Account
Orders
Advanced search
Digital threats are growing increasingly sophisticated and traditional defense methods such as firewalls, password protection, and biometrics are proving inadequate. This book delves into the revolutionary connection between neuroscience and cybersecurity, known as...
Are you ready to move beyond theory and start building real-world cybersecurity skills? Initial Access with Metasploit and Meterpreter is your hands-on guide to understanding how attackers gain their first foothold—and how defenders can stop them. Designed for college...
Artificial Intelligence is no longer a future concern—it’s a present-day disruptor. As vendors and partners increasingly adopt AI-enabled products and services, third-party and supply-chain risk professionals face a new challenge: managing a rapidly evolving...
Cyber risk quantification (CRQ) is the practice of measuring cybersecurity risk using numbers —not colors or guesswork. Instead of labeling risks “high,” “medium,” or “low,” CRQ uses probabilities, ranges, and impact estimates...
Future-proof your digital infrastructure with this essential book, which provides a comprehensive exploration of both traditional and advanced machine and deep learning models to implement resilient and intelligent intrusion detection systems for securing complex...
An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential campaigns, shut down electric grids, sway public sentiment, and cost businesses and...
Chatgpt changed the way i looked at earning online. I opened the laptop expecting another overhyped tool. Instead, i found leverage. Words turned into products. Ideas turned into income streams. It wasn’t magic—it was execution. This book breaks it down without fluff....
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server...
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather...
This open access book invites readers to explore the emerging opportunities and strategic significance of quantum technologies in the context of cybersecurity. It collects the latest trends and insights into the evolution of quantum computing and quantum communication,...
AI Identities introduces a groundbreaking concept:AI Agents should be recognized and governed as a new class of identity within enterprise environments. As artificial intelligence evolves from predictive models to autonomous agents with memory, goals, and tool access,...
Misconfigured identities are the leading cause of cyber incidents. Organizations are investing significant resources to address these vulnerabilities, but these investments often prioritize meeting compliance requirements set by regulators. However, the controls and...
In the ever-evolving world of cybersecurity, the need for robust and proactive threat intelligence has never been more critical. This book is designed to arm you with the essential knowledge and tools required to establish a world-class cyber threat intelligence (CTI)...
A practical, hands-on guide to navigating deepfake technology and reducing the risks it poses to your business In Behind the AI Mask: Protecting Your Business From Deepfakes, technologist and founder of viral platform, Myster Giraffe, Carl Bogan, explains the dangers,...
Praise for LIARS & OUTLIERS "Without trust, nothing can be achieved. Liars and Outliers is a brilliant analysis of the role of trust in society and business."—Klaus Schwab, Founder and Executive Chairman, World Economic Forum "Schneier absolutely understands how...
Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and...
Protect your organization from next-generation threats with this comprehensive analysis of cognitive cybercrimes, addressing future legal, ethical, and policy challenges in the age of AI. Cognitive Cyber Crimes in the Era of Artificial Intelligence explores the emerging...
This book covers all topics and requirements of the CompTIA CySA+ certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated intermediate- to advanced-level certification. CompTIA CySA+ is...
In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets. It bridges the gap between theoretical understanding and real-world application,...
Operational Technology (OT) refers to hardware and software used to monitor, control, and manage industrial processes, infrastructure, and assets across sectors like manufacturing, energy, transportation, and utilities. It includes systems such as Industrial Control...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers