Structured around strategic foundations, operational developments, and emerging threats, the book examines how Türkiye has adapted to the evolving landscape of terrorism....Loe edasi...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Loe edasi...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Loe edasi...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Loe edasi...
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Loe edasi...
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It r...Loe edasi...
Building and sustaining cybersecurity in the enterprise isn’t just a technical challenge; it is an organizational imperative. In a world where most guidance is geared toward mid-sized environments, Integrated Assurance fills a critical gap...Loe edasi...
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Loe edasi...
Designed for professionals, researchers, and decision-makers, this book emphasizes that understanding and leveraging AI in cybersecurity is not just advantageous—it is essential for building robust, future-proof defenses in a world where digital s...Loe edasi...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. Traditiona...Loe edasi...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep di...Loe edasi...
Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utilizing packet analysis for network security and troubleshooting. This book is ideal for IT professionals, network administrators, and cybersecurity...Loe edasi...
Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utilizing packet analysis for network security and troubleshooting. This book is ideal for IT professionals, network administrators, and cybersecu...Loe edasi...
The world today is becoming more interconnected than ever before. Because of this, the spread of Misinformation and Disinformation is literally like wildfire, especially with the use of the social media platforms. In this book, we cover this topic i...Loe edasi...
The world today is becoming more interconnected than ever before. Because of this, the spread of Misinformation and Disinformation is literally like wildfire, especially with the use of the social media platforms. The world today i...Loe edasi...