This book uses an interdisciplinary approach to discuss international law and conflict in the Indo-Pacific region, covering topics such as maritime security, climate change and international relations. The book will be of interest to researchers in...Loe edasi...
(Ilmumisaeg: 31-Jul-2025, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781003608059)
The central theme of the book is that cybersecurity is not just an IT issue but a critical business imperative that requires involvement and oversight at the highest levels of an organization....Loe edasi...
The Digital Environment and Small States in Europe delves into how the digital revolution intersects with global security dynamics and reshapes the geopolitical landscape....Loe edasi...
Cybersecurity of the Industrial Internet of Things (IIoT) contends the critical question of how to secure IIoT systems against the intensifying risks posed by cyber threats and attacks. This book is a fundamental guide for industrial leaders and pro...Loe edasi...
Securing Talent: Building and Retaining High-Performance Cybersecurity Teams by Dr. Kevin Lynn McLaughlin, PhD, offers a comprehensive and insightful exploration into the critical role culture plays in the cybersecurity field....Loe edasi...
This book presents cutting-edge research and advancements in the rapidly evolving fields of cybersecurity, cybercrimes, and smart emerging technologies. It serves as a comprehensive reference guide for the latest trends and challenges in securing ou...Loe edasi...
Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approac...Loe edasi...
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments....Loe edasi...
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Loe edasi...
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, informat...Loe edasi...
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possib...Loe edasi...
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and Wireless Sensor Networks (WSN) technologies. It is a valuable resource for readers interested in the security and priva...Loe edasi...
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understa...Loe edasi...
In todays digital age, companies need to adopt cutting-edge artificial intelligence solutions to effectively detect and counter potential threats. This handbook brings together a team of experts to discuss insights on proactive strategies, threat m...Loe edasi...
This book delves into the interplay between algorithm design, quantum computing, human behavior, and the evolving landscape of cybersecurity regulation. It highlights the evolution in cybersecurity driven by breakthroughs in algorithmic development...Loe edasi...
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine...Loe edasi...
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standa...Loe edasi...
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, indus...Loe edasi...
This book helps to reduce risks of data loss by monitoring and controlling the flow of sensitive data via the network, email or web. This book also shows the guidance about data protection that data is not corrupted, is accessible for authorized pur...Loe edasi...