The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
Wahlmanipulation, Erpressung, Rufmord, Handel mit Kinderpornografie: Viele traditionelle Formen der Kriminalität bedienen sich zunehmend moderner Informations- und Kommunikationstechnologien – die Digitalisierung der Kriminalität schreitet voran.
This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it.
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
A generation ago, "e;cyberspace"e; was just a term from science fiction, used to describe the nascent network of computers linking a few university labs.
A generation ago, "e;cyberspace"e; was just a term from science fiction, used to describe the nascent network of computers linking a few university labs.
Der Stromausfall in ganz Berlin ist Auftakt einer Anschlagserie - eine unbekannte Aktivistengruppe namens NTR kämpt gegen die zunehmende Versklavung des Menschen durch Technik.
THE INSTANT NEW YORK TIMES BESTSELLER'An intricately detailed, deeply sourced and reported history of the origins and growth of the cyberweapons market .
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)"e;Written in the hot, propulsive prose of a spy thriller"e; (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021The instant New York Times bestsellerA Financial Times and The Times Book of the Year'A terrifying expos ' The Times'Part John le Carr .
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer theHuffington Post says "e;knows all of Anonymous' deepest, darkest secrets.
Ins Netz gegangen – von Hackern, Dieben und SpionenLahmgelegte Industrieanlagen, gestohlene Geheimdokumente und Firmengeheimnisse, manipulierte Wasserkraftwerke, ausgespähte Kontodaten – unsere Abhängigkeit von Computersystemen hat sich zur Achillesferse unseres Lebens entwickelt.
* THE NEW YORK TIMES BESTSELLER ** Future-proof yourself and your business by reading this book * Technological advances have benefited our world in immeasurable ways, but there is an ominous flipside.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.
Cybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation.