This book aims to provide a comprehensive perspective on the growing challenges posed by artificial intelligence (AI) for researchers and professionals. The book examines critical security issues, such as attacks and vulnerabilities, as well as ethi...Loe edasi...
(Ilmumisaeg: 03-Jul-2026, Paperback / softback, Kirjastus: Morgan Kaufmann Publishers In, ISBN-13: 9780443187544)
Hardware Security: A Hands On Learning Approach, Second Edition provides a broad, comprehensive, and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. The book covers basic concepts...Loe edasi...
This book explores the impact of AI, blockchain, and machine learning on African industries, highlighting their role in sustainable development and addressing global challenges. This book is for scholars, professionals, and policymakers....Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This volume pursues a range of disciplines, metaphors and historical contexts to try to find different ways of thinking about digital privacy and expand the landscape we work in both theoretically and practically. It will appeal to privacy researc...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
Disinformation has become one of the most dangerous threats to modern businesses. In this book, communications expert Uwe Wolff reveals how false narratives, digital smear campaigns, deepfakes, bots and state-sponsored influence operations are used...Loe edasi...
This book explores one of the most pressing challenges in artificial intelligence: the vulnerability of learning models to adversarial attacks. It presents a clear overview of how such attacks are crafted and the innovative defenses being developed...Loe edasi...
This book covers in an integrated way the foundations and practical applications on modern chaos-based cryptographic systems. It is aimed at a wide audience: PhD students, engineers in initial training, Master 2 students, specializing in data securi...Loe edasi...
This timely volume offers a comprehensive exploration of cutting-edge developments in intelligent systems and machine learning, making it an essential resource for researchers, practitioners, and graduate students. Bridging theoretical foundations w...Loe edasi...
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
(Ilmumisaeg: 30-Jun-2026, Hardback, Kirjastus: Cambridge University Press, ISBN-13: 9781009565691)
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Paperback / softback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789819800773)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811299100)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
The book explores the theory and applications of finite fields, from basic concepts such as modular arithmetic and polynomial interpolation to advanced topics such construction and counting of polynomials.Addresses a wide range of topi...Loe edasi...
This book explores deep learning as a next-generation approach to online payment fraud detection in the face of increasingly complex and adaptive threats. Traditional rule-based or shallow learning methods are no longer sufficient. Through ten focus...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
In an era where battles are fought not only with code but also with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across...Loe edasi...
In an era where battles are fought not just with code but with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across digi...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book teaches a solid ethical hacking and offensive security foundation. Users learn how to organize and define assessments, identify, and exploit vulnerabilities, and write clear professional reports with effective mitigation measures. IT empha...Loe edasi...
Sari: River Publishers Rapids Series in Computer Engineering and Information Science and Technology
(Ilmumisaeg: 26-Jun-2026, Paperback / softback, Kirjastus: River Publishers, ISBN-13: 9788743810377)
This book presents AI-driven approaches for combating spam, phishing, and malware in email systems. It reviews classical techniques, identifies their limitations, and introduces two novel frameworks—FLIDA and G-SFO with adaptive capsule networks....Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk a...Loe edasi...
This book delves into the history of biometrics, the various systems that have been developed to date, the problems that have arisen from these systems, the necessity of AI-based biometrics systems, the various AI techniques that have been developed...Loe edasi...
This book aims to provide a comprehensive perspective on the growing challenges posed by artificial intelligence (AI) for researchers and professionals. The book examines critical security issues, such as attacks and vulnerabilities, as well as ethi...Loe edasi...
(Ilmumisaeg: 03-Jul-2026, Paperback / softback, Kirjastus: Morgan Kaufmann Publishers In, ISBN-13: 9780443187544)
Hardware Security: A Hands On Learning Approach, Second Edition provides a broad, comprehensive, and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. The book covers basic concepts...Loe edasi...
This book explores the impact of AI, blockchain, and machine learning on African industries, highlighting their role in sustainable development and addressing global challenges. This book is for scholars, professionals, and policymakers....Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This volume pursues a range of disciplines, metaphors and historical contexts to try to find different ways of thinking about digital privacy and expand the landscape we work in both theoretically and practically. It will appeal to privacy researc...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
Get the eBook free when you register your print book at Manning.Software security is about understanding how real systems fail, and how to build them so they don’t. This book gives you that understanding, and shows you how to apply it...Loe edasi...
Disinformation has become one of the most dangerous threats to modern businesses. In this book, communications expert Uwe Wolff reveals how false narratives, digital smear campaigns, deepfakes, bots and state-sponsored influence operations are used...Loe edasi...
This book explores one of the most pressing challenges in artificial intelligence: the vulnerability of learning models to adversarial attacks. It presents a clear overview of how such attacks are crafted and the innovative defenses being developed...Loe edasi...
This book covers in an integrated way the foundations and practical applications on modern chaos-based cryptographic systems. It is aimed at a wide audience: PhD students, engineers in initial training, Master 2 students, specializing in data securi...Loe edasi...
This timely volume offers a comprehensive exploration of cutting-edge developments in intelligent systems and machine learning, making it an essential resource for researchers, practitioners, and graduate students. Bridging theoretical foundations w...Loe edasi...
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.Step into the world of malware-as-a-service (MaaS) in this exploration of the...Loe edasi...
A hands-on guide to finding and exploiting vulnerabilities in LLMs, agentic systems, and AI pipelines through structured labs and real attack techniques. Key Features Build the adversarial mindset needed to find vulnerabilities...Loe edasi...
Built on Fortune 500 experience, this guide delivers hands-on methods to secure generative AI with extensive coverage of RAG, agents, prompt injection, data pipelines, Zero Trust, and sustainable programs Key Features Defend LL...Loe edasi...
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
Pass the ISC2 CC Certified in Cybersecurity exam with clear lessons, domain-focused practice, and full mock tests aligned to the official exam outline. Key Features Study each CC objective with beginner-first explanations Check...Loe edasi...
(Ilmumisaeg: 30-Jun-2026, Hardback, Kirjastus: Cambridge University Press, ISBN-13: 9781009565691)
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...