Russia, China, Iran, Saudi Arabia, Turkey, North Korea and India are engaged in foreign information manipulation and interference (FIMI) in the democratic practices of countries in Europe, America, Africa and Asia. The Ukraine, in particular, has...Daugiau...
The field of edge computing is advancing quickly, with new algorithms, architectures, and use cases emerging regularly. Intelligent mobile edge computing includes various domainssuch as IoT, AI, and telecommunicationsmaking it essential to provi...Daugiau...
This book explores the transformative role of artificial intelligence (AI) in the field of digital forensics, offering a comprehensive over...Daugiau...
This book aims to provide a comprehensive exploration of the evolving field of Cyber-Physical Systems (CPS) and its intersecting domain, Internet of Things (IoT) security. It delves into the fundamental concepts, emerging threats, and cutting-edge s...Daugiau...
AI will fundamentally change the way business is conducted across most industries. Organizations that excel at leveraging secure, responsible AI to advance their strategic objectives will have a distinct advantage. Those that do not may see their...Daugiau...
(Išleidimo metai: 01-Oct-2025, Hardback, Leidėjas: Institution of Engineering and Technology, ISBN-13: 9781837240319)
This book explores how AI and Explainable AI-based cybersecurity algorithms and methods are used to tackle cybersecurity challenges such as threats, intrusions and attacks to preserve data privacy and ensure trust, accountability, transparency and c...Daugiau...
A comprehensive bundle of authoritative prep resources for the A+ certification exams: Study, practice, and reviewthe Sybex way! Based on the popular Sybex Study Guide approach, the CompTIA A+ Complete Certification Kit, 6th Edition...Daugiau...
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making tra...Daugiau...
Pro Azure Governance and Security will be an indispensable guide for IT professionals, cloud architects, and security engineers aiming to master the latest governance and security practices within Microsoft Azure. This updated edition will build on...Daugiau...
Take your ethical hacking skills to the next level by mastering bash script and building your own hacking tools Key Features Learn how to automate reconnaissance, exploitation, and post exploitation using bash scripts Dive into...Daugiau...
Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as...Daugiau...
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret key algorithms (symmetric ciphers) have been designed as Feistel networks, and it is possible to design many others. The most fam...Daugiau...
This book explores innovative methods to enhance cybersecurity by leveraging official and unofficial information sources on the web. While traditional approaches like Cyber Thr...Daugiau...
Rise of the Machines: A Project Zero Trust Story is a continuation of the 2023 bestseller Project Zero Trust, picking up where the first book left off and addressing issues not covered in the first installment: artificial intelligence,...Daugiau...
Learn the most important topics in securing AWS environments through a strategic combination of fundamental principles, real-case studies, and hands-on practice to battle new generations of cyber-attacks. The book offers a definitive guide to AWS...Daugiau...
This open access book invites readers to explore the emerging opportunities and strategic significance of quantum technologies in the context of cybersecurity. It collects the latest trends and insights into the evolution of quantum computing and...Daugiau...
This book is a guide to Storycasting for futures and forecasting practitioners. A portmanteau of storytelling and Threatcasting, Storycasting is a supplementary application of the Threatcasting model, which develops meaningful and human-centri...Daugiau...
Your complete, accurate resource for the updated CompTIA A+ Core 1 and Core 2 exams In the newly revised sixth edition of CompTIA A+ Complete Study Guide 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202,...Daugiau...
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples...Daugiau...
color: #262626;>This book proposes the architecture of artificial intelligence (AI) security and safety, discusses the topics about AI for security, AI security and AI safety, and makes an in-depth study on the ethical code of AI security and safet...Daugiau...
In todays rapidly evolving technological landscape, managing artificial intelligence effectively is crucial for both private-sector companies and public-sector organizations. This book provides a robust and ethical framework to guide you through the...Daugiau...
This book aims to provide readers with practical knowledge of the fundamentals of the digital transition concept, tools for designing and managing the operation of sm...Daugiau...
Learn essential strategies to streamline and secure your organizations data handling from a cybersecurity expert who has trained military intelligence personnel.When a cyber security incident occurs, how does anyone know? Data must le...Daugiau...