Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. It discusses current thought on ethics and... Læs mere
Bemærk: Kan leveres før jul.
With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips readers with the knowledge and tools needed to effectively... Læs mere
Bemærk: Kan leveres før jul.
This book provides a holistic overview of the complexities of modern technological advances and their implications for crime and security.
Bemærk: Kan leveres før jul.
Rooted in original research and the author’s experience working with thousands of kids and families, this book provides... Læs mere
Bemærk: Kan leveres før jul.
In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book examines critical topics in Smart Cities such as true sustainability and the resilience... Læs mere
Bemærk: Kan leveres før jul.
This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.
Bemærk: Kan leveres før jul.
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as “Digital Forensics”.... Læs mere
Bemærk: Kan leveres før jul.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Bemærk: Kan leveres før jul.
The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow.
Bemærk: Kan leveres før jul.
In this book we detail the tenets and provisions of three key Data Privacy Laws. We also provide a general framework at the end as to how a business can come into compliance with these various Data Privacy Laws.