This book uses an interdisciplinary approach to discuss international law and conflict in the Indo-Pacific region, covering topics such as maritime security, climate change and international relations. The book will be of interest to researchers in...Daugiau...
(Išleidimo metai: 31-Jul-2025, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781003608059)
The central theme of the book is that cybersecurity is not just an IT issue but a critical business imperative that requires involvement and oversight at the highest levels of an organization....Daugiau...
The Digital Environment and Small States in Europe delves into how the digital revolution intersects with global security dynamics and reshapes the geopolitical landscape....Daugiau...
Cybersecurity of the Industrial Internet of Things (IIoT) contends the critical question of how to secure IIoT systems against the intensifying risks posed by cyber threats and attacks. This book is a fundamental guide for industrial leaders and pro...Daugiau...
Securing Talent: Building and Retaining High-Performance Cybersecurity Teams by Dr. Kevin Lynn McLaughlin, PhD, offers a comprehensive and insightful exploration into the critical role culture plays in the cybersecurity field....Daugiau...
This book presents cutting-edge research and advancements in the rapidly evolving fields of cybersecurity, cybercrimes, and smart emerging technologies. It serves as a comprehensive reference guide for the latest trends and challenges in securing ou...Daugiau...
Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approac...Daugiau...
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments....Daugiau...
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering....Daugiau...
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, informat...Daugiau...
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possib...Daugiau...
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and Wireless Sensor Networks (WSN) technologies. It is a valuable resource for readers interested in the security and priva...Daugiau...
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understa...Daugiau...
In todays digital age, companies need to adopt cutting-edge artificial intelligence solutions to effectively detect and counter potential threats. This handbook brings together a team of experts to discuss insights on proactive strategies, threat m...Daugiau...
This book delves into the interplay between algorithm design, quantum computing, human behavior, and the evolving landscape of cybersecurity regulation. It highlights the evolution in cybersecurity driven by breakthroughs in algorithmic development...Daugiau...
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine...Daugiau...
Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standa...Daugiau...
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, indus...Daugiau...
This book helps to reduce risks of data loss by monitoring and controlling the flow of sensitive data via the network, email or web. This book also shows the guidance about data protection that data is not corrupted, is accessible for authorized pur...Daugiau...