Filter
Datakryptering
Filter
Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing …
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing strategic defense mechanisms for malware, handling …
A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions – including medicine, law, and engineering – have wholeheartedly …
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How World Governments Relentlessly Pursue and Domesticate …
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and …
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the …
A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot …
A crystal-clear and practical blueprint to software disassembly x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling …
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security …