(Ilmumisaeg: 24-Oct-2024, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394269167)
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked: My Life and Lessons as the Worlds First Augmented Ethical Hacker by Len Noe, a pioneering cyborg with ten microc...Loe edasi...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Loe edasi...
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Loe edasi...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Loe edasi...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Loe edasi...
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersecurity for business analytics. This book explores addressing the growing need for insights and practical...Loe edasi...
(Ilmumisaeg: 01-Oct-2025, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781837240319)
This book explores how AI and Explainable AI-based cybersecurity algorithms and methods are used to tackle cybersecurity challenges such as threats, intrusions and attacks to preserve data privacy and ensure trust, accountability, transparency and c...Loe edasi...
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Loe edasi...
Designed for professionals, researchers, and decision-makers, this book emphasizes that understanding and leveraging AI in cybersecurity is not just advantageous—it is essential for building robust, future-proof defenses in a world where digital s...Loe edasi...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. Traditiona...Loe edasi...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep di...Loe edasi...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our time—digital security. The internet wasn’t built for time travelers. But when et...Loe edasi...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our time—digital security. The internet wasn’t built for time travelers. But when et...Loe edasi...
Artificial Intelligence (AI) has revolutionized digital forensics, bringing previously unheard-of powers to this field. This book explores the advancements, applications, challenges, and solutions that AI brings to the realm of digital forensics....Loe edasi...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internet’s evolution - from its humble, stat...Loe edasi...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internet’s evolution - from its humble, stat...Loe edasi...
This book takes a fresh look at the psychology of cybersecurity and IT management, discussing the role of cognitive bias and human factors on poor decisions. The book considers the psychology and motivations of those involved with cybersecurity bo...Loe edasi...
This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and IT management, discussing the role of cognitive bias and human factors on critical decisions.Written by an experienced CISO and an academic w...Loe edasi...
This book aims to describe and demystify what makes organized criminal groups so culturally powerful. It examines their codes of conduct, initiation rites, secret communication methods, origin myths, symbols, and lifestyles that imbue them with the...Loe edasi...
This book aims to describe and demystify what makes organized criminal groups so culturally powerful. This new edition examines their codes of conduct, initiation rites, secret communication methods, origin myths, symbols, and lifestyles, and serv...Loe edasi...
This book comprehensively examines the rapidly changing tactics and technologies used to combat crime. The authors delve into the intricacies of how scientific methodologies and technological advancements are employed to investigate and prevent va...Loe edasi...
This book comprehensively examines the rapidly changing tactics and technologies used to combat crime. The authors delve into the intricacies of how scientific methodologies and technological advancements are employed to investigate and prevent va...Loe edasi...
The main purpose of this book is to analyze and evaluate what has been carried out regarding NATO’s operational arrangements and its Cyber Defense approach, and, secondly, to explain this in the lens of Game Theory. ...Loe edasi...
The main purpose of this book is to analyze and evaluate what has been carried out regarding NATO’s operational arrangements and its Cyber Defense approach, and, secondly, to explain this in the lens of Game Theory. ...Loe edasi...
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. This book sheds light on the cyber security...Loe edasi...