(Ilmumisaeg: 01-Jun-2026, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781807050672)
This book presents information on hardware trojan attacks and their countermeasures, using high level synthesis. It includes an introduction to hardware trojans, various attack strategies, as well as trojan detection and its countermeasures....Loe edasi...
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use them in client engagements. The blueprint is the b...Loe edasi...
Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand for cloud security expertise is skyrocketing and earning a Certified Cloud Security Professional (CCSP) certification is one way t...Loe edasi...
Gain an up-to-date, practical understanding of Microsoft Defender for Endpoint and learn how to run it reliably in real environments with this expert-led practitioners guide. Key Features Understand and compare Defender for En...Loe edasi...
A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are—and how we can protect ourselves Imagine opening your computer only to find every document and every program locke...Loe edasi...
Dive deep into Windows Privilege Escalation techniques, gain the knowledge to bypass security barriers, and unlock elevated access while navigating through the administrative controls Key Features Exploit vulnerabilities and co...Loe edasi...
Equip yourself with the knowledge and skills necessary to enhance the security and resilience of your organization against cyber threats Key Features Harness the latest tools and leverage them to determine the root cause of an...Loe edasi...
Build intelligent LLM-powered applications with agentic workflows and tool-based agents.AI-powered applications are rapidly becoming the new normal. Personal productivity assistants, coding agents, smarter search, and automated reporti...Loe edasi...
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack encrypted containers, analyze Windows memory, and detect tampering using realistic hands-on forensic datasets. Free with you...Loe edasi...
Design for resilience in a digital world and explore how integrating human factors into cybersecurity reduces errors, fortifies defenses, and aligns protection strategies with authentic human behavior. Key Features Offers frame...Loe edasi...
Build, evaluate, and measure effective cybersecurity strategies using real-world threat intelligence and lessons from decades of enterprise defense experience. Key Features Apply data-driven strategies to protect, detect, and r...Loe edasi...
(Ilmumisaeg: 23-Mar-2026, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394285570)
An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential campaigns, shut down electric grids, sway pu...Loe edasi...
(Ilmumisaeg: 09-Mar-2026, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394340866)
An up-to-date exploration of how AI is transforming cybersecurity and how to implement AI in your organization’s cyber defenses to meet today’s evolving threat landscape In The AI Cybersecurity Handbook, author Caroline Wong exami...Loe edasi...
As cyberthreats grow and infrastructure evolves, organizations must prioritize effective, dynamic, and adaptable incident response. Based on the original print bestseller, Blue Team Handbook: Incident Response is now available for the fir...Loe edasi...