Add Wish List Add to Cart The item has been added Privacy and Security Policies in Big Data In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security... RRP: $475.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Breaches and Threat Prevention in the Internet of Things As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Detecting and Mitigating Robotic Cyber Security Risks Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and... RRP: $475.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Breaches and Issues Surrounding Online Threat Protection Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Business Analytics and Cyber Security Management in Organizations Traditional marketing techniques have become outdated by the emergence of the internet, and for companies to survive in the new technological marketplace, they must adopt digital marketing and business analytics practices. Unfortunately, with the... RRP: $486.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Online Banking Security Measures and Data Protection Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever... RRP: $486.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Solutions for Hyperconnectivity and the Internet of Things The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its... RRP: $486.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Managing Security Issues and the Hidden Dangers of Wearable Technologies Advances in mobile computing have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden... RRP: $452.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Management in Mobile Cloud Computing Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing... RRP: $339.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Combating Security Breaches and Criminal Activity in the Digital Sphere With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and... RRP: $464.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CODASPY '18 <p>It is our great pleasure to welcome you to the eighth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2018), which follows the successful seven editions held in February/March 2011-2017. This conference series... RRP: $219.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Dreams Have Become Nightmares This book offers a compelling discussion of the digital dreams that have come true, their often unintended side effects (nightmares), and what must be done to counteract the nightmares. It is intended as an impetus to further conversation not only in... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crafting Secure Software Gain a solid understanding of the threat landscape and discover best practices to protect your software factory throughout the SDLC, with valuable insights from security experts at GitGuardianKey Features:- Develop a strong security posture by grasping... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy-Preserving Machine Learning Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breachesKey Features:- Understand machine learning privacy... RRP: $94.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A Non-Techie Beginners' Guide to Cybersecurity and Privacy If you are worried about falling victim to cyber threats and having your sensitive data compromised, then keep reading...Are you tired of constantly worrying about hackers getting into your personal information and compromising your online privacy?Do you... RRP: $58.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Digital Revolution "The Digital Revolution: How Technology is Reshaping Our World" is a compelling and insightful exploration of the profound impact that digital technology has had on every aspect of our lives. From the way we communicate and work to how we learn and play,... RRP: $61.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Earning Online "Earning Online: From Side Hustle to Full-Time Income" is a comprehensive guide for anyone looking to leverage the power of the internet to create a sustainable and profitable online income stream. Whether you're a freelancer, entrepreneur, or someone... RRP: $61.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Simplificando la Ciberseguridad A medida que la tecnología impregna cada vez más nuestras vidas, la seguridad digital ha adquirido una importancia vital. "Simplificando la Ciberseguridad" ofrece una introducción accesible a la ciberseguridad dirigida específicamente a quienes se... RRP: $19.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Encrypted Book of Passwords A password journal with a major difference! An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or... RRP: $19.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Network Protocols for Security Professionals Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey Features:Exploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database,... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mobile Forensics - Advanced Investigative Strategies Master powerful strategies to acquire and analyze evidence from real-life scenariosKey Features:A straightforward guide to address the roadblocks face when doing mobile forensicsSimplify mobile forensics using the right mix of methods, techniques, and... RRP: $114.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market What will you learn from this book?Why and how the European General Data Protection Regulation (GDPR) impacts the online advertising market, particularly advertisers, publishers and users.How advertisers and publishers leverage users' personal data to... RRP: $50.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Datenschutz beim vernetzten und autonomen Fahren. Welche Rahmenbedingungen können sensible Daten schützen? Autonomes Fahren ist längst keine Zukunftsmusik mehr. Doch wie jeder technologische Fortschritt fordert auch sie einen hohen Preis: Unsere Daten. Beim vernetzten Fahren fallen unzählige Daten an. Wie kann die europäische Gesetzgebung dabei sensible Daten... RRP: $123.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Im Spannungsfeld zwischen informationeller Selbstbestimmung und öffentlicher Sicherheit Sicherheitsbehörden greifen auf die Daten von Bürgern zurück, wenn sie eine konkrete Gefahr vermuten. Doch wo liegen die juristischen Grenzen eines solchen Vorgehens?Julian Müller zeigt, in welcher Weise die Quellen-Telekommunikationsüberwachung und... RRP: $143.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added iOS Forensics for Investigators Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey Features:Explore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts,... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Accountability in Computing Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control Mechanisms, are preventive in nature. That is, they stop unauthorized parties before they are able to access data, information and services or... RRP: $156.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Hidden Corporation If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information... RRP: $41.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Memory Forensics A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey Features:Explore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware... RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Okta Administration Plan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for... RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Screen Time Log This Screen Time Log is a perfect way of recording your child's screen time. Keep track of their screentime, take a break from technology, and motivate them to get out and enjoy life. Each interior page includes prompts and space to record the... RRP: $26.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cloud Security Band 2 Digitalisierung, Industrie 4.0 und Economy 4.0 sind Schlagworte, die unsere Gesellschaft und die Unternehmen unserer Zeit beschäftigen. Dieses Buch gibt Antworten auf die Fragen, welche Veränderungen auf Prozesse und Unternehmensstrukturen erfolgen und... RRP: $86.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Foundations of Threat Hunting Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey Features:Learn foundational concepts for effective threat hunting teams in pursuit of cyber... RRP: $81.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud environments, and applications, and become familiar with the latest hacking techniquesKey Features:Master advanced pentesting tactics and... RRP: $86.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Issues and Privacy Threats in Smart Ubiquitous Computing This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and... RRP: $375.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain and Trustworthy Systems This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020.The 42 full papers and the 11 short papers were... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Proceedings of International Conference on Smart Computing and Cyber Security This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7-8, 2020, in the Department... RRP: $616.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Future of Cybersecurity "The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices" explores how cybersecurity is developing and provides information on the best practices, tools, and strategies required to protect digital assets in a... RRP: $37.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Online Safety Made Simple A straightforward guide for seniors on how to stay safe and secure online. This book explains how to recognize scams, protect your data, and build confidence in navigating the internet. RRP: $41.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Space and Outer Space Security This book delves into cutting-edge research, encompassing both theoretical and experimental aspects, as well as innovations in the domains of cyberspace and outer space security. RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Technical Innovation, solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy This book focuses on the best practices and simplest software methods and mechanisms that allow the i3-MARKET backplane reference implementation to be instantiated, tested and validated. RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Password Book for Seniors Introducing our Password Book for Seniors - a Personal Internet Organizer created with seniors in mind. This user-friendly book neatly organizes all your usernames, logins, and web addresses in an alphabetical format for swift and easy access. The... RRP: $17.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Subjective Value of Privacy This book critically examines the subjective value of privacy in the context of state surveillance, exploring how individuals assess costs and benefits of surveillance. It delves into the complex relationship between attitudes towards privacy, security,... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Die Fortentwicklung des Datenschutzes Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, künstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch für die Datenschutz‐Grundverordnung. Die Beiträge... RRP: $214.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Web Services - ICWS 2024 This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024.The 9 full papers presented in this... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Rights in Intellectual Property This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination... RRP: $442.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added OSINT Are you ready to become a master of online open-source due diligence with the guidance of a top industry expert?"This book is an absolute must-have for security and intelligence professionals... "- Angel Villegas, US Army (Retired) / Flashpoint... RRP: $70.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Leveraging Artificial Intelligence (AI) Competencies for Next-Generation Cybersecurity Solutions Details the types of cybersecurity problems faced by businesses and how advanced AI algorithms and models can help eliminate them. Discusses roles of AI in attack prediction and prescription strategies, AI's capacity of battling bots, other security uses... RRP: $462.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Frauds, Scams and their Victims Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are... RRP: $118.00 Add to Cart The item has been added