Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information
This book presents the state of the art for multi-party fair exchange protocols and
As cryptocurrencies and their underlying data structure, blockchains, become further
Tabletop exercises are a common way to test disaster recovery and business continuity
This book discusses Metaverse Technology, which is one of the emerging technologies around
This book will help you learn the importance of organizations treating enterprise cyber
This book provides a detailed examination of the threats and dangers facing the
Build an effective vulnerability management strategy to protect your
The area of Explainable Artificial Intelligence (XAI) is concerned with providing methods
Embark on a comprehensive journey into the intricate world of IT infrastructure, with an
Make your PCs as secure as possible and limit the routes
In today's fast-paced digital landscape, organizations face an ever-increasing volume of
Discover how poor identity and privilege management can be leveraged to compromise
Examine the evolving enterprise security landscape and discover how to manage and survive
This book provides an introduction to the theory and practice of cyber
Introduction.- Architecture of BIoT.- Transaction Migration Scheme for BIoT.-
Know how to mitigate and handle ransomware attacks via the essential cybersecurity
While cryptography can still be a
This book is an introduction and deep-dive into the many uses of dynamic SQL in Microsoft
Saying that many investors were not convinced by cryptocurrencies in their first decade of
The book offers a provocative review of thinking about privacy and identity in the years
Know how to design and use identity management to protect your application and the data it
Learn blockchain in a simple, non-tech way and explore the different emerging technologies
Crypto is going to change the world, and for those tired of confusing financial jargon and
A critical examination of the foundational flaws that have led to the current
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics
The frontlines of cybersecurity operations include many unfilled jobs and exciting career
Use Red Hat’s security tools to establish a set of security strategies