The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
Explores challenge of securing sensitive medical data in the face of rising cyber threats. Examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare systems and environments. Integrates advanced technol...Loe edasi...
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing. While technical issues are fundamental in understanding how to improve system security, analyzing the roles of human agents is cru...Loe edasi...
This book explores the role of Embedded AI in revolutionising industries such as healthcare, transportation, manufacturing, retail. It begins by introducing the fundamentals of AI and embedded systems and specific challenges and opportunities....Loe edasi...
This book sheds light on the optimisation methods that form the basis of effective communication between networked devices. It is an excellent resource as it provides readers with a thorough understanding of the methods, ideas, and tactics essential...Loe edasi...
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of c...Loe edasi...
Identifying and stopping the dissemination of fabricated news, hate speech, or deceptive information camouflaged as legitimate news poses a significant technological hurdle. This book presents emergent methodologies and technological approaches of n...Loe edasi...
Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As organizations become more interconnected and data-driven, traditional cybersecurity measures are increasingly challenged by ad...Loe edasi...
This book explores sharenting—the widespread practice of parents or caregivers sharing information about their children online—and explores how this pervasive digital practice is reshaping childhood, parenting, and family life in a networke...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
In a world increasingly shaped by technology, digital sovereignty is a critical need for nations and organizations to preserve their autonomy. It is more than just control over data and infrastructure; its about safeguarding values, privacy, and...Loe edasi...
This book critiques legal frameworks involving the bulk processing of personal data to predict and prevent crime through advanced profiling technologies. It questions their legitimacy and impact in light of the EUs powers to provide security while s...Loe edasi...
This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods....Loe edasi...
Legacies of the Surveillance State offers a chilling exploration of two historical surveillance societies: East Germany and Northern Ireland during the 1970s and 1980s to provide a unique perspective on the human cost of surveillance....Loe edasi...
Offering a holistic view of the pioneering trends and innovations in Smart Healthcare Management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intellige...Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
As providing online consent has become increasingly difficult, some have argued that surveillance capitalism needs to be overthrown. This book presents a different perspective. It departs from the concept of revolutionary change to focus on pragmati...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
This book explores the need for a data-centric AI approach and its application in the multidisciplinary domain, compared to a model-centric approach....Loe edasi...
Technology Innovation Pillars for Industry 4.0: Challenges, Improvements, and Case Studies discusses the latest innovations in the application of technologies to Industry 4.0 and the nine pillars and how they relate, support, and bridge the gap betw...Loe edasi...
(Ilmumisaeg: 12-May-2026, Hardback, Kirjastus: Columbia Business School Publishing, ISBN-13: 9780231217682)
This book contends that despite shifting trends, the virtual universe remains crucial to the technology of tomorrowand might arrive sooner than we think....Loe edasi...
The book provides a systematic overview of data privacy and data governance from both conceptual and technical perspectives. The first section introduces the fundamentals of data privacy and data governance from a historical and systemic standpoint....Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Learn how to build a panoramic observatory app for monitoring and collecting datasets from major social-media platforms and online communities—no prior programming experience required! Whether you’re a security researcher, a journalist, an...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
Explores challenge of securing sensitive medical data in the face of rising cyber threats. Examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare systems and environments. Integrates advanced technol...Loe edasi...
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing. While technical issues are fundamental in understanding how to improve system security, analyzing the roles of human agents is cru...Loe edasi...
This book explores the role of Embedded AI in revolutionising industries such as healthcare, transportation, manufacturing, retail. It begins by introducing the fundamentals of AI and embedded systems and specific challenges and opportunities....Loe edasi...
This book sheds light on the optimisation methods that form the basis of effective communication between networked devices. It is an excellent resource as it provides readers with a thorough understanding of the methods, ideas, and tactics essential...Loe edasi...
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of c...Loe edasi...
Identifying and stopping the dissemination of fabricated news, hate speech, or deceptive information camouflaged as legitimate news poses a significant technological hurdle. This book presents emergent methodologies and technological approaches of n...Loe edasi...
Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As organizations become more interconnected and data-driven, traditional cybersecurity measures are increasingly challenged by ad...Loe edasi...
This book explores sharenting—the widespread practice of parents or caregivers sharing information about their children online—and explores how this pervasive digital practice is reshaping childhood, parenting, and family life in a networke...Loe edasi...
Secure identities across clouds and streamline DevOps workflows with real-world IAM strategies Key Features Master IAM across Azure, AWS, and GCP with platform-specific tools and best practices Secure CI/CD pipelines by automat...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...