Free Delivery Over $100
6391 books were found.
A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet... Read More >>
Read More >>
Digital identities now stand as the primary target amid an AI-powered cyber landscape. Addressing risks from adversarial... Read More >>
Tired of batch delays killing insight? Stakeholders demanding real-time dashboards now? Legacy queues buckle under... Read More >>
Artificial intelligence reshapes business, technology and society by merging strategic frameworks with real-world... Read More >>
Master zero-trust security & AI threat monitoring to defend modern networks against sophisticated cyber threats.... Read More >>
Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung... Read More >>
Take your ethical hacking skills to the next level by mastering bash script and building your own hacking tools.... Read More >>
Benford’s Law offers a powerful, data-driven approach to anomaly detection. Discovered 150 years ago, it wasn’t... Read More >>
This book explores cybersecurity and privacy challenges in healthcare, FinTech, and intelligent systems. It covers... Read More >>
This book offers a comprehensive exploration of the emerging threats and defense strategies in adversarial machine... Read More >>
AI Risk Management & Compliance is the definitive professional guide to protecting organizations from lawsuits,... Read More >>
Regulating Artificial Intelligence is the definitive global guide to how governments are controlling the most powerful... Read More >>
Corporate AI Governance: How Companies Must Control Their Algorithms is the definitive guide for executives, boards,... Read More >>
Artificial intelligence is no longer experimental. It is now deciding who receives medical care, who gets approved... Read More >>
Artificial intelligence now runs the world's most powerful systems - healthcare, finance, education, government,... Read More >>
Every authentication event logs an identity. Every database stores readable data. Every message creates a metadata... Read More >>
Frontline security is changing fast. Most organizations have upgraded cyber defenses, cameras, access control,... Read More >>