Navigate the complex landscape of Artificial Intelligence (AI) governance and model risk management using a holistic approach encompassing people, processes, and technology.
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels.
Wussten Sie, dass die häufigsten Cloud-Sicherheitsbedrohungen auf Fehlkonfigurationen von Cloud-Diensten und nicht auf Angriffe von außen zurückzuführen sind?
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by the School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during January 5-6, 2024.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by the School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during January 5-6, 2024.
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality and tourism industry to investigate the potential of these technologies in revolutionizing the industry.
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program.
A comprehensive guide to understanding and implementing database security, covering essential topics such as threats, controls, encryption, and data integrity.
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis.
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program.
This innovative resource provides comprehensive coverage of the policies, practices, and guidelines needed to address the security issues related to today's wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems.
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses.
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system.
Artificial Intelligence in Forensic Science addresses the current and emerging opportunities being utilized to apply modern Artificial Intelligence (AI) technologies to current forensic and investigation practices.
This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioners, and non-experts in the field.