nav atļauts
nav atļauts
Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).
Nepieciešamā programmatūra
Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)
Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)
Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.
Part I: Foundations of Cyber Defense and Risk Assessment
Chapter 1: AI-Powered Strategies for Advanced Malware Detection and Prevention
Chapter 2: Advancing Malware Classification with Hybrid Deep Learning
Chapter 3: A Comprehensive Overview of AI-Driven Behavioral Analysis for Security in Internet of Things
Chapter 4: A Deep Dive into IoT Security: Machine Learning Solutions and Research Perspectives
Chapter 5: Exploring Blockchain Techniques for Enhancing IoT Security and Privacy: A Comprehensive Analysis
Part II: Analyzing and Responding to Emerging Threats
Chapter 6: Integrating Security Analysis Module for Proactive Threat Intelligence
Chapter 7: Security Study of Web Applications through a White Box Audit Approach: A Case Study
Chapter 8: Case Study Method: A Step-by-Step Black Box Audit for Security Study of Web Applications
Chapter 9: Security in Cloud-Based IoT: A Survey
Chapter 10: Exploring IoT penetration testing: From fundamentals to practical setup
Chapter 11: A Fuzzy Logic-Based trust system for detecting selfish nodes and encouraging cooperation in Optimized Link State Routing protocol
Chapter 12: Collaborative Cloud-SDN Architecture for IoT Privacy-Preserving Based on Federated Learning
Chapter 13: An adaptive cybersecurity strategy based on game theory to manage emerging threats In The SDN Infrastructure
Part III: Human-Centric Risk Mitigation Approaches
Chapter 14: A Human-Centric Approach to Cyber Risk Mitigation
Chapter 15: Human Factors in Cyber Defense
Chapter 16: Security Operation Center: Towards A Maturity Model