...Loe edasi...
This book brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations--...Loe edasi...
(Ilmumisaeg: 04-Feb-2022, Hardback, Kirjastus: Business Science Reference, ISBN-13: 9781799886938)
Brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. The book focuses on a range of top...Loe edasi...
Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that ca...Loe edasi...
(Ilmumisaeg: 08-Nov-2021, Hardback, Kirjastus: University of Toronto Press, ISBN-13: 9781487504960)
Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment. Cyber-threats are amo...Loe edasi...
(Ilmumisaeg: 08-Nov-2021, Paperback / softback, Kirjastus: University of Toronto Press, ISBN-13: 9781487523626)
Cyber-threats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro-level, and evaluates the strategic and organizational issues connected to cybersecuri...Loe edasi...
(Ilmumisaeg: 17-Sep-2021, Hardback, Kirjastus: Routledge India, ISBN-13: 9780367408015)
This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital t...Loe edasi...
(Ilmumisaeg: 17-Sep-2021, Paperback / softback, Kirjastus: Routledge India, ISBN-13: 9780367809713)
This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital tec...Loe edasi...
The cybersecurity industry has seen an investment of over 45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just t...Loe edasi...
The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of hu...Loe edasi...
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web applica...Loe edasi...
In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best...Loe edasi...
(Ilmumisaeg: 20-Aug-2010, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9780470643631)
This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive picture of the many types of Internet fraud how they ar...Loe edasi...
(Ilmumisaeg: 28-Oct-2009, Hardback, Kirjastus: Springer-Verlag New York Inc., ISBN-13: 9780387887708)
With our societys growing dependency on information technology, systems security is crucial. One of the most critical development phases of a network intrusion detection system is the feature selection one. A poorly chosen set of features may lead...Loe edasi...