The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
Para evitar ser hackeado, evitar riscos on-line ou perdas financeiras e manter-se informado, este manual, "Um Guia para Segurança Cibernética, Segurança na Internet e Proteção para Crianças, Adolescentes, Pais e Profissionais" responderá às suas perguntas sobre como proteger sua vida digital, evitar roubo de identidade, evitar ataques cibernéticos e proteger sua privacidade social.
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "e;best of the best"e; on what works and what doesn't, as a CISO, in a unique storytelling format.
Digital Forensic Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, Second Edition provides a one-stop shop for a set of procedures that meet international best practices and standards for handling digital evidence during its complete lifecycle.
This book highlights a comprehensive overview of the recent advancements and challenges in the field of cybersecurity with a focus on the integration of artificial intelligence (AI), machine learning (ML), and blockchain technologies.
Umsetzbare Sicherheitsstrategien – auch für Unternehmen und Organisationen mit kleinen Budgets- Das komplexe Thema »Informationssicherheit« zugänglich und praxisnah aufbereitet.
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possibilities in mitigating cyber risks.
The chapters in this book explore the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media.
This book presents high-quality, peer-reviewed papers from Fourth International Conference on Advanced Computational and Communication Paradigms (ICACCP 2023), organized by Department of Computer Science and Engineering (CSE), Sikkim Manipal Institute of Technology (SMIT), Sikkim, India, during February 16-18, 2023.
The effective use of data is foundational to the concept of a learning health systemone that leverages and shares data to learn from every patient experience, and feeds the results back to clinicians, patients and families, and health care executives to transform health, health care, and health equity.
El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy.
This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense.
This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS).
Improve cloud security within your organization by leveraging AWS's Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework.
The chapters in this book explore the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media.
En este documento exploramos cuál ha sido la respuesta de la ley y la jurisprudencia colombianas frente a las tensiones entre la intimidad y la publicidad de los datos.
This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS).
Bringing together cutting-edge theory and research that bridges academic disciplines from criminology and criminal justice, to developmental psychology, sociology, and political science, Thinking About Victimization offers an authoritative and refreshingly accessible overview of scholarship on the nature, sources, and consequences of victimization.
Critical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these.
This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense.