Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90 of cyber attacks exploit human vulnerabilities, as highlighted by the 2022 Global Risks Report from the World Economic Forum....Loe edasi...
The book investigates eGovernment Whole-of-Government Approaches (WGA) efficiency in back-office transactions (G2G) for promoting good governance ethics, through its theoretical underpinnings and practical applications....Loe edasi...
1st EditionSecurity Relationship ManagementLeveraging Marketing Concepts to Advance a Cybersecurity ProgramAligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance o...Loe edasi...
Inspectors General: Duty, Authority, Integrity examines the firsthand experiences and insights of practitioners who work in an omnipresent yet little understood government watchdog institution, the Office of Inspector General (OIG). OIGs...Loe edasi...
Inspectors General: Duty, Authority, Integrity examines the firsthand experiences and insights of practitioners who work in an omnipresent yet little understood government watchdog institution, the Office of Inspector General (OIG)....Loe edasi...
1st EditionSafeguarding the FutureSecurity and Privacy by Design for AI, Metaverse, Blockchain, and BeyondBy Alan TangEmerging technologies like AI, blockchain, and brain–computer interfaces bri...Loe edasi...
A meticulously crafted training manual for a diverse audience united by a commitment to safety and excellence in the field of personal security....Loe edasi...
The book underscores AIs transformative impact on reshaping physical, digital, and biological boundaries, converging with technologies like robotics, IoT, 3D printing, genetic engineering, and quantum computing—termed Web 3.0 Industrial Revolutio...Loe edasi...
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures. In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated tech...Loe edasi...
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems. The integration of AI/ML into the realm of IoT and CPS security has gaine...Loe edasi...
In an increasingly interconnected digital realm, Ubiquitous and Transparent Security: Challenges and Applications emerges as a guiding beacon through the intricate web of modern cybersecurity. In an increasingly interconnected dig...Loe edasi...
Mastering Cybersecurity – A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practic...Loe edasi...
Mastering Cybersecurity – A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practic...Loe edasi...
A two-book set by Matthias Muhlert, consisting of Philosophy.exe and Navigating the Cyber Maze. 1st EditionPhilosophy.exeThe Techno-Philosophical Toolkit for Modern MindsWe live in an age of unprecedented...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It r...Loe edasi...
Building and sustaining cybersecurity in the enterprise isn’t just a technical challenge; it is an organizational imperative. In a world where most guidance is geared toward mid-sized environments, Integrated Assurance fills a critical gap...Loe edasi...
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Loe edasi...
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Loe edasi...
It’s scary in the boardroom. Global board members now face punishing hands-on oversight demands for risk, technology, liability, diversity and sustainability. Yet the board of directors system, our universal governance model, was never designed...Loe edasi...
Ralph’s new book gathers the first-hand, best-practice boardroom hacks from around the world -- intelligence that boards must have now to do a better oversight job, with less time, less effort, and fewer legal dangers. It’s scary...Loe edasi...
In this handbook, leading scholars in criminology, critical race studies, history, indigenous studies, law, philosophy, political science, psychology, and sociology study the intersections of surveillance and race. The volume examines the latest sur...Loe edasi...
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber thr...Loe edasi...
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. This book sheds light on the cyber security...Loe edasi...
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Loe edasi...
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments. It delves into how AI enhances the governance of information security by automating processes...Loe edasi...