Add Wish List Add to Cart The item has been added Turkish Counterterrorism Strategy against the PKK Structured around strategic foundations, operational developments, and emerging threats, the book examines how Türkiye has adapted to the evolving landscape of terrorism. RRP: $466.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Auditing Artificial Intelligence Auditing Artificial Intelligence is an essential guide for IT auditors, information security experts, and risk management professionals seeking to understand, evaluate, and mitigate AI-related risks. RRP: $120.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security, Forensics and National Security There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architectures. RRP: $299.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Internet of Things Security, Second Edition A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey Features:- Learn best practices to secure your data from the device to the cloud- Use... RRP: $125.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Digital Environment and Small States in Europe The Digital Environment and Small States in Europe delves into how the digital revolution intersects with global security dynamics and reshapes the geopolitical landscape. RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advancements in Cybersecurity This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, information... RRP: $410.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The CIO's Guide to Information Security Incident Management This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The CISO 3.0 The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise. RRP: $128.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Go Where the Bugs Are This Festschrift, dedicated to Wolfgang Reif on the occasion of his 65th birthday, collects contributions written by many of his closest research colleagues and many of his former students.After obtaining his PhD in Karlsruhe in 1991, Wolfgang was... RRP: $149.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Architect Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies... RRP: $43.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Auditor The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent introduction to the role, covering areas such as purpose, required skills,... RRP: $43.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Cybersecurity Self-Help Guide This book is an up-to-date self-help guide on Cybersecurity for everyone who connects to the Internet and uses technology. It is an effort to spread awareness about Cybersecurity by explaining techniques and methods to be implemented practically by... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IoT Security Paradigms and Applications Present book highlights these challenges and provide an integrating framework for these technologies illustrating role of blockchain in all the possible facets of IoT security. Further, it investigates the security and privacy issues associated with... RRP: $398.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Fundamentals Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and... RRP: $188.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Secure Transmission of Telemedicine-Based Bio-Medical Images With the increasing reliance on telemedicine, ensuring the secure transmission of medical images is crucial for protecting patient privacy and maintaining the integrity of healthcare data. Unauthorized access, data tampering, or loss can compromise... RRP: $462.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crime-Related Events Identification Based on Text Analytics Approach Crime-Related Events Identification Based on Text Analytics Approach describes the possibilities of extracting crime-related facts from semi-structured information from various Internet sources, so that crime can be combatted. The book is aimed at police... RRP: $237.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity in Knowledge Management The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine... RRP: $296.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptography in C and C++ RRP: $134.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Verification of Computer Codes in Computational Science and Engineering How can one systematically show that computer codes are correctly solving equations? Verification of Computer Codes in Computational Science and Engineering sets forth a powerful procedure called OVMSP: Order-Verification via the Manufactured Solution... RRP: $410.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Elliptic and Hyperelliptic Curve Cryptography This handbook is the first exhaustive study of virtually all of the mathematical aspects of curve-based public key cryptography. It provides a wealth of ready-to-use algorithms enabling fast implementation along with recommendations for selecting... RRP: $564.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Honeypots A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject... RRP: $462.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Smiling Security Every business, large and small, is vulnerable to cyber attack. If your company isn't well protected, its systems may be compromised by sophisticated hackers with malicious intentions. Business owners, boards, CEOs, and cyber security managers must work... RRP: $49.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Wireless Multimedia Communication Systems Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems:... RRP: $666.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Transnational Security Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and... RRP: $297.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Gang Injunctions and Abatement As gang violence continues to rise across the country and the world, police departments, prosecutors, and community members are seeking new methods to reduce the spread of gang-related criminal activity. Civil gang injunctions have become a growing... RRP: $392.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to Cryptography with Open-Source Software Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of... RRP: $231.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity of Discrete Event Systems Su's book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the first in the DES community to provide a thorough introduction of smart cyberattacks on supervisory control systems. RRP: $237.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computational Intelligence for Cybersecurity Management and Applications The book offers comprehensive coverage of the essential topics, including machine Learning and Deep Learning for cybersecurity, blockchain for cybersecurity and privacy, security engineering for Cyber-physical systems, AI and Data Analytics techniques... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity for Decision Makers This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Implementation in Internet of Medical Things This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security Using Modern Technologies The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain and IoT Integration The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by "smart" machines. This book explores the platforms and applications of blockchain-enabled... RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy and Security Challenges in Cloud Computing The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT... RRP: $121.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added An Integrated Approach to Home Security and Safety Systems This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter home with harmful intentions. RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Criminal Investigations in Correctional Facilities The felonious activities of prisoners reach out into society every day. These inmates run lucrative drug operations, commit fraud, hire contract murders, and commit a multitude of criminal offenses from inside the walls of our prisons. Practical Criminal... RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy in Internet of Things (IoTs) The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Location Privacy in Wireless Sensor Networks Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Securing Cyber-Physical Systems Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to Certificateless Cryptography As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Intrusion Detection and Prevention for Mobile Ecosystems This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Empirical Research for Software Security Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Communication Networks for Smart Grids This book presents an application-centric approach to the development of smart grid communication architecture. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand... RRP: $137.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security for Automatic Speaker Identification The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking,... RRP: $75.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A Classical Introduction to Cryptography Exercise Book Prehistory of Cryptography.- Conventional Cryptography.- Dedicated Conventional Cryptographic Primitives.- Conventional Security Analysis.- Security Protocols with Conventional Cryptography.- Algorithmic Algebra.- Algorithmic Number Theory.- Elements of... RRP: $101.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Economics of Identity Theft Identity in Economics, and in Context.- Modern Technological and Traditional Social Identities.- Identity Theft.- Who Owns You?.- Defeating the Greatest Masquerade.- Secrecy, Privacy, Identity.- Security and Privacy as Market Failures.- Trusting Code and... RRP: $171.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Community Policing in Indigenous Communities Indigenous communities are typically those that challenge the laws of the nation states of which they have become-often very reluctantly-a part. Around the world, community policing has emerged in many of these regions as a product of their physical... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Expert Oracle Application Express Security Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle... RRP: $82.00 Add to Cart The item has been added