Secure identities across clouds and streamline DevOps workflows with real-world IAM strategies Key Features Master IAM across Azure, AWS, and GCP with platform-specific tools and best practices Secure CI/CD pipelines by automat...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improveme...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
Disinformation has become one of the most dangerous threats to modern businesses. In this book, communications expert Uwe Wolff reveals how false narratives, digital smear campaigns, deepfakes, bots and state-sponsored influence operations are used...Loe edasi...
Quantum informatics for novel therapeutics is a field-guide to the new healthcare stackwhere quantum computing, AI, cybersecurity, and biomedical data science converge to change what we can discover, protect, and deliver. It takes readers from the e...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
The book explores the intricate nexus between biometric systems and the need for preserving data integrity as well as security needed during the data communication. It offers a systematic and insightful journey through the multifaceted landscape o...Loe edasi...
The use of intelligent technologies to enhance instruction and learning is introduced in pedagogy-based learning-teaching perspective. It covers digital library resources, AI-based tools, data analysis techniques, and NLP and NLU-powered smart ass...Loe edasi...
The rising demand for smart technologies necessitates the need of upgrading current systems to effectively cater to these expectations. This book serves as an extensive resource that aims to facilitate the integration of ancient and contemporary tec...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
The Basics of Digital Forensics, Third Edition provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key t...Loe edasi...
(Ilmumisaeg: 01-Jun-2026, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781807050672)
This book presents information on hardware trojan attacks and their countermeasures, using high level synthesis. It includes an introduction to hardware trojans, various attack strategies, as well as trojan detection and its countermeasures....Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...