Free Delivery Over $100
6371 books were found.
Microsoft Purview Projects Playbook is a practical, hands-on guide built for professionals who want real, job-ready... Read More >>
Not all CISOs step into the role out of vocation or with the right context. Many arrive without a team, without... Read More >>
This comprehensive eBook explores the critical aspects of Data Ethics within the realm of Cyber Security. Covering... Read More >>
This comprehensive eBook delves into the vital principles and goals of cyber security, exploring the history and... Read More >>
This comprehensive eBook explores the critical role of executive accountability in cybersecurity. It covers the... Read More >>
AI Risk Management & Compliance is the definitive professional guide to protecting organizations from lawsuits,... Read More >>
Regulating Artificial Intelligence is the definitive global guide to how governments are controlling the most powerful... Read More >>
Corporate AI Governance: How Companies Must Control Their Algorithms is the definitive guide for executives, boards,... Read More >>
Artificial intelligence is no longer experimental. It is now deciding who receives medical care, who gets approved... Read More >>
Artificial intelligence now runs the world's most powerful systems - healthcare, finance, education, government,... Read More >>
Phishing has quietly become one of the most effective weapons used by cybercriminals today. It tricks users not... Read More >>
Stop Wasting Time on Ineffective, Half-Baked Hacking Guides! If you've ever wanted to master ethical hacking, cybersecurity,... Read More >>
Artificial intelligence reshapes business, technology and society by merging strategic frameworks with real-world... Read More >>
Kaum eine Organisation kommt heutzutage ohne die Verarbeitung großer Mengen personenbezogener Daten in Informationssystemen... Read More >>
An accurate and up-to-date guide to success on the AIGP certification exam and an essential resource for technology... Read More >>
This book offers a comprehensive exploration of the emerging threats and defense strategies in adversarial machine... Read More >>
Read More >>
A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet... Read More >>
Whether you're a security professional unaware of how exposed your backup systems are, or a backup admin in need... Read More >>
Is your red team delivering genuine security value or just expensive theater? In an era where cybersecurity investments... Read More >>
The Element identifies avoidance or alleviation of harm as a central legal preoccupation, outlines technical developments... Read More >>
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on... Read More >>
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference... Read More >>
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference... Read More >>