(Ilmumisaeg: 24-Oct-2024, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394269167)
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked: My Life and Lessons as the Worlds First Augmented Ethical Hacker by Len Noe, a pioneering cyborg with ten microc...Loe edasi...
From scandalous scams to overnight riches, fintech is a fascinating world full of fame, fortune and failure. As one of the worlds most lucrative and fast-growing sectors, fintech attracts a wide range of characters, from innovative...Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing, and governing safer digital ecosystems....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing and governing safer digital ecosystems....Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
Federated Intelligence: Unlocking Privacy-Preserving and Cyber Resilience using AI in the Finance Industry is an edited volume designed to explores how Federated Intelligence can help the finance industry defend against cyber threats, dete...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
“CISO: Evolution of a Vocation” comprises three levels. The first level shares the author’s personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and CISO-equivalent roles at som...Loe edasi...
“CISO: Evolution of a Vocation” comprises three levels. The first level shares the author’s personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and CISO-equivalent roles at some of Am...Loe edasi...
The New Face of Online Extremism offers an overview of cutting-edge empirical research around the intersection of extremism and the internet and addresses the challenges and opportunities faced by researchers working on online extremism....Loe edasi...
This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform.Online platforms now constitute so significant a mode of wealth production that many argue a new kind of economic o...Loe edasi...
Online platforms now constitute so significant a mode of wealth production that many argue a new kind of economic order - ‘platform capitalism’ has emerged. This platform has also provided a new organisational dynamic for crime. This book explores...Loe edasi...
The connected nature of devices within the Internet of Things (IoT) has ushered in unprecedented opportunities, as well as formidable challenges in ensuring robust cybersecurity. This edited book presents research and insights into practice that e...Loe edasi...
Risk Management for Operational Technology (OT) Systems highlights the importance of applying risk assessments specifically tailored to OT environments, rather than relying solely on traditional IT-focused approaches.Conventio...Loe edasi...
The rapid developments in AI mean that cyberattacks are becoming increasingly more complex and difficult to stop. Stay ahead by using AI to improve existing cybersecurity approaches and tackle these threats.Artificial Intellig...Loe edasi...
Develop the skills to stop AI-powered cyberattacks and leverage AI to improve your existing cybersecurity strategies. The rapid developments in AI mean that cyberattacks are becoming increasingly more complex and difficult to stop. Stay...Loe edasi...
Cybercrime is everywhere. A multibillion-pound industry run by wily hackers and fraudsters bankrupting businesses, stalling governments, stealing sensitive data. You could be next. Are you ready? Brilliant, original and authoritative. An...Loe edasi...