Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations by John Spencer-Taylor reveals powerful strategies to transform bold ideas into thriving businesses.
This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security.
This book presents high-quality, peer-reviewed papers from 3rd International Conference on "e;Universal Threats in Expert Applications and Solutions"e; (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6-9, 2024.
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management.
This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma.
This book consists of twelve chapters covering the design aspects, their feasibility, mathematical modeling by numerical, experimental, computational and simulation approaches.
This book consists of twelve chapters covering the design aspects, their feasibility, mathematical modeling by numerical, experimental, computational and simulation approaches.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
Dieses Buch bietet eine umfassende Einführung in die Welt der Datensicherung und führt durch die essenziellen Bereiche – von Bedrohungen bis hin zu praktischen Schutzstrategien.
Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure security, including the skills needed to implement security controls, maintain an organization's security posture, and identify and remediate security vulnerabilities.
Dieses Buch bietet eine umfassende Einführung in die Welt der Datensicherung und führt durch die essenziellen Bereiche – von Bedrohungen bis hin zu praktischen Schutzstrategien.
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs).
With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.