Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture.
Bemærk: Kan ikke leveres før jul.
This book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing... Læs mere
Bemærk: Kan ikke leveres før jul.
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed.
Bemærk: Kan ikke leveres før jul.
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be... Læs mere
Bemærk: Kan leveres før jul.
With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips readers with the knowledge and tools needed to effectively... Læs mere
Bemærk: Kan leveres før jul.
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the “best of the best” on what works and what doesn’t, as a CISO, in a unique storytelling format.
Bemærk: Kan leveres før jul.
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as “Digital Forensics”.... Læs mere
Bemærk: Kan ikke leveres før jul.
This volume discusses and analyzes the various effective practical applications of cyber-physical systems, which involves the integration of the physical process with embedded computation, controller, and network monitoring along with the feedback loop from physical systems.
Bemærk: Kan ikke leveres før jul.
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies.
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt.
Bemærk: Kan leveres før jul.
This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses.