Structured around strategic foundations, operational developments, and emerging threats, the book examines how Türkiye has adapted to the evolving landscape of terrorism....Lasīt vairāk
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Lasīt vairāk
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Lasīt vairāk
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Lasīt vairāk
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Lasīt vairāk
Safety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously h...Lasīt vairāk
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Lasīt vairāk
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Lasīt vairāk
This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It r...Lasīt vairāk
Building and sustaining cybersecurity in the enterprise isnt just a technical challenge; it is an organizational imperative. In a world where most guidance is geared toward mid-sized environments, Integrated Assurance fills a critical gap...Lasīt vairāk
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Lasīt vairāk
Designed for professionals, researchers, and decision-makers, this book emphasizes that understanding and leveraging AI in cybersecurity is not just advantageousit is essential for building robust, future-proof defenses in a world where digital s...Lasīt vairāk
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. Traditiona...Lasīt vairāk
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep di...Lasīt vairāk
Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utilizing packet analysis for network security and troubleshooting. This book is ideal for IT professionals, network administrators, and cybersecurity...Lasīt vairāk
Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utilizing packet analysis for network security and troubleshooting. This book is ideal for IT professionals, network administrators, and cybersecu...Lasīt vairāk
The world today is becoming more interconnected than ever before. Because of this, the spread of Misinformation and Disinformation is literally like wildfire, especially with the use of the social media platforms. In this book, we cover this topic i...Lasīt vairāk
The world today is becoming more interconnected than ever before. Because of this, the spread of Misinformation and Disinformation is literally like wildfire, especially with the use of the social media platforms. The world today i...Lasīt vairāk