The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.
This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions.
This book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.
This book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.
This edited volume showcases research on vulnerable victimizations, or more specifically, on individuals and/or populations that, due to their status, have less power in society, are socially controlled in unique ways in the criminal-legal system, or are members of marginalized groups with specialized considerations surrounding their victimization experiences, such as LGBTQIA+ individuals, immigrants, incarcerated persons, children, and females.
This edited volume showcases research on vulnerable victimizations, or more specifically, on individuals and/or populations that, due to their status, have less power in society, are socially controlled in unique ways in the criminal-legal system, or are members of marginalized groups with specialized considerations surrounding their victimization experiences, such as LGBTQIA+ individuals, immigrants, incarcerated persons, children, and females.
A quick, easy-to-read synthesis of theory, guidelines, and evidence-based research, this book offers timely, practical guidance for library and information professionals who must navigate ethical crises in information privacy and stay on top of emerging privacy trends.
Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into using machine learning and AI for automating threat detection and responseGet a thorough understanding of Python essentials, tailored for security professionalsDiscover real-world applications of Python automation for enhanced securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigned to address the most common pain point for security teams-scalability-Security Automation with Python leverages the author's years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization's overall security posture.
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples.
Businesses have faced a variety of difficulties as a result of the global pandemic, and how they responded to this disruption has affected both their resilience and their ability to get through this crisis.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
This book offers a comprehensive exploration of the profound challenges and opportunities presented by deepfake technology across industries, society, and governance.
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM examTake the 2022 version of ISACA s challenging Certified Information Security Manager exam with confidence using this comprehensive self-study collection.
This book offers a comprehensive exploration of the profound challenges and opportunities presented by deepfake technology across industries, society, and governance.
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks analyzes diverse machine learning techniques, including supervised, unsupervised, reinforcement, and deep learning, along with their applications in detecting and preventing cyberattacks in future IoT systems.
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM examTake the 2022 version of ISACA s challenging Certified Information Security Manager exam with confidence using this comprehensive self-study collection.
This book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments.