This title explores the growing phenomenon of cyberviolence against women, analyzing its causes, manifestations, and consequences from a multidisciplinary perspective....Loe edasi...
This book provides readers with an insightful and nuanced look at the human component of cybercrime. James MacDowell delves into the intriguing domain of forensic cyberpsychology by exploring the complex relationship between humans and technology in...Loe edasi...
Forensic Investigation of Smart Connected Devices: A Hands-on Guide provides a thorough and practical resource for addressing the forensic challenges associated with these technologies. This book explores the forensic investigation of a wide array...Loe edasi...
Cybercrime and the Autism Spectrum explores the intersection of cybercrime and the autism spectrum, offering a multidimensional perspective from a clinician, an attorney and a technical forensic expert....Loe edasi...
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape...Loe edasi...
Operation Carder Kaos offers a rare inside look at the murky world of cybercrime, where deception is currency and exposure can be deadly. Its a high-stakes, real-world thriller about betrayal, digital warfare, and the price of living two lives....Loe edasi...
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterroris...Loe edasi...
This book offers a hands-on guide to cloud security from both offensive and defensive perspectives. It explores real-world threats like phishing, data exfiltration, and zero-day exploits, while equipping professionals with tools for threat modeling,...Loe edasi...
Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniq...Loe edasi...
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation....Loe edasi...
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative. Cyberattacks on mobile platforms surge yearly, with vulnerabilities in banking, healthcare, and...Loe edasi...
This book provides a hands-on, research-driven guide to building, deploying, and understanding machine learning models tailored for securing IIoT and WSN environments....Loe edasi...
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets....Loe edasi...
This book covers the evolution, trends, techniques, countermeasures, and open research directions in futuristic healthcare. In addition, it will serve as an important reference for knowledge....Loe edasi...
Digital Forensics in Next Generation Internet for Medical Things: Balancing Security and Sustainability provides a comprehensive exploration of the security challenges and solutions with the digital sustainability in the rapidly evolving digital lan...Loe edasi...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architectures....Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications....Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful role of huma...Loe edasi...
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersecurity for business analytics....Loe edasi...
In this book, we will provide an overview of the fundamental concepts of Edge Computing, Edge intelligence using advanced machine and deep learning models, architecture of Edge computing based IoT system, and edge computing based cyber threat intell...Loe edasi...