Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior.
Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior.
Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession.
Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession.
With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems.
Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour.
Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens.
Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens.
Cyber Victimology provides a global socio-legal-victimological perspective on victimisation online, written in clear, non-technical terms, and presents practical solutions for the problem.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions.
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly.
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages.
Mobile Heritage explores how diverse digital technologies (such as apps, GPS, games, social platforms, NFTs, drones, AR, MR, and AI, among others) have allowed for new types of mobilities and introduced a novel set of practices, interventions, and politics for heritage collections, archives, exhibitions, entertainment, conservation, management, commerce, education, restitution, activism, and regulation.
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive.
This book comprehensively explores the latest technological advancements in healthcare, with a particular focus on the application of cutting-edge technologies, such as artificial intelligence (AI), computer vision, and robotics.
Making Media Futures offers a multi-perspectival exploration of how imaginaries and knowledge of the future are constructed in and through various media.
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks.
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises.
Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.