(Ilmumisaeg: 19-Aug-2025, Paperback / softback, Kirjastus: University of California Press, ISBN-13: 9780520401501)
A free ebook version of this title is available through Luminos, University of California Press’s Open Access publishing program. Visit www.luminosoa.org to learn more. Despite the massive costs a...Loe edasi...
(Ilmumisaeg: 19-Aug-2025, Hardback, Kirjastus: University of California Press, ISBN-13: 9780520422575)
Despite the massive costs associated with data breaches, ransomware, viruses, and cyberattacks, most organizations remain thoroughly unprepared to safeguard consumer data. Over the past two decades, the insurance industry has begun offering cyber in...Loe edasi...
Master system security and stability with this practical blueprint for successful patch management Key Features Explore comprehensive strategies for effective patch management Uncover tools and technologies essential for syste...Loe edasi...
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Loe edasi...
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments. It delves into how AI enhances the governance of information security by automating processes...Loe edasi...
To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the signif...Loe edasi...
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machin...Loe edasi...
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations,...Loe edasi...
This book aims to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third-party arrangements and emphasises that organisations retain account...Loe edasi...
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulatio...Loe edasi...
The aim of this book is to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data. All aspects of AI, machine learning mode...Loe edasi...
A Cybersecurity Leader’s Journey: Speaking the Language of the Board equips leaders with the skills to translate technical expertise into business-savvy communication that builds trust and drives informed decision-making. I...Loe edasi...
In today’s cybersecurity landscape, the role of a cybersecurity leader goes beyond technical expertise. Communicating cybersecurity risks and initiatives to executives and boards demands a unique blend of strategic insight and business language. ...Loe edasi...
(Ilmumisaeg: 22-Apr-2025, Hardback, Kirjastus: Thorndike Press Large Print, ISBN-13: 9781420520248)
From J.A. Jance, a writer whose thrillers are “hot and getting hotter” (Booklist), the latest in her New York Times bestselling and heart-pounding Ali Reynolds series.Chuck Brewster, the former business...Loe edasi...
Leading the Digital Workforce:Future IT leaders wont be technology leaders, theyll be business leaders who understand technology. Leading the Digital Workforce takes a fresh look at technology leadership, exploring how to lead and manage...Loe edasi...
This book enables security professionals to build a cybersecurity program from the ground up, regardless of the size of their organization. The book includes a high-level, comprehensive overview of all of the capabilities that go into a cybersecur...Loe edasi...