Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
A comprehensive guide to understanding and implementing database security, covering essential topics such as threats, controls, encryption, and data integrity.
This book provides a critical analysis of existing enterprise risk management models and practices and proposes innovative solutions to address the challenges associated with implementing enterprise risk management strategies.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
This book provides a critical analysis of existing enterprise risk management models and practices and proposes innovative solutions to address the challenges associated with implementing enterprise risk management strategies.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during 5-6 January 2024.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during 5-6 January 2024.
This book delves into the critical realm of trust management within the Internet of Vehicles (IOV) networks, exploring its multifaceted implications on safety and security which forms part of the intelligent transportation system domain.
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
This book builds on the popular GARDENER OF GOVERNANCE article, which enjoys amazing traction in the professional community globally and has been translated into 25+ languages.
We stand on the cusp of a digital revolution, with Web3 technologies gaining momentum and proving pivotal in shaping the future of finance, art, governance, and social interactions.