This book on Governance, Risk Management and Compliance (GRC) and Data Privacy is designed to equip apprentices, students and professionals across various industries with a deep understanding of this holistic approach to organizational security and risk management, quality management and regulatory responsibilities.
This book on Governance, Risk Management and Compliance (GRC) and Data Privacy is designed to equip apprentices, students and professionals across various industries with a deep understanding of this holistic approach to organizational security and risk management, quality management and regulatory responsibilities.
Strategic Security Management, Third Edition is a vital roadmap for modern security professionals, delivering a comprehensive, data-driven approach to risk assessment and protective strategy.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
Strategic Security Management, Third Edition is a vital roadmap for modern security professionals, delivering a comprehensive, data-driven approach to risk assessment and protective strategy.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book is a practical guide to be used by people with little or no knowledge of sustainability as well as sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted by different organizations, successfully.
This book explores youth involvement in public safety, measuring the success of historic programs in school districts, fire departments, and police departments, and evaluating their potential to mitigate youth violence in the U.
This book explores youth involvement in public safety, measuring the success of historic programs in school districts, fire departments, and police departments, and evaluating their potential to mitigate youth violence in the U.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately.
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately.
The world reacted in horror to the graphic security camera footage of United Healthcare CEO Brian Thompson being gunned down on a Manhattan sidewalk as he was on his way to attend a scheduled investor conference.
The world reacted in horror to the graphic security camera footage of United Healthcare CEO Brian Thompson being gunned down on a Manhattan sidewalk as he was on his way to attend a scheduled investor conference.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
This book is a practical guide to be used by people with little or no knowledge of sustainability as well as sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted by different organizations, successfully.
This book offers a new and innovative way of thinking about desistance from crime, fusing our understanding of desistance transitions, youth transitions, and the impact of significant policy change on people with convictions in a way which is yet to be seen in the available desistance literature.
This book delves into the revolutionary ways in which AI-driven innovations are enhancing every aspect of cybersecurity, from threat detection and response automation to risk management and endpoint protection.
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.