(Išleidimo metai: 24-Oct-2024, Paperback / softback, Leidėjas: John Wiley & Sons Inc, ISBN-13: 9781394269167)
Discover the future of cybersecurity through the eyes of the worlds first augmented ethical hacker In Human Hacked: My Life and Lessons as the Worlds First Augmented Ethical Hacker by Len Noe, a pioneering cyborg with ten microc...Daugiau...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Daugiau...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Daugiau...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Daugiau...
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Daugiau...
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practic...Daugiau...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Daugiau...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Daugiau...
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersecurity for business analytics. This book explores addressing the growing need for insights and practical...Daugiau...
(Išleidimo metai: 01-Oct-2025, Hardback, Leidėjas: Institution of Engineering and Technology, ISBN-13: 9781837240319)
This book explores how AI and Explainable AI-based cybersecurity algorithms and methods are used to tackle cybersecurity challenges such as threats, intrusions and attacks to preserve data privacy and ensure trust, accountability, transparency and c...Daugiau...
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Daugiau...
Designed for professionals, researchers, and decision-makers, this book emphasizes that understanding and leveraging AI in cybersecurity is not just advantageousit is essential for building robust, future-proof defenses in a world where digital s...Daugiau...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. Traditiona...Daugiau...
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep di...Daugiau...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our timedigital security. The internet wasnt built for time travelers. But when et...Daugiau...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our timedigital security. The internet wasnt built for time travelers. But when et...Daugiau...
Artificial Intelligence (AI) has revolutionized digital forensics, bringing previously unheard-of powers to this field. This book explores the advancements, applications, challenges, and solutions that AI brings to the realm of digital forensics....Daugiau...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internets evolution - from its humble, stat...Daugiau...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internets evolution - from its humble, stat...Daugiau...