In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain-computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate.
In der modernen IT-Landschaft sind Störungen unvermeidlich – doch wie können sie schnell und effizient behoben werden, ohne den Betrieb zu beeinträchtigen?
This book is based on the best papers accepted for presentation during the AISMA-2023: International Workshop on Advanced in Information Security Management and Applications on September 29 - October 1, 2023 in online mode at Stavropol, Krasnoyarsk, Russia.
This book is based on the best papers accepted for presentation during the AISMA-2023: International Workshop on Advanced in Information Security Management and Applications on September 29 - October 1, 2023 in online mode at Stavropol, Krasnoyarsk, Russia.
Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data.
Lista de tareas obligatorias que un empleado debería de conocer a la hora de empezar a trabajar en una empresa que conlleva el uso de un equipo informático.
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea.
Gateway Routing Selection Schemes for Post Disaster Recovery in Mobile Ad Hoc Networks bridges the gap by providing practical guidelines for an efficient design and performance evaluation of gateway selection schemes to manage load balancing.
Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
A comprehensive guide to understanding and implementing database security, covering essential topics such as threats, controls, encryption, and data integrity.
This book provides a critical analysis of existing enterprise risk management models and practices and proposes innovative solutions to address the challenges associated with implementing enterprise risk management strategies.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
This book provides a critical analysis of existing enterprise risk management models and practices and proposes innovative solutions to address the challenges associated with implementing enterprise risk management strategies.