In Members, Methods, and Measures, Thomas E. Armstrong delivers the guide he wishes he had when he was thrust into managementwithout a roadmap, training, or support....Loe edasi...
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments....Loe edasi...
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Loe edasi...
Biometric Technology & Authentication is an update to the first edition of this book. Some of the updates include newer images, and an extensive review as to how both the AWS and Microsoft Azure can be used to host a Biometrics In The Cloud Infrastr...Loe edasi...
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity. Authored by cybersecurity leader Alex Stevens, the book brings together his...Loe edasi...
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity. This book aims to provide readers with a comprehensive unde...Loe edasi...
This book builds on the popular GARDENER OF GOVERNANCE article. The Lenz-Jeppesen (2022) thought-piece introduced the 5 Ps as paths for the betterment of internal auditing: People, Public, Performance (Prosperity), Purpose (Profession), and Planet....Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
Delves into the nexus of cybersecurity, data science, and sustainable development in a variety of areas. The book serves as a comprehensive guide for researchers, practitioners, policymakers, and stakeholders navigating the complex landscape of cybe...Loe edasi...
Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in todays digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more i...Loe edasi...
With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips readers with the knowledge and tools needed to effectively investigate and mitigate cyber threats in the age of smart devices. Cyber Investigations o...Loe edasi...
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defi...Loe edasi...
In todays ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of...Loe edasi...
The objective of this book is to exhibit recent solutions and to discuss the opportunities that AI, Blockchain, and even their combinations can present to solve the issue of IoT security....Loe edasi...
The major contribution of Antiterrorism and Threat Response: Planning and Implementation, 2e is the detailed instruction and practical advice on how to see the weaknesses and vulnerabilities in physical protection systems and upgrade them to meet th...Loe edasi...
Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90 of cyber attacks exploit human vulnerabilities, as highlighted by the 2022 Global Risks Report from the World Economic Forum....Loe edasi...
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations....Loe edasi...
Loss Control Auditing: A Guide for Conducting Fire, Safety, and Security Audits is a one-stop resource for both developing and executing a loss control audit program. This fully updated second edition addresses loss control auditing from the perspec...Loe edasi...
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threa...Loe edasi...
This book investigates Cyber Resilience in Critical Infrastructure and introduces 49 case studies from various parts of the world. As military tensions rise, nations are alarmed and focused on their national cyber resilience, especially the reliabil...Loe edasi...
This is the story of a visionary leader who needs a strategy to transform the processes and deliver better results for stakeholders at all levels within the organization. The audit committee, all levels of management, and employees expect more from...Loe edasi...
With its comprehensive analysis of all aspects of the SOFC, from team building to incident response, this book is an invaluable resource to establish and operate a successful SOFC. The everyday operations of a SOFC are thoroughly examined, including...Loe edasi...
This is a book for everyone - a wide audience. Experts, academic lecturers, as well as students of technical fields such as computer science and social sciences will find the content interesting....Loe edasi...
In the current business climate, the pace of regulatory change is a significant business risk, and Compliance departments are under increasing pressure to keep up and adapt their organisations accordingly. This new edition updates what has become an...Loe edasi...
In this book, we change the perspective on an organizations operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk...Loe edasi...
This book explores all the aspects of implementing and maintaining a PKI and reflects decades of hard won experience in PKI, IT, business, government agencies and academia alike. This is the ONE book on PKI that you have to have on your shelf, wheth...Loe edasi...
The book provides proven methods to prevent and resolve challenges faced by todays hospitality security staff and leadershipoutlining inherent risks to the sector, how to assess such risks, and methods to mitigate, eliminate, or transfer those risks...Loe edasi...
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success ofand insight provided bythe first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka r...Loe edasi...
If you are looking for a comprehensive study and reference source on blockchain technology, then The Auditors Guide to Blockchain Technology is a must read for all security and assurance professionals and students looking to become more proficient a...Loe edasi...
The book provides an end-to-end view of the Zero Trust approach across organizations digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements and Implementation Approach that could significantly benefit...Loe edasi...
To meet the needs of creating modern supply chains, the authors analyze and present current and future solutions that affect security and the continuity of supply chains....Loe edasi...
Cyber-Physical Systems (CPS) is a mechanism which is monitored and controlled by computer-based algorithms. In the construction sector, CPS systems helps in increasing the efficiency of building projects with lower costs, lesser time, and management...Loe edasi...
The digitalization of companies is a recurrent topic of conversation for managers. Long gone are the days of auditors specializing in one technique. This book proposes how you step by step go from a common understanding of our history of auditing to...Loe edasi...
This book covers many cyber and ransom attacks and events including how we have got to the point of massive digital utilisation and particularly, during the Global Lockdown and pandemic that is Covid-19 to online spending that will see twice the mon...Loe edasi...
This book will address the cybersecurity and cooperate governance challenges associated with enterprises, providing a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area....Loe edasi...
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the comp...Loe edasi...
This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines....Loe edasi...
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. It provides just enough practical skills and techniques for security leaders to get the job...Loe edasi...
Boko Haram analyzes the activities and atrocities of Nigerias Jihadi terrorist group, Boko Haram in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leade...Loe edasi...
Private Security and the Investigative Process, Fourth Edition targets those students in the early phases of their study of private sector justice and the principles of investigative practice most relevant to the private security industry. The book...Loe edasi...
Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into...Loe edasi...
Intelligence Analysis Fundamentals is an introductory, accessible text and concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles....Loe edasi...
This book provides internationally relevant insights on the challenges of increasing private sector involvement with victims of domestic abuse, and offers a unique crossover of the literature on private security, crime prevention and family violence...Loe edasi...
Strategic Security provides security managers, and those aspiring to the position, to think strategically about their job, the culture of their workplace, and the nature of security planning and implementation....Loe edasi...
Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violen...Loe edasi...
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, trave...Loe edasi...
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This...Loe edasi...
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its develo...Loe edasi...