This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Daugiau...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Daugiau...
Secure Health confronts these challenges head-on, offering a comprehensive exploration of the latest advancements and best practices in securing digital health systems....Daugiau...
Thoroughly revised to include the latest industry developments, the Second Edition presents a comprehensive overview of computer validation and verification principles and how to put them into practice. To provide the current best practice and guida...Daugiau...
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different at...Daugiau...
The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions, f...Daugiau...
The book responds to the realities of cybersecurity in the context of healthcare. It examines the effects of a sector where the pervasiveness and proliferation of various eHealth innovations have created a threat domain wherein policy and regulation...Daugiau...
The wave of data breaches raises two pressing questions: Why dont we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions....Daugiau...
This comprehensive book offers valuable insights while using a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber securit...Daugiau...
The ultimate CISA prep guide, with practice exams Sybexs CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updat...Daugiau...
The IT Security Governance Guidebook with Security Program Metrics on downloadable resources provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise pro...Daugiau...
Presents a perspective of the ISO/IEC 17799 Information Security Standard and provides an analysis of how to effectively measure an information security program using this standard. This book includes a qualitative-based risk assessment methodology....Daugiau...