As the Internet increasingly affects how we live and work, the challenges posed by borderless cybersecurity threats remain largely unaddressed. This book examines cybersecurity challenges, governance responses to them, and their limitations, engagin...Lasīt vairāk
The Future of Hacking Looks Different Than You Think surveys hackers and ethical hacking and explores the experiences of the people working to defend us from cyber-attacks. It explores diverse topics on cybersecurity, Internet freedom, cyber awarene...Lasīt vairāk
Information security analysts are among the rising STEM-based careers. This book explores the education and training needed to become an information security analyst, job responsibilities, and the future outlook for this career-- Provided by publis...Lasīt vairāk
(Izdošanas datums: 24-Jul-2025, Paperback / softback, Izdevniecība: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284302509)
This book is designed for anyone who wants to gain knowledge and hands-on experience with working, administrating, and managing IT network infrastructure in business organizations. Its perfect for introducing the basics of network security-explorin...Lasīt vairāk
Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phas...Lasīt vairāk
In todays rapidly evolving digital landscape, safeguarding critical data and systems has never been more vitalor more challenging. Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient...Lasīt vairāk
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, inform...Lasīt vairāk
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies. It provides detailed insights into the unique security and privacy conce...Lasīt vairāk
Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively propels businesses forward, enabling innovation and growth in the face of an evolving digi...Lasīt vairāk
Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively propels businesses forward, enabling innovation and growth in the face of an evolving digi...Lasīt vairāk
Discover how to use your digital technology safely, and avoid dangerous contacts and websites. Young people are often targeted online in a variety of ways. Find out how to stay safe online while enjoying all that computers have to offer us. STEM sta...Lasīt vairāk
To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the signif...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations,...Lasīt vairāk
This book aims to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third-party arrangements and emphasises that organisations retain account...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulatio...Lasīt vairāk