(Ilmumisaeg: 24-Oct-2024, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394269167)
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked: My Life and Lessons as the Worlds First Augmented Ethical Hacker by Len Noe, a pioneering cyborg with ten microc...Loe edasi...
From scandalous scams to overnight riches, fintech is a fascinating world full of fame, fortune and failure. As one of the worlds most lucrative and fast-growing sectors, fintech attracts a wide range of characters, from innovative...Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing, and governing safer digital ecosystems....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing and governing safer digital ecosystems....Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
Federated Intelligence: Unlocking Privacy-Preserving and Cyber Resilience using AI in the Finance Industry is an edited volume designed to explores how Federated Intelligence can help the finance industry defend against cyber threats, dete...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
“CISO: Evolution of a Vocation” comprises three levels. The first level shares the author’s personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and CISO-equivalent roles at som...Loe edasi...
“CISO: Evolution of a Vocation” comprises three levels. The first level shares the author’s personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and CISO-equivalent roles at some of Am...Loe edasi...
The New Face of Online Extremism offers an overview of cutting-edge empirical research around the intersection of extremism and the internet and addresses the challenges and opportunities faced by researchers working on online extremism....Loe edasi...
This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform.Online platforms now constitute so significant a mode of wealth production that many argue a new kind of economic o...Loe edasi...
Online platforms now constitute so significant a mode of wealth production that many argue a new kind of economic order - ‘platform capitalism’ has emerged. This platform has also provided a new organisational dynamic for crime. This book explores...Loe edasi...
The connected nature of devices within the Internet of Things (IoT) has ushered in unprecedented opportunities, as well as formidable challenges in ensuring robust cybersecurity. This edited book presents research and insights into practice that e...Loe edasi...
Risk Management for Operational Technology (OT) Systems highlights the importance of applying risk assessments specifically tailored to OT environments, rather than relying solely on traditional IT-focused approaches.Conventio...Loe edasi...
The rapid developments in AI mean that cyberattacks are becoming increasingly more complex and difficult to stop. Stay ahead by using AI to improve existing cybersecurity approaches and tackle these threats.Artificial Intellig...Loe edasi...
Develop the skills to stop AI-powered cyberattacks and leverage AI to improve your existing cybersecurity strategies. The rapid developments in AI mean that cyberattacks are becoming increasingly more complex and difficult to stop. Stay...Loe edasi...
Cybercrime is everywhere. A multibillion-pound industry run by wily hackers and fraudsters bankrupting businesses, stalling governments, stealing sensitive data. You could be next. Are you ready? Brilliant, original and authoritative. An...Loe edasi...
Build intelligent LLM-powered applications with agentic workflows and tool-based agents.AI-powered applications are rapidly becoming the new normal. Personal productivity assistants, coding agents, smarter search, and automated reporti...Loe edasi...
Everything you need to create neural networks with PyTorch, including Large Language and diffusion models.Deep Learning with PyTorch, Second Edition updates the bestselling original guide with new insights into the transformers...Loe edasi...
Cybersecurity in the Big Data Era is a fascinating look at the invisible fight going on under our networked lives. In a world where every heartbeat of society is mirrored in digital code, this book shows us how to protect ourselves. ...Loe edasi...
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that tran...Loe edasi...
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that tra...Loe edasi...
(Ilmumisaeg: 26-Feb-2026, Hardback, Kirjastus: Cambridge University Press, ISBN-13: 9781009518727)
Doxxing is the deliberate, unauthorized disclosure of personal information with malicious intent. It became a method of public shaming and vigilantism during the 20192020 Hong Kong protests. This Element examines doxxing as a discursive practice. It...Loe edasi...
Doxxing is the deliberate, unauthorized disclosure of personal information with malicious intent. It became a method of public shaming and vigilantism during the 20192020 Hong Kong protests. This Element examines doxxing as a discursive practice. It...Loe edasi...
Benford’s Law offers a powerful, data-driven approach to anomaly detection. Discovered 150 years ago, it wasn’t until the 1990s that auditors began harnessing its potential for identifying irregularities in financial data. Today, the Benford’s Law...Loe edasi...
Benford’s Law offers a powerful, data-driven approach to anomaly detection. Discovered 150 years ago, it wasn’t until the 1990s that auditors began harnessing its potential for identifying irregularities in financial data. Today, the Benford’s Law...Loe edasi...
When high expectations do not always match the resources at your disposal, how can small Internal Audit teams make a significant impact? This book is your essential guide to transforming the way you approach internal auditing. Professionals who le...Loe edasi...
When high expectations do not always match the resources at your disposal, how can small Internal Audit teams make a significant impact? This book is your essential guide to transforming the way you approach internal auditing. Professionals who le...Loe edasi...
Is your red team delivering genuine security value or just expensive theater? In an era where cybersecurity investments are under constant scrutiny, organizations can no longer afford to treat red teaming as a simple compliance checkbox. This book...Loe edasi...
Is your red team delivering genuine security value or just expensive theater? In an era where cybersecurity investments are under constant scrutiny, organizations can no longer afford to treat red teaming as a simple compliance checkbox. This book...Loe edasi...
Utilising 70 original interviews from rural and urban area Canadian parents, the book provides an overview of research on ‘digital parenting’ and illuminates the modern parental experience of managing children’s access to internet-connected techno...Loe edasi...
This book offers a critical analysis of cybersecurity from a legal-international point of view. It evaluates the ability of existing international law to address the threat and use of force in cyberspace, redefining cyberwar and cyberpeace for the...Loe edasi...
This book provides readers with an insightful and nuanced look at the human component of cybercrime. James MacDowell delves into the intriguing domain of forensic cyberpsychology by exploring the complex relationship between humans and technology...Loe edasi...
This book provides readers with an insightful and nuanced look at the human component of cybercrime. James MacDowell delves into the intriguing domain of forensic cyberpsychology by exploring the complex relationship between humans and technology...Loe edasi...
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life. While this integration enhances productivity and accessibility, it generates unpreceden...Loe edasi...
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life. While this integration enhances productivity and accessibility, it generates unpreceden...Loe edasi...
This title explores the growing phenomenon of cyberviolence against women, analyzing its causes, manifestations, and consequences from a multidisciplinary perspective.It aims to fill the gap in existing literature by not only diagnosing the...Loe edasi...
Cybercrime and the Autism Spectrum explores the intersection of cybercrime and the autism spectrum, offering a multidimensional perspective from a clinician, an attorney, and a technical forensic expert. With a focus on real-life anonymized...Loe edasi...
Cybercrime and the Autism Spectrum explores the intersection of cybercrime and the autism spectrum, offering a multidimensional perspective from a clinician, an attorney and a technical forensic expert. Cybercrime and the...Loe edasi...
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of...Loe edasi...
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of...Loe edasi...
This book uses a mixed-methods approach to understand the role of technology in facilitating exploitation in the UK’s off-street sex markets. It offers a critical social perspective on a truly complex social phenomenon encapsulating both online an...Loe edasi...
The all-in-one guide to ParrotOS Security that will help you get started with penetration testing and ethical hacking Key Features Familiarize yourself with Parrot Security and its user-friendly features Gain a deeper insight i...Loe edasi...
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape This book provides a...Loe edasi...
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures. In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated tech...Loe edasi...
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape This book provides a...Loe edasi...
Operation Carder Kaos offers a rare inside look at the murky world of cybercrime, where deception is currency and exposure can be deadly. Its a high-stakes, real-world thriller about betrayal, digital warfare, and the price of living two lives....Loe edasi...
Operation Carder Kaos offers a rare inside look at the murky world of cybercrime, where deception is currency and exposure can be deadly. Its a high-stakes, real-world thriller about betrayal, digital warfare, and the price of living two lives....Loe edasi...
What is intelligence-led policing? Who came up with the idea? Where did it come from? How does it relate to other policing paradigms? What distinguishes an intelligence-led approach to crime reduction? How is it designed to have an impact on crime...Loe edasi...
The revised and updated third edition of this foundational policing text includes new case studies and viewpoints, a revised crime funnel for serious crime, and a new chapter expanding on intelligence-led policing ethics and risk. W...Loe edasi...
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterror...Loe edasi...
This book analyses the cybersecurity of a cloud environment from both offensive and defensive aspects. The book will discuss emerging threats such as advanced phishing campaigns, data exfiltration, and zero-day attacks possible in the cloud environm...Loe edasi...
In a world increasingly driven by data, information has evolved from a passive commodity to a weapon of unparalleled influence. This book explores the emergence of information as a central tool in modern warfare, exposing the tactics and strategies...Loe edasi...
Mastering Cybersecurity – A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practic...Loe edasi...
Mastering Cybersecurity – A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practic...Loe edasi...
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation. ...Loe edasi...
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative. Cyberattacks on mobile platforms surge yearly, with vulnerabilities in banking, healthcare, a...Loe edasi...
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative. Cyberattacks on mobile platforms surge yearly, with vulnerabilities in banking, healthcare, a...Loe edasi...
Learn how to quickly work out what your Java code is doing so you can understand when and why it misbehaves.Searching for bugs, detangling messy legacy code, or evaluating your codebase for new features sucks up much of a developers t...Loe edasi...
This book provides a hands-on, research-driven guide to building, deploying, and understanding machine learning models tailored for securing IIoT and WSN environments. While the Industrial Internet of Things (IIoT) and Wireless Sens...Loe edasi...
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing. This book pr...Loe edasi...
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botne...Loe edasi...
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botne...Loe edasi...
Healthcare is one of the industries that has embraced and benefitted the most from improved internet connectivity and usage. Since the number of healthcare service seekers across the world is growing at a rapid pace, service providers rely on the...Loe edasi...
(Ilmumisaeg: 04-Nov-2025, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781837240319)
This book explores how AI and Explainable AI-based cybersecurity algorithms and methods are used to tackle cybersecurity challenges such as threats, intrusions and attacks to preserve data privacy and ensure trust, accountability, transparency and...Loe edasi...
This book provides a comprehensive exploration of the security challenges and solutions with the digital sustainability in the rapidly evolving digital landscape of the digital forensics. It explores into the details of protecting IoMT environments,...Loe edasi...
This unique volume presents cutting-edge research on the nature and extent of a wide range of scams, cons, frauds, and deceptive activities, including sextortion, the use of ransomware, phishing, identity theft, Ponzi schemes, online shopping frau...Loe edasi...
This book “Digital Image Forgery Detection: Techniques, Challenges and Applications” presents a comprehensive yet concise information related to image forgery detection. The increasing nu...Loe edasi...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Loe edasi...