Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approac...Lasīt vairāk
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, informat...Lasīt vairāk
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and Wireless Sensor Networks (WSN) technologies. It is a valuable resource for readers interested in the security and priva...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standa...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, indus...Lasīt vairāk
This book helps to reduce risks of data loss by monitoring and controlling the flow of sensitive data via the network, email or web. This book also shows the guidance about data protection that data is not corrupted, is accessible for authorized pur...Lasīt vairāk
Aligning security with business goals is vital for managing risks without harm. This book shows CISOs how to use marketing conceptslike segmentation and SRMto customise messaging, build relationships, and enhance business alignment. Discover strateg...Lasīt vairāk
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing. While technical issues are fundamental in understanding how to improve system security, analyzing the roles of human agents is cru...Lasīt vairāk
This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of Privacy and Data Protection Laws....Lasīt vairāk
In Book 3, 5th and 6th graders are maturing, becoming more independent and online activities are second nature. From Street-smart to Web-wise®: A Cyber Safety Training Manual Built for Teachers and Designed for Children, isnt just another bookits...Lasīt vairāk
In the digital era, the pace of technological advancement is unprecedented, and the interconnectivity of systems and processes has reached unprecedented levels. Digital Resilience, Cybersecurity and Supply Chains considers the intricacies of digital...Lasīt vairāk
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge. This book delves into the complexities of protecting sensitive location data within the dynami...Lasīt vairāk
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Lasīt vairāk
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges....Lasīt vairāk
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. This isnt just another bookits a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confi...Lasīt vairāk
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Lasīt vairāk
The book explains the power, and routing optimization in underwater sensor networks, advanced cross-layer framework, challenges, security issues in underwater sensor networks, and the use of machine learning and deep learning techniques for security...Lasīt vairāk
(Izdošanas datums: 22-Nov-2024, Izdevniecība: Apple Academic Press Inc., ISBN-13: 9781003478096)
Details the types of cybersecurity problems faced by businesses and how advanced AI algorithms and models can help eliminate them. Discusses roles of AI in attack prediction and prescription strategies, AIs capacity of battling bots, other security...Lasīt vairāk