Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
Bemærk: Kan ikke leveres før jul.
This open access book discusses the most modern approach to auditing complex digital systems and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance... Læs mere
Bemærk: Kan ikke leveres før jul.
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security.
Bemærk: Kan ikke leveres før jul.
This is a book for everyone - a wide audience. Experts, academic lecturers, as well as students of technical fields such as computer science and social sciences will find the content interesting.
Bemærk: Kan ikke leveres før jul.
The main objective of this book is to introduce cyber security using modern technologies like AI,... Læs mere
Bemærk: Kan ikke leveres før jul.
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
Bemærk: Kan ikke leveres før jul.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
Bemærk: Kan ikke leveres før jul.
Clinical Psychologist and former intelligence officer Eric Shaw brings over 30 years of psychological consultation experience... Læs mere
Bemærk: Kan ikke leveres før jul.
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provide a complete picture... Læs mere
Bemærk: Kan leveres før jul.
This book introduces embedded software engineering and management methods, proposing the relevant testing theory and techniques that promise the final realization of automated testing of embedded systems.
Bemærk: Kan ikke leveres før jul.
This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications.