Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applicatio...Lasīt vairāk
George Dimitoglou, Leonidas Deligiannidis, Hamid R. Arabnia
Sērija : Intelligent Computing
(Izdošanas datums: 20-Oct-2025, Hardback, Izdevniecība: De Gruyter, ISBN-13: 9783111436418)
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber thre...Lasīt vairāk
Structured around strategic foundations, operational developments, and emerging threats, the book examines how Türkiye has adapted to the evolving landscape of terrorism....Lasīt vairāk
Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineering and scientific principles behind the metaverse, a 3D digital world designed to replicate and enhance physical reality...Lasīt vairāk
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Lasīt vairāk
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Lasīt vairāk
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Lasīt vairāk
Russia, China, Iran, Saudi Arabia, Turkey, North Korea and India are engaged in foreign information manipulation and interference (FIMI) in the democratic practices of countries in Europe, America, Africa and Asia. The Ukraine, in particular, has...Lasīt vairāk
From the author of Tokyo Vice comes the wild, true story of cyber-era commerce, crime, cold-hard cash, and one of the greatest heists in history.Even in hell, Bitcoin talks. This modern take on an old Japanese sayi...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Lasīt vairāk
Agbotiname Lucky Imoize, Webert Montlouis, Segun I. Popoola, Mohammad Hammoudeh
Sērija : River Publishers Series in Digital Security and Forensics
(Izdošanas datums: 14-Oct-2025, Hardback, Izdevniecība: River Publishers, ISBN-13: 9788743801290)
This book provides a comprehensive analysis of security and privacy in cyber-physical systems, covering threat detection, cryptographic mechanisms, machine learning-based intrusion detection, and blockchain security....Lasīt vairāk
Sērija : River Publishers Rapids Series in Digital Security and Forensics
(Izdošanas datums: 14-Oct-2025, Hardback, Izdevniecība: River Publishers, ISBN-13: 9788770041676)
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks. It covers IoMT security challenges, potential attacks, and...Lasīt vairāk
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation--not through legislation.Explosive revelations, from the Snowden disclosures to the Cambridge Analytica s...Lasīt vairāk
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation--not through legislation. It will be of interest to researchers and practitioners in the field of corporate surv...Lasīt vairāk
Fault tree analysis is key tool in risk analysis. It is a widely used industry standard with applications in amongst others, the aerospace, automotive, chemical and nuclear industries.Society depends on complex engineering systems such as (...Lasīt vairāk
This book highlights how AI agents and Large Language Models (LLMs) are set to revolutionize the finance and trading sectors in unprecedented ways. These technologies bring a new level of sophistication to data analysis and decision-making, enabli...Lasīt vairāk
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Lasīt vairāk
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Lasīt vairāk
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Lasīt vairāk
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Lasīt vairāk
The field of edge computing is advancing quickly, with new algorithms, architectures, and use cases emerging regularly. Intelligent mobile edge computing includes various domainssuch as IoT, AI, and telecommunicationsmaking it essential to provi...Lasīt vairāk
This book provides a comprehensive introduction to blockchain and distributed ledger technology (DLT). Intended as an applied guide for hands-on practitioners, this book includes detailed examples and...Lasīt vairāk
The rapid advancement of Artificial Intelligence (AI) is revolutionizing key sectors critical to global progress. AI Frontiers: Transforming Health, Agriculture, and Education delves into how cutting-edge AI innovations are addressin...Lasīt vairāk
This book aims to provide a comprehensive exploration of the evolving field of Cyber-Physical Systems (CPS) and its intersecting domain, Internet of Things (IoT) security. It delves into the fundamental concepts, emerging threats, and cutting-edge s...Lasīt vairāk
AI will fundamentally change the way business is conducted across most industries. Organizations that excel at leveraging secure, responsible AI to advance their strategic objectives will have a distinct advantage. Those that do not may see their...Lasīt vairāk
(Izdošanas datums: 02-Oct-2025, Hardback, Izdevniecība: Naval Institute Press, ISBN-13: 9781682475850)
This book outlines the various threats that cyber warfare poses to operations in the maritime environment (defined broadly) and the abilities of modern navies to defend against those threats. It explains how navies are organized and equipped for cybe...Lasīt vairāk
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Lasīt vairāk
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Lasīt vairāk