The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments....Loe edasi...
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Loe edasi...
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine...Loe edasi...
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standa...Loe edasi...
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, indus...Loe edasi...
A Cybersecurity Leaders Journey: Speaking the Language of the Board equips leaders with the skills to translate technical expertise into business-savvy communication that builds trust and drives informed decision-making....Loe edasi...
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the best of the best on what works and what doesnt, as a CISO, in a unique storytelling format....Loe edasi...
Thoroughly revised to include the latest industry developments, the Second Edition presents a comprehensive overview of computer validation and verification principles and how to put them into practice. To provide the current best practice and guida...Loe edasi...
This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business driven risk assessments to meet the intent of Privacy and Data Protection Laws. The aim of this book is to demonstrate the use...Loe edasi...
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the cyber risk investment model and the cybersecurity risk management framework within the DevOps process....Loe edasi...
In this freshly updated edition, Barak Engel adds new sections that correspond with the chapters of the original book: security as a discipline; as a business enabler; in sales; in legal; in compliance; in technology; and as an executive function. T...Loe edasi...
The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security....Loe edasi...
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics....Loe edasi...
The book offers comprehensive coverage of the essential topics, including machine Learning and Deep Learning for cybersecurity, blockchain for cybersecurity and privacy, security engineering for Cyber-physical systems, AI and Data Analytics techniqu...Loe edasi...
This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for o...Loe edasi...
The Security Risk Handbook provides clear and comprehensive guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, audit. Packed with tools and templates, the book is...Loe edasi...
Covering cyber security and Industry 4.0 concepts from a management and operational level, this book connects the topics of Industry 4.0 and cyber security together seamlessly. It discusses both the risks and solutions of using cyber security techni...Loe edasi...
IT and cybersecurity teams have had a long-standing battle between functionality and security. To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how IT a...Loe edasi...