In todays hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate and counter cyber threats, navigating the increasingly dangerous digital landscap...Loe edasi...
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets....Loe edasi...
Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utilizing packet analysis for network security and troubleshooting....Loe edasi...
Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approac...Loe edasi...
Sari: AAP Research Notes on Optimization and Decision Making Theories
(Ilmumisaeg: 06-Jul-2025, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781003459040)
Focuses on state-of-the-art methods and tools such as data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pansharpening, and digital signatures to help in protect...Loe edasi...
The text presents a systematic review of the opportunities and existing security/privacy concerns in the 6G communications system. It further discusses spectrum allocation and management, network architecture and heterogeneity, energy efficiency and...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges....Loe edasi...
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of clo...Loe edasi...
In an increasingly interconnected digital realm, Ubiquitous and Transparent Security: Challenges and Applications emerges as a guiding beacon through the intricate web of modern cybersecurity....Loe edasi...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map sec...Loe edasi...
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity) policy and practices, legal matters (law, regulatory, contractual, privacy), and...Loe edasi...
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificial Intelligence and Machine Learning with its relationship with OpenAI is examined. An overview into ChatGPT is provided, with a d...Loe edasi...
The book Blockchain and AI in Cyber Physical System (CPS) explores the intersection of blockchain technology, artificial intelligence (AI), and cyber physical systems (CPS). It discusses how these technologies can be integrated to create secure an...Loe edasi...
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security....Loe edasi...
The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, gra...Loe edasi...
This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, its a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect t...Loe edasi...
This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration....Loe edasi...
This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor ne...Loe edasi...
This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system....Loe edasi...
This book is written with an intension to provide a thorough and detailed discussion on various fundamental aspects of cloud security. It provides an insight in to cloud computing including definition, history, characteristics, service models, cloud...Loe edasi...
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the comp...Loe edasi...
The third edition has expended coverage essential topics such as threat analysis, data gathering, risk analysis, and risk assessment methods and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply cha...Loe edasi...
Digital Forensics and Investigations: People, Process, and Technologies to Defend the Enterprise is written for digital forensic professionals, information security professionals, and post-secondary graduates who are looking to further their knowled...Loe edasi...
The wave of data breaches raises two pressing questions: Why dont we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions....Loe edasi...
This book, written for practitioners in the field, provides tangible, cost effective, and thus pragmatic means to mitigate key risks while leveraging built-in cloud capabilities and overarching principles of effective system design....Loe edasi...
This comprehensive handbook serves as a professional reference and practitioners guide to todays most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. Th...Loe edasi...
The future of Internet security does not lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. This book examines the new security architectures from organizations such as FIArch, GENI,...Loe edasi...
This book presents state-of-the-art contributions from scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, and practical exper...Loe edasi...
There is a resurgence of interest in the security of data transmission in wireless systems from physical layer point of view. To enhance the security and data reliability in cooperative wireless networks, this book provides new solutions for these p...Loe edasi...
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to dev...Loe edasi...
For many small businesses, applying GDPR is like playing a game of Snakes and Ladders. As soon as you move along the board and climb a ladder a snake appears which takes you back to where you started. This user-friendly book helps you understand the...Loe edasi...
This book addresses security analytics for the Internet of Everything. It provides a big picture on the concepts, techniques, applications, and open research directions in this area. It also serves as a single source of reference for acquiring the k...Loe edasi...