Cybersecurity Risk Management
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributi...
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of...
Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape
Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis
Bayesian methods of inference are deeply natural and extremely powerful. Howev...
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different at...
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers ba...
For courses in Cryptography, Computer Security, and Network Security.
Keep pace with the fast-moving field of cryptography and network security
Stallings’ Cryptogra...
In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. TodayÂ’s environmental complexity has seen an explosion of privileged credentials for many different...
Enter your address and we will specify the offer for your area.