Personnaliser

OK

Defense in Depth -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

136,79 €

Produit Neuf

  • Ou 34,20 € /mois

    • Livraison à 0,01 €
    • Livré entre le 15 et le 27 mai
    Voir les modes de livraison

    rarewaves-uk

    PRO Vendeur favori

    4,8/5 sur + de 1 000 ventes

    Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Defense In Depth Format Relié  - Livre Informatique

        Note : 0 0 avis sur Defense In Depth Format Relié  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Defense In Depth Format Relié

         - Livre Informatique

        Livre Informatique - 01/11/2025 - Relié - Langue : Anglais

        . .

      • Editeur : John Wiley & Sons Inc
      • Langue : Anglais
      • Parution : 01/11/2025
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 304.0
      • ISBN : 9781394340729



      • Résumé :

        Editor Biography xxi

        List of Contributors xxiii

        Preface xxv

        1 Introduction to Modern Cybersecurity 1
        Hewa Majeed Zangana

        1.1 Overview of Cybersecurity Evolution 1

        1.2 Current Cyber Threat Landscape 2

        1.3 Core Principles of Cybersecurity 4

        1.4 DiD as a Cybersecurity Strategy 7

        1.5 Cybersecurity Frameworks and Standards 10

        1.6 Emerging Technologies and Their Security Implications 13

        1.7 Cybersecurity Skills and Workforce Development 15

        1.8 Conclusion and Road Ahead 18

        References 20

        2 Evolving Cyber Threats: Understanding the New Battlefield 23
        Marwan Omar

        2.1 Introduction 23

        2.2 Historical Context of Cyber Threats 26

        2.3 Types of Modern Cyber Threats 28

        2.4 Motivations Behind Modern Cyber Threats 32

        2.5 Case Studies of Recent High-Impact Attacks 35

        2.6 Emerging Technologies and their Role in Cyber Threat Evolution 38

        2.7 Defensive Strategies Against Evolving Cyber Threats 40

        2.8 Role of Government and International Collaboration 44

        2.9 Future Trends and Threat Landscape 46

        2.10 Conclusion 48

        References 49

        3 Defense in Depth: A Multilayered Approach 51
        Jamal N. Al-Karaki

        3.1 Introduction 51

        3.2 The Layers of Defense in Depth 53

        3.3 Implementing Defense in Depth Across Different Environments 57

        3.4 Integrating Cyber Threat Intelligence 60

        3.5 Adapting to Emerging Threats with Defense in Depth 61

        3.6 Monitoring and Incident Response in a Multilayered Architecture 63

        3.7 Evaluating the Effectiveness of Defense in Depth 65

        3.8 Challenges and Future Directions 68

        3.9 Conclusion 70

        References 70

        4 The Role of Artificial Intelligence in Cybersecurity 73
        Derek Mohammed

        4.1 Introduction 73

        4.2 Key Applications of AI in Cyber Defense 75

        4.3 Artificial-Intelligence-Powered Tools and Technologies in Cybersecurity 79

        4.4 Enhancing Defense in Depth with Artificial Intelligence 81

        4.5 Integrating Artificial Intelligence with Cyber Threat Intelligence 83

        4.6 Artificial-Intelligence-Driven Security Operations Center (SOC) 85

        4.7 Challenges in Implementing Artificial Intelligence in Cybersecurity 87

        4.8 Case Studies: Real-World Applications of Artificial Intelligence in Cyber Defense 89

        4.9 Future of Artificial Intelligence in Cybersecurity 92

        4.10 Conclusion 95

        References 95

        5 Blockchain Technology: Enhancing Security in a Decentralized World 99
        Marwan Omar

        5.1 Introduction 99

        5.2 Blockchain Architecture and Security Fundamentals 102

        5.3 Blockchain in Decentralized Security Models 105

        5.4 Applications of Blockchain in Cybersecurity 108

        5.5 Blockchain-Based Solutions to Emerging Cyber Threats 110

        5.6 Challenges and Limitations of Blockchain in Cybersecurity 113

        5.7 Case Studies of Blockchain Implementation in Cybersecurity 115

        5.8 Ethical and Privacy Considerations in Blockchain-Based Security 117

        5.9 Future Trends and Innovations in Blockchain for Cybersecurity 119

        5.10 Conclusion 122

        References 123

        6 Human Factors in Cybersecurity: The Weakest Link 127
        Hewa Majeed Zangana

        6.1 Introduction 127

        6.2 Understanding Human Factors in Cybersecurity 128

        6.3 The Role of Human Error in Cybersecurity Breaches 131

        6.4 Social Engineering and Insider Threats 134

        6.5 User Awareness and Training 137

        6.6 Human-Centric Security Design 139

        6.7 The Role of Leadership and Organizational Culture 1...

        Biographie:

        Hewa Majeed Zangana is an Assistant Professor at Duhok Polytechnic University (DPU) in Iraq. He has held numerous academic and administrative positions, including Assistant Professor at Ararat Private Technical Institute, Lecturer at DPU's Amedi Technical Institute and Nawroz University, and Acting Dean of the College of Computer and IT at Nawroz University. His administrative roles have included Director of the Curriculum Division at the Presidency of DPU, Manager of the Information Unit at DPU's Research Center, and Head of the Computer Science Department at Nawroz University.

        Dr. Zangana has authored numerous articles in peer-reviewed journals, including Inform: Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi, Indonesian Journal of Education and Social Science, TIJAB, INJIISCOM, IEEE, EAI, and AJNU. In addition to his journal contributions, he has published many academic books with IGI Global, several of which are indexed in Scopus and Web of Science (Clarivate).

        Beyond publishing, Dr. Zangana actively contributes to the academic community through editorial service. He serves as a reviewer for many reputable journals. He is also a member of several academic and scientific committees, including the Scientific Curriculum Development Committee, the Student Follow-up Program Committee, and the Committee for Drafting the Rules of Procedure for Consultative Offices....

        Sommaire:

        Preface xxi

        1 Introduction to Modern Cybersecurity 1

        Hewa Majeed Zangana

        1.1 Overview of Cybersecurity Evolution 1

        1.2 Current Cyber Threat Landscape 2

        1.3 Core Principles of Cybersecurity 4

        1.4 DiD as a Cybersecurity Strategy 7

        1.5 Cybersecurity Frameworks and Standards 10

        1.6 Emerging Technologies and Their Security Implications 13

        1.7 Cybersecurity Skills andWorkforce Development 15

        1.8 Conclusion and Road Ahead 18

        References 20

        2 Evolving Cyber Threats: Understanding the New Battlefield 23

        Marwan Omar

        2.1 Introduction 23

        2.2 Historical Context of Cyber Threats 26

        2.3 Types of Modern Cyber Threats 28

        2.4 Motivations Behind Modern Cyber Threats 32

        2.5 Case Studies of Recent High-Impact Attacks 35

        2.6 Emerging Technologies and their Role in Cyber Threat Evolution 38

        2.7 Defensive Strategies Against Evolving Cyber Threats 40

        2.8 Role of Government and International Collaboration 44

        2.9 Future Trends and Threat Landscape 46

        2.10 Conclusion 48

        References 49

        3 Defense in Depth: A Multilayered Approach 51

        Jamal N. Al-Karaki

        3.1 Introduction 51

        3.2 The Layers of Defense in Depth 53

        3.3 Implementing Defense in Depth Across Different Environments 57

        3.4 Integrating Cyber Threat Intelligence 60

        3.5 Adapting to Emerging Threats with Defense in Depth 61

        3.6 Monitoring and Incident Response in a Multilayered Architecture 63

        3.7 Evaluating the Effectiveness of Defense in Depth 65

        3.8 Challenges and Future Directions 68

        3.9 Conclusion 70

        References 70

        4 The Role of Artificial Intelligence in Cybersecurity 73

        Derek Mohammed

        4.1 Introduction 73

        4.2 Key Applications of AI in Cyber Defense 75

        4.3 Artificial-Intelligence-Powered Tools and Technologies in Cybersecurity 79

        4.4 Enhancing Defense in Depth with Artificial Intelligence 81

        4.5 Integrating Artificial Intelligence with Cyber Threat Intelligence 83

        4.6 Artificial-Intelligence-Driven Security Operations Center (SOC) 85

        4.7 Challenges in Implementing Artificial Intelligence in Cybersecurity 87

        4.8 Case Studies: Real-World Applications of Artificial Intelligence in Cyber Defense 89

        4.9 Future of Artificial Intelligence in Cybersecurity 92

        4.10 Conclusion 95

        References 95

        5 Blockchain Technology: Enhancing Security in a Decentralized World 99

        Marwan Omar

        5.1 Introduction 99

        5.2 Blockchain Architecture and Security Fundamentals 102

        5.3 Blockchain in Decentralized Security Models 105

        5.4 Applications of Blockchain in Cybersecurity 108

        5.5 Blockchain-Based Solutions to Emerging Cyber Threats 110

        5.6 Challenges and Limitations of Blockchain in Cybersecurity 113

        5.7 Case Studies of Blockchain Implementation in Cybersecurity 115

        5.8 Ethical and Privacy Considerations in Blockchain-Based Security 117

        5.9 Future Trends and Innovations in Blockchain for Cybersecurity 119

        5.10 Conclusion 122

        References 123

        6 Human Factors in Cybersecurity: The Weakest Link 127

        Hewa Maj...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com