This book aims to provide a comprehensive perspective on the growing challenges posed by artificial intelligence (AI) for researchers and professionals. The book examines critical security issues, such as attacks and vulnerabilities, as well as ethi...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
This timely volume offers a comprehensive exploration of cutting-edge developments in intelligent systems and machine learning, making it an essential resource for researchers, practitioners, and graduate students. Bridging theoretical foundations w...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book teaches a solid ethical hacking and offensive security foundation. Users learn how to organize and define assessments, identify, and exploit vulnerabilities, and write clear professional reports with effective mitigation measures. IT empha...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map s...Loe edasi...
This book takes the complex and highly topical theme of AI-driven surveillance and reduces it to simple but important questions. Drawing upon the authors professional experience as UKs first joint Biometrics and Surveillance Camera Commissioner, the...Loe edasi...
This book provides a comprehensive and up-to-date exploration of data management practices tailored to the needs and challenges of AI technologies. Aimed at masters students, postgraduate trainees, and professionals, this book guides readers through...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
The SAS ecosystem is evolving. Whether you work with SAS Viya or SAS 9, theres never been a better time to dive in and master its full potential. This book guid...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
How secure are intelligent computing networks (ICNs) when data, algorithms, and computing power intertwine? As ICNs become the backbone of modern digital ecosystems, their growing complexity introduces unprecedented risks in security and safety. Int...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital threats In Cyber Defense: Advanced Strategies and Techniques to Stay Ahead of the Cyber Threats Curve, acclaimed cybersec...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
This book provides a systematic and in-depth introduction to machine unlearning (MU) for foundation models, framed through an optimizationmodeldata tri-design perspective and complemented by assessments and applications. As foundation models are con...Loe edasi...
The work grew out of a very practical problem: the AppSec team was drowning in security scanning alerts but still occasionally missed real issues that had been dismissed as false positives. Wanted to present a way not just to tune individual tools,...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
S. S. Iyengar, Kenneth G. Furton, Pronab Mohanty, Naveen Kumar Chaudhary
Sari: Signals and Communication Technology
(Ilmumisaeg: 12-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031980350)
This book explores the transformative role of artificial intelligence (AI) in the field of digital forensics, offering a comprehensive over...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
Valuable insights and strategies for mitigating risks associated with space systems, reviewing satellite cybersecurity, regulatory frameworks, and incident response protocols Cyber Security for Space Missions: Mitigating Risks in the...Loe edasi...
This book aims to provide a comprehensive perspective on the growing challenges posed by artificial intelligence (AI) for researchers and professionals. The book examines critical security issues, such as attacks and vulnerabilities, as well as ethi...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
Get the eBook free when you register your print book at Manning.Software security is about understanding how real systems fail, and how to build them so they don’t. This book gives you that understanding, and shows you how to apply it...Loe edasi...
This timely volume offers a comprehensive exploration of cutting-edge developments in intelligent systems and machine learning, making it an essential resource for researchers, practitioners, and graduate students. Bridging theoretical foundations w...Loe edasi...
Built on Fortune 500 experience, this guide delivers hands-on methods to secure generative AI with extensive coverage of RAG, agents, prompt injection, data pipelines, Zero Trust, and sustainable programs Key Features Defend LL...Loe edasi...
Pass the ISC2 CC Certified in Cybersecurity exam with clear lessons, domain-focused practice, and full mock tests aligned to the official exam outline. Key Features Study each CC objective with beginner-first explanations Check...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book teaches a solid ethical hacking and offensive security foundation. Users learn how to organize and define assessments, identify, and exploit vulnerabilities, and write clear professional reports with effective mitigation measures. IT empha...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map s...Loe edasi...
This book takes the complex and highly topical theme of AI-driven surveillance and reduces it to simple but important questions. Drawing upon the authors professional experience as UKs first joint Biometrics and Surveillance Camera Commissioner, the...Loe edasi...
This book provides a comprehensive and up-to-date exploration of data management practices tailored to the needs and challenges of AI technologies. Aimed at masters students, postgraduate trainees, and professionals, this book guides readers through...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
The SAS ecosystem is evolving. Whether you work with SAS Viya or SAS 9, theres never been a better time to dive in and master its full potential. This book guid...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
(Ilmumisaeg: 09-Jun-2026, Hardback, Kirjastus: No Starch Press,US, ISBN-13: 9781718504424)
Aspiring hackers will learn foundational programming in C and assembly languages from a veteran hacker and develop the skills to create their own hacking tools.In hacker lore, heavy wizardry means code so close to the metal it feels li...Loe edasi...
How secure are intelligent computing networks (ICNs) when data, algorithms, and computing power intertwine? As ICNs become the backbone of modern digital ecosystems, their growing complexity introduces unprecedented risks in security and safety. Int...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital threats In Cyber Defense: Advanced Strategies and Techniques to Stay Ahead of the Cyber Threats Curve, acclaimed cybersec...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...