Cybersecurity Guide to Governance, Risk, and Compliance
EAN: 9781394250196
Hands-On Differential Privacy
Many organizations today analyze and share large, sensitive datasets about individuals. Whether...
EAN: 9781492097747
Security Engineering for Embedded and Cyber-Physical Systems
Security engineering for embedded and Cyber-physical systems is an invaluable resource to...
EAN: 9781032576497
Security Engineering for Embedded and Cyber-Physical Systems
Security engineering for embedded and Cyber-physical systems is an invaluable resource to...
EAN: 9781032576473
Cybersecurity Operations and Fusion Centers
With its comprehensive analysis of all aspects of the SOFC, from team building to incident...
EAN: 9781032194356
Metaweb
The book posits a symbiotic relationship between AI and the Metaweb, where AI assists in...
EAN: 9781032125510
SRv6 Network Programming
The book collects the research results of Huawei SRv6 experts and reflects the latest development...
EAN: 9781032016351
Wireless Sensor Networks and the Internet of Things
WSN and IoT technologies are discussed in order to provide a strong framework of reference, and...
EAN: 9781774637951
Protecting Information Assets and IT Infrastructure in the Cloud
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a...
EAN: 9781032605401
Protecting Information Assets and IT Infrastructure in the Cloud
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a...
EAN: 9781032605104
Deploying the Zero Trust Framework in MSFT Azure
This book takes a closer look at the Cloud, the Zero Trust Framework, and how to deploy from both...
EAN: 9781032581026
Deploying the Zero Trust Framework in MSFT Azure
This book takes a closer look at the Cloud, the Zero Trust Framework, and how to deploy from both...
EAN: 9781032581019
Becoming a Computational Thinker
This book has a single purpose: to help everyone become a computational thinker. Through...
EAN: 9781032568997
Ransomware
Ransomware attacks have become much more covert and stealthier, than when they first came out. In...
EAN: 9781032556697
Ransomware
Ransomware attacks have become much more covert and stealthier, than when they first came out. In...
EAN: 9781032556673
Information Assurance and Risk Management Strategies
EAN: 9781484297414
Principles and Applications of Blockchain Systems
EAN: 9781394237227
Cybersecurity Management in Education Technologies
This book explores the intersection of cybersecurity and education technologies, providing...
EAN: 9781032438320
Dark World
What are cyber crimes on the dark web? How people are doing business, and which areas are mostly...
EAN: 9781032518879