136,79 €
Produit Neuf
Ou 34,20 € /mois
- Livraison à 0,01 €
- Livré entre le 15 et le 27 mai
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Defense In Depth Format Relié - Livre Informatique
0 avis sur Defense In Depth Format Relié - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Cogs, Caravels And Galleons
Occasion dès 154,38 €
-
Hilgard S Introduction To Psychology Rita L. Atkinson
Occasion dès 95,99 €
-
Karl Blossfeldt
2 avis
Occasion dès 69,00 €
-
Pomellato
Occasion dès 80,00 €
-
Illuminations-2cd-Prix Conseille 24.20 E/Ttc
Occasion dès 160,00 €
-
Professional Goldsmithing : A Contemporary Guide To Traditional Jewelry Techniques
Occasion dès 110,38 €
-
A Glastonbury Romance
Occasion dès 111,99 €
-
Los Detectives Salvajes (Coleccion Compactos)
Occasion dès 87,99 €
-
Simone Pheulpin
Neuf dès 79,00 €
Occasion dès 134,22 €
-
Studio 54: The Legend
1 avis
Occasion dès 80,99 €
-
The Princeton Companion To Applied Mathematics
Neuf dès 128,31 €
Occasion dès 139,99 €
-
Enseignement Oral De Platon: Une Nouvelle Interprétation Du Platonisme (French Edition)
1 avis
Occasion dès 149,99 €
-
Maison Martin Margiela : Street Special Edition Volumes 1 & 2
Occasion dès 190,00 €
-
Stone Age - Ancient Castles Of Europe
1 avis
Occasion dès 102,40 €
-
A Practical Guide To Chemical Peels, Microdermabrasion & Topical Products
1 avis
Neuf dès 158,90 €
-
Prepodobnye Kirill, Ferapont I Martinian Belozerskie
Occasion dès 90,00 €
-
Peter Doig
1 avis
Neuf dès 74,71 €
Occasion dès 134,97 €
-
David Yarrow
Neuf dès 123,00 €
Occasion dès 192,01 €
-
The Viniyoga Of Yoga, Applying Yoga For Healthy Living
Occasion dès 199,00 €
-
A First Course In The Finite Element Method, Enhanced Edition, Si Version
Neuf dès 130,02 €
Produits similaires
Présentation Defense In Depth Format Relié
- Livre Informatique
Résumé : Editor Biography xxi List of Contributors xxiii Preface xxv 1 Introduction to Modern Cybersecurity 1 1.1 Overview of Cybersecurity Evolution 1 1.2 Current Cyber Threat Landscape 2 1.3 Core Principles of Cybersecurity 4 1.4 DiD as a Cybersecurity Strategy 7 1.5 Cybersecurity Frameworks and Standards 10 1.6 Emerging Technologies and Their Security Implications 13 1.7 Cybersecurity Skills and Workforce Development 15 1.8 Conclusion and Road Ahead 18 References 20 2 Evolving Cyber Threats: Understanding the New Battlefield 23 2.1 Introduction 23 2.2 Historical Context of Cyber Threats 26 2.3 Types of Modern Cyber Threats 28 2.4 Motivations Behind Modern Cyber Threats 32 2.5 Case Studies of Recent High-Impact Attacks 35 2.6 Emerging Technologies and their Role in Cyber Threat Evolution 38 2.7 Defensive Strategies Against Evolving Cyber Threats 40 2.8 Role of Government and International Collaboration 44 2.9 Future Trends and Threat Landscape 46 2.10 Conclusion 48 References 49 3 Defense in Depth: A Multilayered Approach 51 3.1 Introduction 51 3.2 The Layers of Defense in Depth 53 3.3 Implementing Defense in Depth Across Different Environments 57 3.4 Integrating Cyber Threat Intelligence 60 3.5 Adapting to Emerging Threats with Defense in Depth 61 3.6 Monitoring and Incident Response in a Multilayered Architecture 63 3.7 Evaluating the Effectiveness of Defense in Depth 65 3.8 Challenges and Future Directions 68 3.9 Conclusion 70 References 70 4 The Role of Artificial Intelligence in Cybersecurity 73 4.1 Introduction 73 4.2 Key Applications of AI in Cyber Defense 75 4.3 Artificial-Intelligence-Powered Tools and Technologies in Cybersecurity 79 4.4 Enhancing Defense in Depth with Artificial Intelligence 81 4.5 Integrating Artificial Intelligence with Cyber Threat Intelligence 83 4.6 Artificial-Intelligence-Driven Security Operations Center (SOC) 85 4.7 Challenges in Implementing Artificial Intelligence in Cybersecurity 87 4.8 Case Studies: Real-World Applications of Artificial Intelligence in Cyber Defense 89 4.9 Future of Artificial Intelligence in Cybersecurity 92 4.10 Conclusion 95 References 95 5 Blockchain Technology: Enhancing Security in a Decentralized World 99 5.1 Introduction 99 5.2 Blockchain Architecture and Security Fundamentals 102 5.3 Blockchain in Decentralized Security Models 105 5.4 Applications of Blockchain in Cybersecurity 108 5.5 Blockchain-Based Solutions to Emerging Cyber Threats 110 5.6 Challenges and Limitations of Blockchain in Cybersecurity 113 5.7 Case Studies of Blockchain Implementation in Cybersecurity 115 5.8 Ethical and Privacy Considerations in Blockchain-Based Security 117 5.9 Future Trends and Innovations in Blockchain for Cybersecurity 119 5.10 Conclusion 122 References 123 6 Human Factors in Cybersecurity: The Weakest Link 127 6.1 Introduction 127 6.2 Understanding Human Factors in Cybersecurity 128 6.3 The Role of Human Error in Cybersecurity Breaches 131 6.4 Social Engineering and Insider Threats 134 6.5 User Awareness and Training 137 6.6 Human-Centric Security Design 139 6.7 The Role of Leadership and Organizational Culture 1...
Hewa Majeed Zangana
Marwan Omar
Jamal N. Al-Karaki
Derek Mohammed
Marwan Omar
Hewa Majeed Zangana
Biographie: Hewa Majeed Zangana is an Assistant Professor at Duhok Polytechnic University (DPU) in Iraq. He has held numerous academic and administrative positions, including Assistant Professor at Ararat Private Technical Institute, Lecturer at DPU's Amedi Technical Institute and Nawroz University, and Acting Dean of the College of Computer and IT at Nawroz University. His administrative roles have included Director of the Curriculum Division at the Presidency of DPU, Manager of the Information Unit at DPU's Research Center, and Head of the Computer Science Department at Nawroz University. Dr. Zangana has authored numerous articles in peer-reviewed journals, including Inform: Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi, Indonesian Journal of Education and Social Science, TIJAB, INJIISCOM, IEEE, EAI, and AJNU. In addition to his journal contributions, he has published many academic books with IGI Global, several of which are indexed in Scopus and Web of Science (Clarivate). Beyond publishing, Dr. Zangana actively contributes to the academic community through editorial service. He serves as a reviewer for many reputable journals. He is also a member of several academic and scientific committees, including the Scientific Curriculum Development Committee, the Student Follow-up Program Committee, and the Committee for Drafting the Rules of Procedure for Consultative Offices....
Sommaire: Preface xxi 1 Introduction to Modern Cybersecurity 1 Hewa Majeed Zangana 1.1 Overview of Cybersecurity Evolution 1 1.2 Current Cyber Threat Landscape 2 1.3 Core Principles of Cybersecurity 4 1.4 DiD as a Cybersecurity Strategy 7 1.5 Cybersecurity Frameworks and Standards 10 1.6 Emerging Technologies and Their Security Implications 13 1.7 Cybersecurity Skills andWorkforce Development 15 1.8 Conclusion and Road Ahead 18 References 20 2 Evolving Cyber Threats: Understanding the New Battlefield 23 Marwan Omar 2.1 Introduction 23 2.2 Historical Context of Cyber Threats 26 2.3 Types of Modern Cyber Threats 28 2.4 Motivations Behind Modern Cyber Threats 32 2.5 Case Studies of Recent High-Impact Attacks 35 2.6 Emerging Technologies and their Role in Cyber Threat Evolution 38 2.7 Defensive Strategies Against Evolving Cyber Threats 40 2.8 Role of Government and International Collaboration 44 2.9 Future Trends and Threat Landscape 46 2.10 Conclusion 48 References 49 3 Defense in Depth: A Multilayered Approach 51 Jamal N. Al-Karaki 3.1 Introduction 51 3.2 The Layers of Defense in Depth 53 3.3 Implementing Defense in Depth Across Different Environments 57 3.4 Integrating Cyber Threat Intelligence 60 3.5 Adapting to Emerging Threats with Defense in Depth 61 3.6 Monitoring and Incident Response in a Multilayered Architecture 63 3.7 Evaluating the Effectiveness of Defense in Depth 65 3.8 Challenges and Future Directions 68 3.9 Conclusion 70 References 70 4 The Role of Artificial Intelligence in Cybersecurity 73 Derek Mohammed 4.1 Introduction 73 4.2 Key Applications of AI in Cyber Defense 75 4.3 Artificial-Intelligence-Powered Tools and Technologies in Cybersecurity 79 4.4 Enhancing Defense in Depth with Artificial Intelligence 81 4.5 Integrating Artificial Intelligence with Cyber Threat Intelligence 83 4.6 Artificial-Intelligence-Driven Security Operations Center (SOC) 85 4.7 Challenges in Implementing Artificial Intelligence in Cybersecurity 87 4.8 Case Studies: Real-World Applications of Artificial Intelligence in Cyber Defense 89 4.9 Future of Artificial Intelligence in Cybersecurity 92 4.10 Conclusion 95 References 95 5 Blockchain Technology: Enhancing Security in a Decentralized World 99 Marwan Omar 5.1 Introduction 99 5.2 Blockchain Architecture and Security Fundamentals 102 5.3 Blockchain in Decentralized Security Models 105 5.4 Applications of Blockchain in Cybersecurity 108 5.5 Blockchain-Based Solutions to Emerging Cyber Threats 110 5.6 Challenges and Limitations of Blockchain in Cybersecurity 113 5.7 Case Studies of Blockchain Implementation in Cybersecurity 115 5.8 Ethical and Privacy Considerations in Blockchain-Based Security 117 References 123 6 Human Factors in Cybersecurity: The Weakest Link 127 Hewa Maj...
5.9 Future Trends and Innovations in Blockchain for Cybersecurity 119
5.10 Conclusion 122
Détails de conformité du produit
Personne responsable dans l'UE