In an era where battles are fought not just with code but with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across digita...Loe edasi...
In an era where battles are fought not just with code but with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across digita...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book aims to provide a comprehensive perspective on the growing challenges posed by artificial intelligence (AI) for researchers and professionals. The book examines critical security issues, such as attacks and vulnerabilities, as well as ethi...Loe edasi...
Sari: River Publishers Rapids Series in Computer Engineering and Information Science and Technology
(Ilmumisaeg: 26-Jun-2026, Paperback / softback, Kirjastus: River Publishers, ISBN-13: 9788743810377)
The book presents AI-driven solutions for securing email systems against spam, phishing and malware. It introduces FLIDA and G-SFO with adaptive capsule networks while offering insights into quantum machine learning for scalable cybersecurity....Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
This book provides a comprehensive and accessible guide to the rapidly growing field of AI security, addressing the threats, vulnerabilities, and defensive strategies that shape modern machine-learning systems. The book examines how adversaries expl...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk a...Loe edasi...
This book delves into the history of biometrics, the various systems that have been developed to date, the problems that have arisen from these systems, the necessity of AI-based biometrics systems, the various AI techniques that have been developed...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book reboots the conversation about all technologies relating to robot safety. It covers key features of industry standards, relevant government regulations, hardware devices, physical safeguards, and vendor-specific software implementations,...Loe edasi...
Businesses have faced many difficulties as a result of the global pandemic. Digital technologies have played a crucial role in addressing these issues and fostering resilience. It is, therefore, imperative to explore options for post-pandemic busine...Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
Humans and Cyber Security: How Organisations Can Enhance Resilience Through Human Factors delivers an applied approach to capturing and mitigating the risk of the human element in cyber security and proposes that it is easier to change orga...Loe edasi...
The book explores the critical challenge of securing sensitive medical data in the face of rising cyber threats. It examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare environments. It integrate...Loe edasi...
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was 16.4 billion a day. While technical issue analyses are fundamental in understandin...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
AI is not just a tool. Its a new creator and a new risk. Artificial intelligence is transforming how companies innovate, create, and compete. But with this transformation comes a legal and strategic minefield. Generative AI to...Loe edasi...
In an industry that often lacks representation, Dark Faces in Cyber Places shines a bright spotlight on the remarkable journeys of prominent cybersecurity CEOs, CISOs, and senior executives who have risen to the top, defying stereotypes and shatteri...Loe edasi...
In an industry that often lacks representation, Dark Faces in Cyber Places shines a bright spotlight on the remarkable journeys of prominent cybersecurity CEOs, CISOs, and senior executives who have risen to the top, defying stereotypes and shatteri...Loe edasi...
(Ilmumisaeg: 22-Jun-2026, Paperback / softback, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781003610915)
Cybersecurity in Robotic Autonomous Vehicles introduces a novel Intrusion Detection System (IDS) specifically designed for AVs, which leverages data prioritization in CAN IDs to enhance threat detection and mitigation. It offers a pioneerin...Loe edasi...
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples. It provides a learning tool for engineers as well as for researchers and scientists of...Loe edasi...
This book explores the role of embedded AI in revolutionizing industries such as healthcare, transportation, manufacturing, and retail. It begins by introducing the fundamentals of AI and embedded systems and specific challenges and opportunities....Loe edasi...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map sec...Loe edasi...
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices. It is...Loe edasi...
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance....Loe edasi...
Learn to manage security incidents, hunt advanced threats, and defend IT systems using Microsoft security tools, gaining hands-on expertise to ace the SC-200 exam and become a certified Microsoft Security Operations Analyst Key Features ...Loe edasi...
In an era where battles are fought not just with code but with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across digita...Loe edasi...
In an era where battles are fought not just with code but with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across digita...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book aims to provide a comprehensive perspective on the growing challenges posed by artificial intelligence (AI) for researchers and professionals. The book examines critical security issues, such as attacks and vulnerabilities, as well as ethi...Loe edasi...
Sari: River Publishers Rapids Series in Computer Engineering and Information Science and Technology
(Ilmumisaeg: 26-Jun-2026, Paperback / softback, Kirjastus: River Publishers, ISBN-13: 9788743810377)
The book presents AI-driven solutions for securing email systems against spam, phishing and malware. It introduces FLIDA and G-SFO with adaptive capsule networks while offering insights into quantum machine learning for scalable cybersecurity....Loe edasi...
Gain the expertise to deploy, secure, and optimize Microsoft Entra ID while strengthening identity governance, protecting against modern threats, and enabling secure access for users, workloads, and external partners Key Features ...Loe edasi...
Learn how to build a panoramic observatory app for monitoring and collecting datasets from major social-media platforms and online communities—no prior programming experience required! Whether you’re a security researcher, a journalist, an...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
This book provides a comprehensive and accessible guide to the rapidly growing field of AI security, addressing the threats, vulnerabilities, and defensive strategies that shape modern machine-learning systems. The book examines how adversaries expl...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk a...Loe edasi...
This book delves into the history of biometrics, the various systems that have been developed to date, the problems that have arisen from these systems, the necessity of AI-based biometrics systems, the various AI techniques that have been developed...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book reboots the conversation about all technologies relating to robot safety. It covers key features of industry standards, relevant government regulations, hardware devices, physical safeguards, and vendor-specific software implementations,...Loe edasi...
Businesses have faced many difficulties as a result of the global pandemic. Digital technologies have played a crucial role in addressing these issues and fostering resilience. It is, therefore, imperative to explore options for post-pandemic busine...Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...