Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of - and insight provided by - the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka "e;rising tide"e;) insider attacks.
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of - and insight provided by - the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka "e;rising tide"e;) insider attacks.
This book provides important new insights into social issues in the rapidly growing field of esports, filling a gap in the literature that has, until now, been dominated by business and management perspectives.
This book provides important new insights into social issues in the rapidly growing field of esports, filling a gap in the literature that has, until now, been dominated by business and management perspectives.
Legal Analytics: The Future of Analytics in Law navigates the crisscrossing of intelligent technology and the legal field in building up a new landscape of transformation.
Legal Analytics: The Future of Analytics in Law navigates the crisscrossing of intelligent technology and the legal field in building up a new landscape of transformation.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others.
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others.
If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets.
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform).
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated.
Today the healthcare sector is facing challenges such as detecting the cause of ailments, disease prevention, high operating costs, availability of skilled technicians and infrastructure bottlenecks.
Today the healthcare sector is facing challenges such as detecting the cause of ailments, disease prevention, high operating costs, availability of skilled technicians and infrastructure bottlenecks.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
This book presents the creation of a bilingual thesaurus (Italian and English), and its conversion into an ontology system, oriented to the Cybersecurity field of knowledge term management and the identification of a replicable method over other specialized areas of study, through computational linguistics procedures, to a statistical and qualitative measurement of the terminological coverage threshold a controlled vocabulary is able to guarantee with respect to the semantic richness proper to the domain under investigation.
This book presents the creation of a bilingual thesaurus (Italian and English), and its conversion into an ontology system, oriented to the Cybersecurity field of knowledge term management and the identification of a replicable method over other specialized areas of study, through computational linguistics procedures, to a statistical and qualitative measurement of the terminological coverage threshold a controlled vocabulary is able to guarantee with respect to the semantic richness proper to the domain under investigation.
The Learning Engineering Toolkit is a practical guide to the rich and varied applications of learning engineering, a rigorous and fast-emerging discipline that synthesizes the learning sciences, instructional design, engineering design, and other methodologies to support learners.
The Learning Engineering Toolkit is a practical guide to the rich and varied applications of learning engineering, a rigorous and fast-emerging discipline that synthesizes the learning sciences, instructional design, engineering design, and other methodologies to support learners.
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence.
This is the first book to show how digitalisation and the better provision of information and communication technologies (ICTs) can improve access to a wide-range of social services, as well as make them more inclusive.
This is the first book to show how digitalisation and the better provision of information and communication technologies (ICTs) can improve access to a wide-range of social services, as well as make them more inclusive.