Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
In einer Welt, in der KI-Technologien rasch fortschreiten und Datenschutzfragen immer wichtiger werden, bietet dieses Buch wertvolle Einblicke und praktische Lösungen.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
This book delves into the revolutionary ways in which AI-driven innovations are enhancing every aspect of cybersecurity, from threat detection and response automation to risk management and endpoint protection.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
Umsetzbare Sicherheitsstrategien – auch für Unternehmen und Organisationen mit kleinen Budgets- Das komplexe Thema »Informationssicherheit« zugänglich und praxisnah aufbereitet.
Bringing together cutting-edge theory and research that bridges academic disciplines from criminology and criminal justice, to developmental psychology, sociology, and political science, Thinking About Victimization offers an authoritative and refreshingly accessible overview of scholarship on the nature, sources, and consequences of victimization.
Critical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these.
Bringing together cutting-edge theory and research that bridges academic disciplines from criminology and criminal justice, to developmental psychology, sociology, and political science, Thinking About Victimization offers an authoritative and refreshingly accessible overview of scholarship on the nature, sources, and consequences of victimization.
Memetic War analyses memetic warfare included in cyber war and aims to develop a framework for understanding the parameters included in utilising this concept in Ukraine as a part of civic resistance.
Memetic War analyses memetic warfare included in cyber war and aims to develop a framework for understanding the parameters included in utilising this concept in Ukraine as a part of civic resistance.
This book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.
This book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.
This edited volume showcases research on vulnerable victimizations, or more specifically, on individuals and/or populations that, due to their status, have less power in society, are socially controlled in unique ways in the criminal-legal system, or are members of marginalized groups with specialized considerations surrounding their victimization experiences, such as LGBTQIA+ individuals, immigrants, incarcerated persons, children, and females.
This edited volume showcases research on vulnerable victimizations, or more specifically, on individuals and/or populations that, due to their status, have less power in society, are socially controlled in unique ways in the criminal-legal system, or are members of marginalized groups with specialized considerations surrounding their victimization experiences, such as LGBTQIA+ individuals, immigrants, incarcerated persons, children, and females.
Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.
Examining how victimisation can occur across the online-offline continuum while emphasising the need for a holistic approach to understanding and addressing contemporary harms, this book covers various themes of victimisation in the digital age linked to the interconnectedness and blurred boundaries between online and offline experiences.
Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web.