Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.
Bemærk: Kan ikke leveres før jul.
This book contributes to the literature on organized crime by providing a detailed... Læs mere
Bemærk: Kan ikke leveres før jul.
Aslam and Gunaratna bring together a broad analysis of the responses of states in Asia to the threats presented by the Covid-19 pandemic in its early phase.
Bemærk: Kan ikke leveres før jul.
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as “Digital Forensics”.... Læs mere
Bemærk: Kan leveres før jul.
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as “Digital Forensics”.... Læs mere
Bemærk: Kan ikke leveres før jul.
In this context, the book offers readers hopes as well as warnings about how technology can be used for the public good, and especially those working in government, law enforcement and technology companies can learn useful lessons from it.
Bemærk: Kan ikke leveres før jul.
In an era defined by rapid digital transformation, "Agile Security in the Digital Era: Challenges and Cybersecurity Trends" emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
Bemærk: Kan ikke leveres før jul.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Bemærk: Kan leveres før jul.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Bemærk: Kan ikke leveres før jul.
Details the types of cybersecurity problems faced by businesses and how advanced AI algorithms and models... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centred around the semantic annotation of domain-specific source documentation.