(Ilmumisaeg: 24-Oct-2024, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394269167)
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked: My Life and Lessons as the Worlds First Augmented Ethical Hacker by Len Noe, a pioneering cyborg with ten microc...Loe edasi...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Loe edasi...
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Loe edasi...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Loe edasi...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Loe edasi...
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersecurity for business analytics. This book explores addressing the growing need for insights and practical...Loe edasi...
(Ilmumisaeg: 01-Oct-2025, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781837240319)
This book explores how AI and Explainable AI-based cybersecurity algorithms and methods are used to tackle cybersecurity challenges such as threats, intrusions and attacks to preserve data privacy and ensure trust, accountability, transparency and c...Loe edasi...
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Loe edasi...
Designed for professionals, researchers, and decision-makers, this book emphasizes that understanding and leveraging AI in cybersecurity is not just advantageous—it is essential for building robust, future-proof defenses in a world where digital s...Loe edasi...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. Traditiona...Loe edasi...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep di...Loe edasi...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our time—digital security. The internet wasn’t built for time travelers. But when et...Loe edasi...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our time—digital security. The internet wasn’t built for time travelers. But when et...Loe edasi...
Artificial Intelligence (AI) has revolutionized digital forensics, bringing previously unheard-of powers to this field. This book explores the advancements, applications, challenges, and solutions that AI brings to the realm of digital forensics....Loe edasi...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internet’s evolution - from its humble, stat...Loe edasi...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internet’s evolution - from its humble, stat...Loe edasi...