Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book examines critical topics in Smart Cities such as true sustainability and the resilience... Læs mere
Bemærk: Kan leveres før jul.
This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.
Bemærk: Kan leveres før jul.
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as “Digital Forensics”.... Læs mere
Bemærk: Kan leveres før jul.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Bemærk: Kan leveres før jul.
The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow.
Bemærk: Kan leveres før jul.
In this book we detail the tenets and provisions of three key Data Privacy Laws. We also provide a general framework at the end as to how a business can come into compliance with these various Data Privacy Laws.
Bemærk: Kan leveres før jul.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of... Læs mere
Bemærk: Kan leveres før jul.
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.
Bemærk: Kan leveres før jul.
In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of... Læs mere
Bemærk: Kan leveres før jul.
‘Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize. This book delves into the vulnerabilities that define our interconnected world.
Bemærk: Kan leveres før jul.
This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of Privacy and Data Protection Laws.