"This book provides a paradigm changing approach for protecting organizational email users from falling prey to social engineering"--OCLC-licensed vendor bibliographic record.
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--OCLC-licensed vendor bibliographic record.
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, in…
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security hard, warrantless wiretapping and the role of electronic surveillance in the war on terror, the …
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…