Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniq...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful role of huma...Loe edasi...
This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It ref...Loe edasi...
Ralphs new book gathers the first-hand, best-practice boardroom hacks from around the world -- intelligence that boards must have now to do a better oversight job, with less time, less effort, and fewer legal dangers....Loe edasi...
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments....Loe edasi...
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Loe edasi...
Biometric Technology & Authentication is an update to the first edition of this book. Some of the updates include newer images, and an extensive review as to how both the AWS and Microsoft Azure can be used to host a Biometrics In The Cloud Infrastr...Loe edasi...
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity. Authored by cybersecurity leader Alex Stevens, the book brings together his...Loe edasi...
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity. This book aims to provide readers with a comprehensive unde...Loe edasi...
This book builds on the popular GARDENER OF GOVERNANCE article. The Lenz-Jeppesen (2022) thought-piece introduced the 5 Ps as paths for the betterment of internal auditing: People, Public, Performance (Prosperity), Purpose (Profession), and Planet....Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
Delves into the nexus of cybersecurity, data science, and sustainable development in a variety of areas. The book serves as a comprehensive guide for researchers, practitioners, policymakers, and stakeholders navigating the complex landscape of cybe...Loe edasi...
Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in todays digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more i...Loe edasi...
With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips readers with the knowledge and tools needed to effectively investigate and mitigate cyber threats in the age of smart devices. Cyber Investigations o...Loe edasi...
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defi...Loe edasi...
In todays ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of...Loe edasi...
The objective of this book is to exhibit recent solutions and to discuss the opportunities that AI, Blockchain, and even their combinations can present to solve the issue of IoT security....Loe edasi...
The major contribution of Antiterrorism and Threat Response: Planning and Implementation, 2e is the detailed instruction and practical advice on how to see the weaknesses and vulnerabilities in physical protection systems and upgrade them to meet th...Loe edasi...