This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
The Basics of Digital Forensics, Third Edition provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key t...Loe edasi...
(Ilmumisaeg: 01-Jun-2026, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781807050672)
This book presents information on hardware trojan attacks and their countermeasures, using high level synthesis. It includes an introduction to hardware trojans, various attack strategies, as well as trojan detection and its countermeasures....Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
This book explores the impact of AI, blockchain, and machine learning on African industries, highlighting their role in sustainable development and addressing global challenges. This book is for scholars, professionals, and policymakers....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing, and governing safer digital ecosystems....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing and governing safer digital ecosystems....Loe edasi...
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use them in client engagements. The blueprint is the b...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
A comprehensive guide to automotive offensive security breaking down real-world exploitation starting from the vehicle backend, through high-performance ECUs down to the edge sensors to bridge the gap between defensive engineering and offensive secu...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...