Secure identities across clouds and streamline DevOps workflows with real-world IAM strategies Key Features Master IAM across Azure, AWS, and GCP with platform-specific tools and best practices Secure CI/CD pipelines by automat...Loe edasi...
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book explores the impact of AI, blockchain, and machine learning on African industries, highlighting their role in sustainable development and addressing global challenges. This book is for scholars, professionals, and policymakers....Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
A comprehensive guide to automotive offensive security breaking down real-world exploitation starting from the vehicle backend, through high-performance ECUs down to the edge sensors to bridge the gap between defensive engineering and offensive secu...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...
Secure your critical infrastructure by understanding architectures and risks, hardening legacy and modern systems, protecting data and communications, and building resilient policies through real-world case studies Key Features ...Loe edasi...
In a world increasingly shaped by technology, digital sovereignty is a critical need for nations and organizations to preserve their autonomy. It is more than just control over data and infrastructure; its about safeguarding values, privacy, and...Loe edasi...
This book critiques legal frameworks involving the bulk processing of personal data to predict and prevent crime through advanced profiling technologies. It questions their legitimacy and impact in light of the EUs powers to provide security while s...Loe edasi...
This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods....Loe edasi...
Legacies of the Surveillance State offers a chilling exploration of two historical surveillance societies: East Germany and Northern Ireland during the 1970s and 1980s to provide a unique perspective on the human cost of surveillance....Loe edasi...
Offering a holistic view of the pioneering trends and innovations in Smart Healthcare Management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intellige...Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
As providing online consent has become increasingly difficult, some have argued that surveillance capitalism needs to be overthrown. This book presents a different perspective. It departs from the concept of revolutionary change to focus on pragmati...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
This book explores the need for a data-centric AI approach and its application in the multidisciplinary domain, compared to a model-centric approach....Loe edasi...
Technology Innovation Pillars for Industry 4.0: Challenges, Improvements, and Case Studies discusses the latest innovations in the application of technologies to Industry 4.0 and the nine pillars and how they relate, support, and bridge the gap betw...Loe edasi...
(Ilmumisaeg: 12-May-2026, Hardback, Kirjastus: Columbia Business School Publishing, ISBN-13: 9780231217682)
This book contends that despite shifting trends, the virtual universe remains crucial to the technology of tomorrowand might arrive sooner than we think....Loe edasi...
The book provides a systematic overview of data privacy and data governance from both conceptual and technical perspectives. The first section introduces the fundamentals of data privacy and data governance from a historical and systemic standpoint....Loe edasi...
A comprehensive and up-to-date prep guide for the CRISC exam and the perfect desk reference for professionals in the field In CRISC Certified in Risk and Information Systems Control Study Guide, veteran author, cybersecurity, and privacy...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
“CISO: Evolution of a Vocation” comprises three levels. The first level shares the author’s personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and CISO-equivalent roles at som...Loe edasi...
“CISO: Evolution of a Vocation” comprises three levels. The first level shares the author’s personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as a CISO and CISO-equivalent roles at some of Am...Loe edasi...
Making the right decisions about emerging technology is a challenge for every business. It requires senior leaders to balance their desire to encourage innovation with the financial, reputational and operational risks that come from generative...Loe edasi...
Build a technology governance program driven by digital trust which will encourage innovation and mitigate the financial, reputational and operational risks of emerging technology. Making the right decisions about emerging technology is...Loe edasi...
Gain an up-to-date, practical understanding of Microsoft Defender for Endpoint and learn how to run it reliably in real environments with this expert-led practitioners guide. Key Features Understand and compare Defender for En...Loe edasi...
Develop actionable strategies to proactively hunt advanced persistent threats and detect zero-days using CTI and behavior-based detection techniques Key Features Intelligence-led threat hunting framework for detecting APTs and...Loe edasi...
Dive deep into Windows Privilege Escalation techniques, gain the knowledge to bypass security barriers, and unlock elevated access while navigating through the administrative controls Key Features Exploit vulnerabilities and co...Loe edasi...
Jumpstart your career in red team cybersecurity by mastering the art of planning, deploying, and mitigating modern cyber-attacks in a safe and controlled home lab environment. Key Features Master red team tools and techniques w...Loe edasi...
This book is a thorough and practical guide to minimizing personally identifiable information (PII) in every conceivable use case across Finance, Healthcare, Insurance, Legal, Marketing, HR, and Government.Most data protection laws and regu...Loe edasi...
Eric Butow, Amanda Robinson, Carolyn Abram, Amy Karasavas, Stephanie Diamond, John Haydon, Jenn Herman, Corey Walker
(Ilmumisaeg: 22-Apr-2026, Paperback / softback, Kirjastus: For Dummies, ISBN-13: 9781394414444)
Transform your online presence into a lead generation machine Instagram & Facebook All-in-One For Dummies brings together the expertise of a group of seasoned social media professionals and certified Meta trainers to solve the biggest cha...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, Hardback, Kirjastus: University of California Press, ISBN-13: 9780520425590)
Why does the problem of data privacy remain so intractable? Deep Dark Data explores how this contemporary problem begins with the ways we define and use personal data. Instead of debating how best to protect personal data, Alison Cool argue...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, Paperback / softback, Kirjastus: University of California Press, ISBN-13: 9780520425613)
Why does the problem of data privacy remain so intractable? Deep Dark Data explores how this contemporary problem begins with the ways we define and use personal data. Instead of debating how best to protect personal data, Alison Cool argues that we...Loe edasi...
Equip yourself with the knowledge and skills necessary to enhance the security and resilience of your organization against cyber threats Key Features Harness the latest tools and leverage them to determine the root cause of an...Loe edasi...
The rapid developments in AI mean that cyberattacks are becoming increasingly more complex and difficult to stop. Stay ahead by using AI to improve existing cybersecurity approaches and tackle these threats.Artificial Intellig...Loe edasi...
Develop the skills to stop AI-powered cyberattacks and leverage AI to improve your existing cybersecurity strategies. The rapid developments in AI mean that cyberattacks are becoming increasingly more complex and difficult to stop. Stay...Loe edasi...
This handbook offers a examination of the changing landscape of cybersecurity, exploring the challenges and solutions that shape the field. It features in-depth chapters written by experts in cybersecurity, providing a detailed evaluation of the t...Loe edasi...
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack encrypted containers, analyze Windows memory, and detect tampering using realistic hands-on forensic datasets. Free with you...Loe edasi...
Design for resilience in a digital world and explore how integrating human factors into cybersecurity reduces errors, fortifies defenses, and aligns protection strategies with authentic human behavior. Key Features Offers frame...Loe edasi...
Build, evaluate, and measure effective cybersecurity strategies using real-world threat intelligence and lessons from decades of enterprise defense experience. Key Features Apply data-driven strategies to protect, detect, and r...Loe edasi...