|
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...
Editeur :
Wiley
Parution :
2025-08-26
PDF, ePub
|
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....
Editeur :
Wiley
Parution :
2025-08-15
PDF, ePub
|
Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces...
Editeur :
Wiley
Parution :
2025-03-11
Collection :
Tech Today
PDF, ePub
|
Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats...
Editeur :
Wiley-Scrivener
Parution :
2025-02-14
PDF, ePub
|
A hands-on, beginner-friendly intro to web application pentesting InA Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book,...
Editeur :
Wiley
Parution :
2025-01-07
Collection :
Tech Today
PDF, ePub
|
This book is an essential resource for anyone seeking to stay ahead in the dynamic field of cybersecurity, providing a comprehensive toolkit for understanding and combating digital threats and offering practical, insightful guidance ideal for cybersecurity...
Editeur :
Wiley-Scrivener
Parution :
2024-11-13
Collection :
Advances in Antenna, Microwave, and Communication Engineering
PDF, ePub
|
Maritime infrastructures are fundamental to the working of societies and economies. They play a crucial role in supply, with 90% of commercial trade exchanges carried out worldwide handled by the maritime industry, in the functioning of the economy, the maintenance of...
Editeur :
SAGE Publications Ltd
Parution :
2024-10-15
PDF
|
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?...
Editeur :
Wiley
Parution :
2024-08-20
PDF, ePub
|
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits“A comprehensive,...
Editeur :
Wiley
Parution :
2024-08-07
PDF
|
Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in...
Editeur :
Wiley
Parution :
2024-07-31
PDF, ePub
|
CISSP Study Guide - fully updated for the 2024CISSP Body of Knowledge ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated based on the latest 2024CISSP Detailed Content Outline. This bestselling...
Editeur :
Sybex
Parution :
2024-05-24
Collection :
Sybex Study Guide
PDF, ePub
|
Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality...
Editeur :
Wiley-IEEE Press
Parution :
2024-05-24
Collection :
IEEE Press Series on Human-Machine Systems
PDF
|
Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...
Editeur :
Wiley
Parution :
2024-03-26
PDF, ePub
|
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice...
Editeur :
Wiley
Parution :
2024-03-20
PDF, ePub
|
The accelerating pace at which quantum computing is developing makes it almost inevitable that some of the major cryptographic algorithms and protocols we rely on daily, for everything from internet shopping to running our critical infrastructure, may be compromised in...
Editeur :
SAGE Publications Ltd
Parution :
2024-03-15
PDF
|
Der schwarze Gürtel für das Netz Sie wollen Ihre Privatsphäre und Ihre digitale Identität schützen? Dabei hilft Ihnen dieses Buch. Christina Czeschik klärt Sie darüber auf, wo Sie welche Daten und Metadaten hinterlassen, und hilft Ihnen dann dabei, darüber die...
Editeur :
Wiley-VCH
Parution :
2024-02-19
Collection :
Für Dummies
ePub
|
Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential...
Editeur :
Wiley
Parution :
2024-02-08
PDF, ePub
|
The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and...
Editeur :
SAGE Publications Ltd
Parution :
2023-06-01
PDF, ePub
|
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...
Editeur :
Wiley-IEEE Press
Parution :
2023-05-16
PDF, ePub
|
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you...
Editeur :
Wiley
Parution :
2023-04-06
PDF, ePub
|