(Ilmumisaeg: 23-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040817773)
This book bridges the critical gap between Enterprise Security Risk Management (ESRM) theory and practical implementation. While ESRM principles have gained widespread acceptance-particularly following ASIS Internationals endorsement-security profes...Loe edasi...
(Ilmumisaeg: 23-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040817667)
This book bridges the critical gap between Enterprise Security Risk Management (ESRM) theory and practical implementation. While ESRM principles have gained widespread acceptance-particularly following ASIS Internationals endorsement-security profes...Loe edasi...
(Ilmumisaeg: 22-Apr-2026, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040914588)
ICTAR 2025 is the second international conference conducted by NSBM Green University in Sri Lanka under the theme, "e;Breaking boundaries: Breakthrough research in a changing world"e;. This is a multidisciplinary conference focuses on a diver...Loe edasi...
(Ilmumisaeg: 22-Apr-2026, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040914625)
ICTAR 2025 is the second international conference conducted by NSBM Green University in Sri Lanka under the theme, "e;Breaking boundaries: Breakthrough research in a changing world"e;. This is a multidisciplinary conference focuses on a diver...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, PDF+DRM, Kirjastus: University of California Press, ISBN-13: 9780520425620)
Why does the problem of data privacy remain so intractable? Deep Dark Data explores how this contemporary problem begins with the ways we define and use personal data. Instead of debating how best to protect personal data, Alison Cool argues that we...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: University of California Press, ISBN-13: 9780520425620)
Why does the problem of data privacy remain so intractable? Deep Dark Data explores how this contemporary problem begins with the ways we define and use personal data. Instead of debating how best to protect personal data, Alison Cool argues that we...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, PDF+DRM, Kirjastus: De Gruyter, ISBN-13: 9783111734361)
Deepfake and image forgery technologies have advanced at an alarming rate, creating significant challenges for digital forensics and cybersecurity professionals. Beyond technical concerns, the abuse of these technologies poses profound societal risks...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: De Gruyter, ISBN-13: 9783111734330)
Deepfake and image forgery technologies have advanced at an alarming rate, creating significant challenges for digital forensics and cybersecurity professionals. Beyond technical concerns, the abuse of these technologies poses profound societal risks...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798235430815)
Master the ISC2 Certified in Cybersecurity (CC) exam with this extensive practice test collection. Whether you are starting your journey in cybersecurity or validating your foundational knowledge, this course provides the rigorous testing environment...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book features original, peer-reviewed research papers presented at the International Conference on Recent Trends in Artificial Intelligence and Data Sciences—CONFLUENCE 2025. It aims to showcase the latest developments in various fields of...Loe edasi...
This book features original, peer-reviewed research papers presented at the International Conference on Recent Trends in Artificial Intelligence and Data Sciences—CONFLUENCE 2025. It aims to showcase the latest developments in various fields of...Loe edasi...
As artificial intelligence becomes embedded in everything from healthcare diagnostics to financial systems and autonomous vehicles, the stakes for AI security have never been higher. Adversarial AI Threat Response and Secure Model Design is...Loe edasi...