Account
Orders
Advanced search
This open access book invites readers to explore the emerging opportunities and strategic significance of quantum technologies in the context of cybersecurity. It collects the latest trends and insights into the evolution of quantum computing and quantum communication,...
AI Identities introduces a groundbreaking concept:AI Agents should be recognized and governed as a new class of identity within enterprise environments. As artificial intelligence evolves from predictive models to autonomous agents with memory, goals, and tool access,...
Misconfigured identities are the leading cause of cyber incidents. Organizations are investing significant resources to address these vulnerabilities, but these investments often prioritize meeting compliance requirements set by regulators. However, the controls and...
In the ever-evolving world of cybersecurity, the need for robust and proactive threat intelligence has never been more critical. This book is designed to arm you with the essential knowledge and tools required to establish a world-class cyber threat intelligence (CTI)...
Praise for LIARS & OUTLIERS "Without trust, nothing can be achieved. Liars and Outliers is a brilliant analysis of the role of trust in society and business."—Klaus Schwab, Founder and Executive Chairman, World Economic Forum "Schneier absolutely understands how...
A practical, hands-on guide to navigating deepfake technology and reducing the risks it poses to your business In Behind the AI Mask: Protecting Your Business From Deepfakes, technologist and founder of viral platform, Myster Giraffe, Carl Bogan, explains the dangers,...
Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and...
Protect your organization from next-generation threats with this comprehensive analysis of cognitive cybercrimes, addressing future legal, ethical, and policy challenges in the age of AI. Cognitive Cyber Crimes in the Era of Artificial Intelligence explores the emerging...
This book covers all topics and requirements of the CompTIA CySA+ certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated intermediate- to advanced-level certification. CompTIA CySA+ is...
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server...
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather...
In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets. It bridges the gap between theoretical understanding and real-world application,...
Operational Technology (OT) refers to hardware and software used to monitor, control, and manage industrial processes, infrastructure, and assets across sectors like manufacturing, energy, transportation, and utilities. It includes systems such as Industrial Control...
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit. Audits have long been criticized as “a ritual of verification,” originating from the financial...
This book covers all topics and requirements of the CompTIA Security+ (SY0-701) certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated certification. CompTIA Security+ (SY0-701) is...
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in supporting digital security for everyday technologies such as the internet, mobile...
Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as NIST, MITRE ATT&CK,...
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this...
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes....
Resilience is defined as the ability to recover from or easily adapt to shocks and stresses. Resilience, unlike the concept of security (which is often and incorrectly conflated with resilience) refers to the system's ability to recover or regenerate its performance...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers