Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
The CISO's Next Frontier - AI, Post-Quantum Cryptography and Advanced Security Paradigms (Hardcover, 1st ed. 2021)
Loot Price: R2,030
Discovery Miles 20 300
|
|
The CISO's Next Frontier - AI, Post-Quantum Cryptography and Advanced Security Paradigms (Hardcover, 1st ed. 2021)
Expected to ship within 12 - 19 working days
|
This book provides an advanced understanding of cyber threats as
well as the risks companies are facing. It includes a detailed
analysis of many technologies and approaches important to
decreasing, mitigating or remediating those threats and risks.
Cyber security technologies discussed in this book are futuristic
and current. Advanced security topics such as secure remote work,
data security, network security, application and device security,
cloud security, and cyber risk and privacy are presented in this
book. At the end of every chapter, an evaluation of the topic from
a CISO's perspective is provided. This book also addresses quantum
computing, artificial intelligence and machine learning for cyber
security The opening chapters describe the power and danger of
quantum computing, proposing two solutions for protection from
probable quantum computer attacks: the tactical enhancement of
existing algorithms to make them quantum-resistant, and the
strategic implementation of quantum-safe algorithms and
cryptosystems. The following chapters make the case for using
supervised and unsupervised AI/ML to develop predictive,
prescriptive, cognitive and auto-reactive threat detection,
mitigation, and remediation capabilities against advanced attacks
perpetrated by sophisticated threat actors, APT and
polymorphic/metamorphic malware. CISOs must be concerned about
current on-going sophisticated cyber-attacks, and can address them
with advanced security measures. The latter half of this book
discusses some current sophisticated cyber-attacks and available
protective measures enabled by the advancement of cybersecurity
capabilities in various IT domains. Chapters 6-10 discuss secure
remote work; chapters 11-17, advanced data security paradigms;
chapters 18-28, Network Security; chapters 29-35, application and
device security; chapters 36-39, Cloud security; and chapters 40-46
organizational cyber risk measurement and event probability.
Security and IT engineers, administrators and developers, CIOs,
CTOs, CISOs, and CFOs will want to purchase this book. Risk
personnel, CROs, IT and Security Auditors as well as security
researchers and journalists will also find this useful.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|