Add Wish List Add to Cart The item has been added Advancements in Cybersecurity This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, information... RRP: $410.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The CISO 3.0 The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise. RRP: $128.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crime-Related Events Identification Based on Text Analytics Approach Crime-Related Events Identification Based on Text Analytics Approach describes the possibilities of extracting crime-related facts from semi-structured information from various Internet sources, so that crime can be combatted. The book is aimed at police... RRP: $237.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity in Knowledge Management The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine... RRP: $296.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity of Discrete Event Systems Su's book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the first in the DES community to provide a thorough introduction of smart cyberattacks on supervisory control systems. RRP: $237.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Implementation in Internet of Medical Things This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel... RRP: $118.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added The Zero Trust Framework In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography. RRP: $81.39 $51.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to Cybersecurity in the Internet of Things This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture. RRP: $359.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crypto Millionaires The story of Blockchain is not just a tale of mathematical experiments. It's primarily a story of the age-old attempt to record human activities and the value that flows from them. This time, however, the goal is to make it accessible to everyone on... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added It's Your Digital Life This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Crime Investigator's Field Guide Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition... RRP: $154.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Routledge Companion to Global Cyber-Security Strategy This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an... RRP: $564.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Burners and Black Markets Tired of being spied on? Encrypt yourself and explore a deep web of exotic goods, banned items & secret files, anonymously and free. Instantly. If you want to live the life of a superhacker, spy or CIA agent, be James Bond or Ethan Hunt for a time... RRP: $45.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Big Data im Marketing. Wenn Datenschutz und Wirtschaft aufeinandertreffen Studienarbeit aus dem Jahr 2021 im Fachbereich BWL - Offline-Marketing und Online-Marketing, Note: 1,7, , Sprache: Deutsch, Abstract: Inwieweit können Unternehmen anhand von gesammelten Daten ihre Nutzer auch offline steuern? Wer sich heute an... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Forensics and Incident Response - Second Edition Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Modern Cryptography for Cybersecurity Professionals As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at... RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Unveiling the NIST Risk Management Framework (RMF) Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risksKey Features- Implement NIST RMF with step-by-step instructions for effective security operations- Draw insights... RRP: $67.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Career Master Plan Get started with cybersecurity and progress with the help of expert tips to get certified, find a job, and moreKey Features:Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurityExplore expert tips... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Kali Linux Web Penetration Testing Cookbook RRP: $114.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Image-Based Spam Detection and Filtering Techniques Security technologies have advanced at an accelerated pace in the past few decades. These advancements in cyber security have benefitted many organizations and companies interested in protecting their virtual assets. Advanced Image-Based Spam Detection... RRP: $396.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Research on Cyber Crime and Information Privacy, VOL 1 RRP: $417.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Warfare and Terrorism RRP: $615.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Research on Cyber Crime and Information Privacy, VOL 2 RRP: $417.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Law, Privacy, and Security RRP: $559.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security and Threats RRP: $559.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Pervasive Information Security and Privacy Developments Privacy and security concerns are at the forefront of research and critical study in the prevalence of information technology. Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical,... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in Virtual Worlds, 3D Webs, and Immersive Environments Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications, very little is... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Law, Policy, and Technology In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism,... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Applied Cryptography for Cyber Security and Defense In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Serious Game Design and Development The increasing use of games in learning has drawn the attention of numerous disciplines within the scientific community now seeking to understand the nature of its effectiveness and guidance for how to best harness its innovative technology power... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Assurance and Security Technologies for Risk Assessment and Threat Management The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Identity and Access Management Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added ICT Ethics and Security in the 21st Century The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption of and access to new products, tools, and software. ICT Ethics and Security in the 21st Century: New... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy Assurance in Advancing Technologies Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Actor-Network Theory and Technology Innovation About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn't until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security, Cyber Crime and Cyber Forensics Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing,... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Personal Data Privacy and Protection in a Surveillance Era In recent years, with rapidly advancing technology and a more globalized culture, the importance of privacy has become paramount. The legal protection of privacy against these new technological threats is a major discussion point in Europe as well as in... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added ICT Acceptance, Investment and Organization The Arab world exhibits its own values and beliefs and poses specific challenges that are reflected on its practices of systems development, implementation and management. ICT is at the forefront of those challenges. ICT Acceptance, Investment and... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CODASPY'19 <p>It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series... RRP: $230.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Dummies' Guide to Cyber Safety "In the Digital Jungle: Navigating Cyber Threats and Safeguarding Your Online World"In a world driven by technology, our lives have seamlessly intertwined with the digital realm. But as we traverse this intricate network of ones and zeros, we often find... RRP: $22.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Pentesting APIs Learn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approachKey Features:- Gain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIs- Follow practical advice and... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added AWS Security Cookbook - Second Edition Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, while following cloud security best practicesKey Features:- Explore useful recipes for implementing robust cloud security solutions on... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hack the Cybersecurity Interview - Second Edition Uncover the secrets to acing interviews, decode the diverse roles in cybersecurity, and soar to new heights with expert adviceKey Features:- Confidently handle technical and soft skill questions across various cybersecurity roles- Prepare for... RRP: $85.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks,... RRP: $644.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy in Smart Sensor Networks Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures... RRP: $486.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy Management, Techniques, and Protocols The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information... RRP: $464.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security, Privacy, and Anonymization in Social Networks Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks:... RRP: $351.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Research on Information Security in Biomedical Signal Processing Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information... RRP: $735.00 Add to Cart The item has been added