Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
Finance Transformation: Leadership on Digital Transformation and Disruptive Innovation is a general and wide-ranging survey of finance transformation and emerging technologies.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security.
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management.
This book covers user experience methods and tools in designing user friendly products and servicesby encompassing widely utilized successful methods, including elicitation, analysis and establishment of requirements, collaborative idea generation with design teams and intended users, prototype testing and evaluation of the user experience through empirical and non empirical means.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.
Global criminology is an emerging field covering international and transnational crimes that have not traditionally been the focus of mainstream criminology or criminal justice.
This book explores the intersection of legal frameworks, healthcare innovation, and computational intelligence, shedding light on how emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping the medical landscape.
In an era where digital devices increasingly mediate our perception of reality, this book explores the tension between the richness of direct sensory experience and the allure of the screen.
This book provides insights into how AI is changing legal practice, government processes, and individuals' access to those processes, encouraging each of us to consider how technological advances are changing the legal system.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
This book provides insights into how AI is changing legal practice, government processes, and individuals' access to those processes, encouraging each of us to consider how technological advances are changing the legal system.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technolo
The Naked Android: Synthetic Socialness and the Human Gaze illuminates the connection between the stories people tell, their expectations of what a robot is, and how these beliefs and values manifest in how real robots are designed and used.
In a rapidly evolving world where technology is increasingly integrated into our daily lives, security has become a top priority for individuals, organizations, and governments.
By enabling the conversion of traditional manufacturing systems into contemporary digitalized ones, Internet of Things (IoT) adoption in manufacturing creates huge economic prospects through reshaping industries.
This book offers readers a holistic understanding of intelligent environments, encompassingtheir definition, design, interaction paradigms, the role of Artificial Intelligence (AI), and theassociated broader philosophical and procedural aspects.
The Naked Android: Synthetic Socialness and the Human Gaze illuminates the connection between the stories people tell, their expectations of what a robot is, and how these beliefs and values manifest in how real robots are designed and used.
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.