AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possib...Daugiau...
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine...Daugiau...
This book offers a groundbreaking exploration of how Artificial Intelligence is revolutionizing cybersecurity and digital forensics. It covers a wide range of topics, from AI-based threat detection and zero-day vulnerability defense to legal framewo...Daugiau...
The book covers the role of emerging technologies such as blockchain technology, machine learning, IoT, cryptography etc. in digital asset management. It discusses digital asset management applications in different domains like healthcare, travel in...Daugiau...
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity. Authored by cybersecurity leader Alex Stevens, the book brings together his...Daugiau...
Explores challenge of securing sensitive medical data in the face of rising cyber threats. Examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare systems and environments. Integrates advanced technol...Daugiau...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Daugiau...
Delves into the nexus of cybersecurity, data science, and sustainable development in a variety of areas. The book serves as a comprehensive guide for researchers, practitioners, policymakers, and stakeholders navigating the complex landscape of cybe...Daugiau...
The objective of this book is to exhibit recent solutions and to discuss the opportunities that AI, Blockchain, and even their combinations can present to solve the issue of IoT security....Daugiau...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Daugiau...
Secure Health confronts these challenges head-on, offering a comprehensive exploration of the latest advancements and best practices in securing digital health systems....Daugiau...
The industrial landscape and global society are changing rapidly, driven by the growing adoption of the Industrial Internet of Things (IIoT) and Artificial Intelligence (AI) technologies. As IIoT and AI become more pervasive, they also offer new sec...Daugiau...
Thoroughly revised to include the latest industry developments, the Second Edition presents a comprehensive overview of computer validation and verification principles and how to put them into practice. To provide the current best practice and guida...Daugiau...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Daugiau...
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different at...Daugiau...
The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions, f...Daugiau...
This ground-breaking book distills the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all practitioners handling client-confidential conversations and data....Daugiau...
The book responds to the realities of cybersecurity in the context of healthcare. It examines the effects of a sector where the pervasiveness and proliferation of various eHealth innovations have created a threat domain wherein policy and regulation...Daugiau...
The third edition has expended coverage essential topics such as threat analysis, data gathering, risk analysis, and risk assessment methods and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply cha...Daugiau...
This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines....Daugiau...