Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language).
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices.
As we go about our day-to-day lives, digital information about who we are is gathered from all angles via biometric scans, passport applications, and, of course, social media.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios.
Embark on a journey to business evolution grounded in the real-world experiences and challenges faced by those at the forefront of the Web2 revolution.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
Cyber warfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century.
In an increasingly interconnected and digital world, this book provides comprehensive guidance on cybersecurity leadership specifically tailored to the context of public policy and administration in the Global South.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value with a broad impact on Internet of Things (IoT), Data Science, society, industry, commerce, and government.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2023), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, from 02-04 November, 2023.
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices.
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security.
Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments.
Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments.
El concepto de Big Data no solo hace referencia a grandes colecciones de datos, caracterizadas tanto por su volumen como por la variedad de formatos, sino que incluye también los sistemas y las tecnologías encargadas de almacenar, procesar y dar valor a toda esa información.
This book covers how the understanding, as well as controllability, of the quantum electronic properties of carbon structures can be improved through a combined study of structural geometry, electronic properties, and dynamics of resonating valence bonds.
Advancements in computational intelligence, which encompasses artificial intelligence, machine learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data.
Advancements in computational intelligence, which encompasses artificial intelligence, machine learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data.
This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U.
This new volume focuses on design principles for building self-powered AIoT (artificial intelligence of things) applications and their subsequent deployment.