This new volume focuses on design principles for building self-powered AIoT (artificial intelligence of things) applications and their subsequent deployment.
This unique volume presents cutting-edge research on the nature and extent of a wide range of scams, cons, frauds, and deceptive activities, including sextortion, the use of ransomware, phishing, identity theft, Ponzi schemes, online shopping fraud, gift card scams, and health care fraud targeting elderly victims.
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges.
This book covers how the understanding, as well as controllability, of the quantum electronic properties of carbon structures can be improved through a combined study of structural geometry, electronic properties, and dynamics of resonating valence bonds.
21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated.
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey FeaturesMake the most of Ghidra on different platforms such as Linux, Windows, and macOSUnlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scriptingLearn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomwarePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWritten by David Alvarez Perez, a senior malware analyst at Gen Digital Inc.
This book documents the evolution of the United Nations (UN) Crime Programme and its changing priorities, from the early focus on juvenile delinquency and correctional treatment, to the present preoccupation with transnational organized crime.
Become the Cyber Guardian Your Organization Needs: Mastering the Art of Protecting the Digital RealmIn todays rapidly evolving digital landscape, the role of a Chief Information Security Officer (CISO) has never been more critical.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27-29 October 2023.
The web application stack - a growing threat vector Understand the threat and learn how to defend your organisationThis book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the web and the application against potential attacks.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection.
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical.
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
A comprehensive guide to managing an information security incidentEven when organisations take precautions, they may still be at risk of a data breach.
Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications thoroughly explores cybersecurity principles, strategies, and technologies crucial for protecting digital assets and combating evolving cyber threats in critical industries.
In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.
Build a strategic response to cyber attacksThe activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Preparation for the Certified Penetration Testing Engineer (CPTE) examinationPenetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack.
A compendium of essential information for the modern security entrepreneur and practitionerThe modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection.
Protect your organisation by building a security-minded culture With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a firm basis on which to build an effective cyber security training programme.
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.