Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business... Læs mere
Bemærk: Kan ikke leveres før jul.
Many applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house... Læs mere
Bemærk: Kan ikke leveres før jul.
The book begins by identifying the technological features from which security issues arise. It describes how the Internet may be compromised by malware and examines... Læs mere
Bemærk: Kan leveres før jul.
Ensure your marketing is GDPR/DPDI compliant whilst navigating technological changes and optimizing customer experience with this practical and user-friendly guide.
Bemærk: Kan ikke leveres før jul.
Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt.
Bemærk: Kan ikke leveres før jul.
The book is a compilation of authoritative perspectives on General Data Protection Regulation (GDPR) of experts from Industry, Law (EU and US), Academia, Banks, Cyber Security, Digital Forensics, eDiscovery, Investigations, and Cyber Insurance.
Bemærk: Kan leveres før jul.
This book provides the first study on digital constitutionalism in Europe. The research explains the European... Læs mere
Bemærk: Kan leveres før jul.
This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Bemærk: Kan leveres før jul.
This book provides a nuanced exploration of digital data governance, highlighting the importance of cooperation across sectors to adapt to an... Læs mere
Bemærk: Kan ikke leveres før jul.
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the cyber risk investment model and the cybersecurity risk management framework within the DevOps process.
Bemærk: Kan ikke leveres før jul.