George Dimitoglou, Leonidas Deligiannidis, Hamid R. Arabnia
Serija: Intelligent Computing
(Išleidimo metai: 20-Oct-2025, Hardback, Leidėjas: De Gruyter, ISBN-13: 9783111436418)
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber thre...Daugiau...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Daugiau...
Serija: River Publishers Rapids Series in Digital Security and Forensics
(Išleidimo metai: 14-Oct-2025, Hardback, Leidėjas: River Publishers, ISBN-13: 9788770041676)
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks. It covers IoMT security challenges, potential attacks, and...Daugiau...
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation--not through legislation.Explosive revelations, from the Snowden disclosures to the Cambridge Analytica s...Daugiau...
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation--not through legislation. It will be of interest to researchers and practitioners in the field of corporate surv...Daugiau...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Daugiau...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Daugiau...
The rapid advancement of Artificial Intelligence (AI) is revolutionizing key sectors critical to global progress. AI Frontiers: Transforming Health, Agriculture, and Education delves into how cutting-edge AI innovations are addressin...Daugiau...
This book explores the exciting field of quantum computing, which is changing how we approach computation. It covers the basics, cybersecurity aspects, advanced machine learning techniques, and the many ways quantum computing can be used. Quantum...Daugiau...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Daugiau...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Daugiau...
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersecurity for business analytics. This book explores addressing the growing need for insights and practical...Daugiau...
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and the implications it can have. An acc...Daugiau...
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and the implications it can have. An acc...Daugiau...
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Daugiau...
Take your ethical hacking skills to the next level by mastering bash script and building your own hacking tools Key Features Learn how to automate reconnaissance, exploitation, and post exploitation using bash scripts Dive into...Daugiau...
Explore practical cryptographic methods using Python to secure data, encrypt communications, and implement real-world security techniques for modern applications Key Features Learn cryptographic techniques with Python for real-...Daugiau...
The Future of Hacking Looks Different Than You Think surveys hackers and ethical hacking and explores the experiences of the people working to defend us from cyber-attacks. It explores diverse topics on cybersecurity, Internet freedom, cyber awarene...Daugiau...
Rise of the Machines: A Project Zero Trust Story is a continuation of the 2023 bestseller Project Zero Trust, picking up where the first book left off and addressing issues not covered in the first installment: artificial intelligence,...Daugiau...
This book provides a timely exploration of strategies for aligning Artificial Intelligence (AI) with long-term human goals, ensuring that AI acts as an empowering force across multiple dimensions. Drawing on interdisciplinary researc...Daugiau...
The book examines the integration of IoT, Blockchain, and Smart Healthcare, providing a comprehensive analysis of these advanced technologies and their impact on the healthcare industry. It offers practical examples of how Blockchain and IoT devic...Daugiau...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our timedigital security. The internet wasnt built for time travelers. But when et...Daugiau...
A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our timedigital security. The internet wasnt built for time travelers. But when et...Daugiau...
Gain expertise in primary evasion techniques by studying notable examples and analyzing the leading security and response solutions available in the market. Key Features Gain a thorough understanding of the inner workings of Wi...Daugiau...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internets evolution - from its humble, stat...Daugiau...
From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internets evolution - from its humble, stat...Daugiau...
As managers digitize judgment using AI, their evaluations of persons risk imposing benefits and burdens in opaque and unaccountable ways. This Element offers a useful evaluative framework for those interpreting and applying laws of data protection a...Daugiau...
(Išleidimo metai: 31-Aug-2025, Hardback, Leidėjas: Cambridge University Press, ISBN-13: 9781009627368)
As managers digitize judgment using AI, their evaluations of persons risk imposing benefits and burdens in opaque and unaccountable ways. This Element offers a useful evaluative framework for those interpreting and applying laws of data protection a...Daugiau...
(Išleidimo metai: 31-Aug-2025, Hardback, Leidėjas: Cambridge University Press, ISBN-13: 9781009613514)
Maps the development of data rights that formed and reformed in response to the socio-technical transformations of the postwar twentieth century. The authors situate these rights, with their early pragmatic emphasis on fair information processing, a...Daugiau...
Maps the development of data rights that formed and reformed in response to the socio-technical transformations of the postwar twentieth century. The authors situate these rights, with their early pragmatic emphasis on fair information processing, a...Daugiau...
The main purpose of this book is to analyze and evaluate what has been carried out regarding NATOs operational arrangements and its Cyber Defense approach, and, secondly, to explain this in the lens of Game Theory. ...Daugiau...
The main purpose of this book is to analyze and evaluate what has been carried out regarding NATOs operational arrangements and its Cyber Defense approach, and, secondly, to explain this in the lens of Game Theory. ...Daugiau...
This book is a complete exploration of the profound impact that blockchain technology will have on industries and society through the lens of ethics and regulation. As blockchain revolutionizes all things from financial services to healthcare, this...Daugiau...
The astonishing, behind-the-scenes story of the race to perfect the greatest invention in human history, artificial intelligence, and the men, women and companies that seek to profit from it all....Daugiau...
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. This book sheds light on the cyber security...Daugiau...
Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These i...Daugiau...
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensiv...Daugiau...
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensiv...Daugiau...
Become a cybersecurity expert with comprehensive CAS-005 preparation using this detailed guide packed with practical insights, mock exams, diagrams, and actionable strategies that align with modern enterprise security demands Key Features...Daugiau...
Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscape of cyber defense Key Features Explore the Security Copilot ecosystem and learn to design effective prompts, promptbooks, and c...Daugiau...
Serija: Assistant Professor in Law and Director of the Information Law & Policy Centre at the Institute of Advanced Legal Studies
(Išleidimo metai: 22-Jul-2025, Hardback, Leidėjas: Oxford University Press, ISBN-13: 9780198837169)
This book provides the first comprehensive doctrinal and comparative study to examine the influence of the fundamental human right to respect for private life on data retention within EU law, specifically communications data and passenger name record...Daugiau...
The proceedings of the International Conference on Digital Economy and Law, Artificial Intelligence and Media Communication (DLAM 2024) is a compilation of cutting-edge research into the dynamic intersections of technology, law, and media, and the...Daugiau...