This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
(Ilmumisaeg: 30-Jun-2026, Hardback, Kirjastus: Cambridge University Press, ISBN-13: 9781009565691)
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Paperback / softback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789819800773)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811299100)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
The book explores the theory and applications of finite fields, from basic concepts such as modular arithmetic and polynomial interpolation to advanced topics such construction and counting of polynomials.Addresses a wide range of topi...Loe edasi...
This book explores deep learning as a next-generation approach to online payment fraud detection in the face of increasingly complex and adaptive threats. Traditional rule-based or shallow learning methods are no longer sufficient. Through ten focus...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
In an era where battles are fought not only with code but also with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across...Loe edasi...
In an era where battles are fought not just with code but with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across digi...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book teaches a solid ethical hacking and offensive security foundation. Users learn how to organize and define assessments, identify, and exploit vulnerabilities, and write clear professional reports with effective mitigation measures. IT empha...Loe edasi...
Sari: River Publishers Rapids Series in Computer Engineering and Information Science and Technology
(Ilmumisaeg: 26-Jun-2026, Paperback / softback, Kirjastus: River Publishers, ISBN-13: 9788743810377)
This book presents AI-driven approaches for combating spam, phishing, and malware in email systems. It reviews classical techniques, identifies their limitations, and introduces two novel frameworks—FLIDA and G-SFO with adaptive capsule networks....Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk a...Loe edasi...
This book delves into the history of biometrics, the various systems that have been developed to date, the problems that have arisen from these systems, the necessity of AI-based biometrics systems, the various AI techniques that have been developed...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book reboots the conversation about all technologies relating to robot safety. It covers key features of industry standards, relevant government regulations, hardware devices, physical safeguards, and vendor-specific software implementations,...Loe edasi...
Businesses have faced many difficulties as a result of the global pandemic. Digital technologies have played a crucial role in addressing these issues and fostering resilience. It is, therefore, imperative to explore options for post-pandemic busine...Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
Humans and Cyber Security: How Organisations Can Enhance Resilience Through Human Factors delivers an applied approach to capturing and mitigating the risk of the human element in cyber security and proposes that it is easier to change orga...Loe edasi...
The book explores the critical challenge of securing sensitive medical data in the face of rising cyber threats. It examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare environments. It integrate...Loe edasi...
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was 16.4 billion a day. While technical issue analyses are fundamental in understandin...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.Step into the world of malware-as-a-service (MaaS) in this exploration of the...Loe edasi...
A hands-on guide to finding and exploiting vulnerabilities in LLMs, agentic systems, and AI pipelines through structured labs and real attack techniques. Key Features Build the adversarial mindset needed to find vulnerabilities...Loe edasi...
Built on Fortune 500 experience, this guide delivers hands-on methods to secure generative AI with extensive coverage of RAG, agents, prompt injection, data pipelines, Zero Trust, and sustainable programs Key Features Defend LL...Loe edasi...
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
This book is an essential guide for anyone looking to build secure and resilient generative AI applications. It provides actionable insights into identifying vulnerabilities and preventing attacks.Authored by security expert Paul Zenker, th...Loe edasi...
Pass the ISC2 CC Certified in Cybersecurity exam with clear lessons, domain-focused practice, and full mock tests aligned to the official exam outline. Key Features Study each CC objective with beginner-first explanations Check...Loe edasi...
(Ilmumisaeg: 30-Jun-2026, Hardback, Kirjastus: Cambridge University Press, ISBN-13: 9781009565691)
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...
As Mark Andrejevic states, if in the physical environment the pressing issue of the next several decades is likely to be the dramatic transformation of the global climate, in the social realm, the main issue will be the shifting surveillance climat...Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Paperback / softback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789819800773)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811299100)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
The book explores the theory and applications of finite fields, from basic concepts such as modular arithmetic and polynomial interpolation to advanced topics such construction and counting of polynomials.Addresses a wide range of topi...Loe edasi...
This book explores deep learning as a next-generation approach to online payment fraud detection in the face of increasingly complex and adaptive threats. Traditional rule-based or shallow learning methods are no longer sufficient. Through ten focus...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
Learn to manage security incidents, hunt advanced threats, and defend IT systems using Microsoft security tools, gaining hands-on expertise to ace the SC-200 exam and become a certified Microsoft Security Operations Analyst Key Features ...Loe edasi...
In an era where battles are fought not only with code but also with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across...Loe edasi...
In an era where battles are fought not just with code but with culture, this book explores the evolving landscape of cyber conflict through the lens of psychology, cognition, and information warfare. It delves into the hidden war waged across digi...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...