Buy gisd.eu ?

Products related to Cybersecurity:


  • Global Cybersecurity and International Law
    Global Cybersecurity and International Law

    This book offers a critical analysis of cybersecurity from a legal-international point of view. Assessing the need to regulate cyberspace has triggered the re-emergence of new primary norms.This book evaluates the ability of existing international law to address the threat and use of force in cyberspace, redefining cyberwar and cyberpeace for the era of the Internet of Things.Covering critical issues such as the growing scourge of economic cyberespionage, international co-operation to fight cybercrime, the use of foreign policy instruments in cyber diplomacy, it also looks at state backed malicious cyberoperations, and the protection of human rights against State security activities.Offering a holistic examination of the ability of public international law, the book addresses the most pressing issues in global cybersecurity. Reflecting on the reforms necessary from international institutions, like the United Nations, the European Union, the Council of Europe, and NATO, in order to provide new answers to the critical issues in global cybersecurity and international law, this book will be of interest to academics, students and practitioners.

    Price: 135.00 £ | Shipping*: 0.00 £
  • Applied Data Science for Cybersecurity
    Applied Data Science for Cybersecurity

    Discover how to apply contemporary data science and machine learning to cybersecurity In Applied Data Science for Cybersecurity, experienced data science and cybersecurity professional Charles Givre delivers an incisive and technically sound exploration of how to use the latest advances in data science, machine learning, and artificial intelligence to improve your firm's cybersecurity.The author explains what data science and machine learning are before moving on to how to get and prepare data for visualization and processing, how to build and tune machine learning models, and, finally, how to apply all this knowledge to the world of cybersecurity.In the book, you'll discover: How to prepare cybersecurity data for machine learningHow to build machine learning models for cybersecurity applicationsHow to understand deep learning and its application to cybersecurityHow to use the latest artificial intelligence for cybersecurity applicationsHow to attack AI and machine learning models. A must-read for cybersecurity professionals who aim to improve their understanding of machine learning and data science, Applied Data Science for Cybersecurity is also a valuable addition to the library of any information security practitioner with an interest in modern data science and its applications to cybersecurity.

    Price: 37.99 £ | Shipping*: 0.00 £
  • Demystifying Intelligent Multimode Security Systems : An Edge-to-Cloud Cybersecurity Solutions Guide
    Demystifying Intelligent Multimode Security Systems : An Edge-to-Cloud Cybersecurity Solutions Guide

    This open access book. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually.These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples’ homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance.IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation. What You Will LearnReview the relevant technologies in a surveillance systemDefine and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocksOptimize the partition and future-proof it with security and manageabilityUnderstand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and softwareUnderstand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threatsSample applications illustrate how to design in security for several types of IMSS.—Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environmentWho This Book Is ForSurveillance system designers, integrators, and consultants; professional systems, hardware, and software designers who design, recommend, or integrate surveillance systems; security system integrators; video analytics engineers; agencies that write RFPs and/or RFIs; government, police, and security agencies; and corporate security divisionsThis is an open access book.

    Price: 54.99 £ | Shipping*: 0.00 £
  • Cybersecurity
    Cybersecurity

    An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics. It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants.The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures.In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use. Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information).He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware.He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology.Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.

    Price: 15.99 £ | Shipping*: 3.99 £

Similar search terms for Cybersecurity:


  • Cybersecurity in Context : Technology, Policy, and Law
    Cybersecurity in Context : Technology, Policy, and Law

    “A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits “A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity.Start here if you are looking for an entry point to cyber.” —BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back The first-ever introduction to the full range of cybersecurity challenges Cybersecurity is crucial for preserving freedom in a connected world.Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable.This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject.Cybersecurity in Context covers both the policy and practical dimensions of the field.Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject.The result is a cutting-edge guide to all key aspects of one of this century’s most important fields.Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.

    Price: 64.95 £ | Shipping*: 0.00 £
  • Data Protection, GDPR and Cybersecurity Diploma Course
    Data Protection, GDPR and Cybersecurity Diploma Course

    Fine-tune your expertise in Data Protection, GDPR, and Cybersecurity with our accredited online course. Stay compliant and safeguard data effectively. Enrol today.

    Price: 127 € | Shipping*: 0.00 €
  • Cybersecurity Law
    Cybersecurity Law

    This book provides a relatively comprehensive examination of cybersecurity related laws that would be helpful for lawyers, law students, and Chief Information Security Officers (CISOs) and other cybersecurity and privacy professionals. The book outlines and details the U.S. federal sectoral approach to cybersecurity, such as covering the Gramm-Leach-Bliley Act and regulations, and the Health Insurance Portability and Accountability Act Security Rule, as well as an examination of state laws impacting cybersecurity, such as data breach notification, privacy and state education laws. International issues as well as specific topics such as ransomware and the Internet of things are addressed. Notably, the book provides a review of the role of the cybersecurity professional, risk assessment as well as the National Institute of Standards and Technology (NIST) risk assessment framework, and laws related to hacking.

    Price: 161.00 £ | Shipping*: 0.00 £
  • Cybersecurity Essentials
    Cybersecurity Essentials

    An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter.Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios.Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment.This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.Learn security and surveillance fundamentalsSecure and protect remote access and devicesUnderstand network topologies, protocols, and strategiesIdentify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

    Price: 33.00 £ | Shipping*: 0.00 £

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.