This book on Governance, Risk Management Compliance (GRC) and Data Privacy is designed to equip apprentices, students and professionals across various industries with a deep understanding of this holistic approach to organizational security and risk...Loe edasi...
As data becomes more abundant and widespread across personal devices, the need for secure, privacy-aware machine learning is growing. Federated Learning (FL) offers a promising solution, enabling smart devices to collaboratively train models without...Loe edasi...
This book offers a hands-on guide to cloud security from both offensive and defensive perspectives. It explores real-world threats like phishing, data exfiltration, and zero-day exploits, while equipping professionals with tools for threat modeling,...Loe edasi...
The book presents a comprehensive overview of emerging IoT technologies, IoT devices and sensors and their role in the healthcare industry. It offers recent developments in the creation, application, and impact of new IoMT data security, IoMT device...Loe edasi...
Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniq...Loe edasi...
This book examines the complex interplay between state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT), analyzing the security challenges and opportunities that emerge as the world ventures into this technolog...Loe edasi...
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation....Loe edasi...
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative. Cyberattacks on mobile platforms surge yearly, with vulnerabilities in banking, healthcare, and...Loe edasi...
This book covers the evolution, trends, techniques, countermeasures, and open research directions in futuristic healthcare. In addition, it will serve as an important reference for knowledge....Loe edasi...
The book explores the IoT landscape, focusing on Sensor Technologies and Wireless Sensor Communications. It also discusses challenges in establishing interconnected sensors, network connectivity, longevity, and strategies for sustaining sensor netwo...Loe edasi...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architectures....Loe edasi...
Sari: River Publishers Rapids Series in Digital Security and Forensics
(Ilmumisaeg: 13-Oct-2025, Kirjastus: River Publishers, ISBN-13: 9788770047395)
This book explores IoMT security and privacy in e-healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks. It covers IoMT security challenges, potential attacks, and solutions considering resource constrai...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications....Loe edasi...
AI Frontiers: Transforming Health, Agriculture, and Industry delves into how cutting-edge AI innovations are addressing some of the worlds most pressing challenges. This comprehensive volume explores the transformative impact of AI across sectors,...Loe edasi...
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation--not through legislation. It will be of interest to researchers and practitioners in the field of corporate survei...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful role of huma...Loe edasi...
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersecurity for business analytics....Loe edasi...
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and the implications it can have....Loe edasi...
In this book, we will provide an overview of the fundamental concepts of Edge Computing, Edge intelligence using advanced machine and deep learning models, architecture of Edge computing based IoT system, and edge computing based cyber threat intell...Loe edasi...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools needed...Loe edasi...