Security systems have become an integral part of the building and large complex setups, and intervention of the computational ...
اقرأ المزيد
When information in the data warehouse is processed, it follows a definite pattern. An unexpected deviation in the data pattern ...
اقرأ المزيدFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
اقرأ المزيد
Provides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
اقرأ المزيد
Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيدFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
اقرأ المزيد
Explains the fundamentals, advanced technologies, and best practices used in planning, designing, building and operating ...
اقرأ المزيد
Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions ...
اقرأ المزيد
In Digital Finance: Security Tokens and Unlocking the Real Potential Blockchain, readers will realize why security tokens ...
اقرأ المزيد
Provides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. ...
اقرأ المزيدProvides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems ...
اقرأ المزيد
Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
اقرأ المزيدThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
اقرأ المزيد
Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
اقرأ المزيد
Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
اقرأ المزيد
Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...
اقرأ المزيدFrom the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...
اقرأ المزيد
Untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...
اقرأ المزيدYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيد
Offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...
اقرأ المزيد