Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure.
This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions.
Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
The IT Security Governance Guidebook with Security Program Metrics provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs.
Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, Business Intelligence for Telecommunications identifies those advances in both methods and technology that are being employed to inform decision-making and give companies an edge in the rapidly growing and highly competitive telecommunications industry.
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.
Structured into three distinct parts, this book is an indispensable resource for navigating the evolution of education and professional training in the age of artificial intelligence (AI) and virtual reality.
Taking a broad approach that speaks to experienced and inexperienced process improvement practitioners, CMMI experts and CMMI novices, this second edition thoroughly examines the latest version of the CMMI.
The workplace landscape has evolved dramatically over the past few decades, and with this transformation comes an ever-present threat: cybersecurity risks.
AI iQ for a Human-Focused Future: Strategy, Talent, and Culture offers a pioneering approach to integrating artificial intelligence (AI) and generative AI (GenAI) in business, emphasizing a business strategy first mindset over a technologycentric one.
If you have a business or a nonprofit organization, or if you re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital.
The concept of Internet of Things has silently existed since the late nineteenth century but in the current decade expectations and excitement has peaked.
The concept of Internet of Things has silently existed since the late nineteenth century but in the current decade expectations and excitement has peaked.