The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments....Lasīt vairāk
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Lasīt vairāk
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standa...Lasīt vairāk
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, indus...Lasīt vairāk
A Cybersecurity Leaders Journey: Speaking the Language of the Board equips leaders with the skills to translate technical expertise into business-savvy communication that builds trust and drives informed decision-making....Lasīt vairāk
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the best of the best on what works and what doesnt, as a CISO, in a unique storytelling format....Lasīt vairāk
Thoroughly revised to include the latest industry developments, the Second Edition presents a comprehensive overview of computer validation and verification principles and how to put them into practice. To provide the current best practice and guida...Lasīt vairāk
This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business driven risk assessments to meet the intent of Privacy and Data Protection Laws. The aim of this book is to demonstrate the use...Lasīt vairāk
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the cyber risk investment model and the cybersecurity risk management framework within the DevOps process....Lasīt vairāk
In this freshly updated edition, Barak Engel adds new sections that correspond with the chapters of the original book: security as a discipline; as a business enabler; in sales; in legal; in compliance; in technology; and as an executive function. T...Lasīt vairāk
The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security....Lasīt vairāk
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics....Lasīt vairāk
The book offers comprehensive coverage of the essential topics, including machine Learning and Deep Learning for cybersecurity, blockchain for cybersecurity and privacy, security engineering for Cyber-physical systems, AI and Data Analytics techniqu...Lasīt vairāk
This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for o...Lasīt vairāk
The Security Risk Handbook provides clear and comprehensive guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, audit. Packed with tools and templates, the book is...Lasīt vairāk
Covering cyber security and Industry 4.0 concepts from a management and operational level, this book connects the topics of Industry 4.0 and cyber security together seamlessly. It discusses both the risks and solutions of using cyber security techni...Lasīt vairāk
IT and cybersecurity teams have had a long-standing battle between functionality and security. To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how IT a...Lasīt vairāk